NETGEAR UTM5EW-100NAS, STM150EW-100NAS manual 512

Models: UTM5EW-100NAS STM150EW-100NAS

1 704
Download 704 pages 22.95 Kb
Page 512
Image 512

ProSecure Unified Threat Management (UTM) Appliance

Table 134. Logs Query screen settings (continued)

Setting

Description

 

 

 

 

Search Criteria

Category or

From the drop-down list, select a category that is queried.

(continued)

Categories

You can select the following from the drop-down list:

 

 

• For the IPS log: an attack.

 

 

• For the Application log: an instant messaging, peer-to-peer,

 

 

media, or tool application.

 

 

 

 

Reason

Select one or more check boxes to specify the reasons that are

 

 

queried:

 

 

You can select one or more of the following check boxes:

 

 

• For the Email filters log: Keyword, FileType, Filename,

 

 

Password, and SizeLimit.

 

 

• For the Content filters log: URL, FileType, SizeLimit, Proxy,

 

 

and Keyword.

 

 

 

 

Spam Found By

This field is available only for the Spam log.

 

 

Select one of the following check boxes to specify the method

 

 

by which spam is detected: Blacklist or Distributed Spam

 

 

Analysis.

 

 

 

 

Malware Name

The name of the malware threat that is queried.

 

 

This field is available only for the Malware log.

 

 

 

 

Action

The spam or malware detection action that is queried.

 

 

The following actions can be selected:

 

 

• For the Spam log: Select the Block or Tag check box.

 

 

• For the Malware log: Select the Delete, Block email, or

 

 

Log check box.

 

Email Subject

The email subject that is queried:

 

 

This field is available for the following logs:

 

 

Spam and Email filters.

 

 

 

 

Sender Email

The sender’s email address that is queried.

 

 

This field is available only for the Traffic log.

 

 

 

 

Recipient Email

The recipient’s email address that is queried.

 

 

This field is available for the following logs:

 

 

Traffic, Spam, Malware, and Email filters.

 

 

 

 

Message

The email message text that is queried.

 

 

This field is available for the following logs:

 

 

IPS, Anomaly Behavior, and Application.

 

 

 

 

Subject

The email subject line that is queried.

 

 

This field is available only for the Traffic log.

 

 

 

 

Size

The minimum and maximum size (in bytes) of the file that is

 

 

queried.

 

 

This field is available only for the Traffic log.

 

 

 

Monitor System Access and Performance

512

Page 512
Image 512
NETGEAR UTM5EW-100NAS, STM150EW-100NAS manual 512