ProSecure Unified Threat Management (UTM) Appliance

After you have selected one or more table entries, take one of the following actions (or click the return link to return to the previous screen):

Send as Spam. The selected spam email files are tagged as spam for distributed spam analysis, and are sent to the intended recipients.

Send as Ham. The selected spam email files are not tagged as spam for distributed spam analysis, are removed from quarantine, and are sent to the intended recipients.

Delete. The selected spam email files are removed from quarantine and deleted.

View and Manage the Quarantined Infected Files Table

When you query the malware quarantine file, the Quarantine screen with the Quarantined Infected Files table displays:

Figure 304.

The Quarantined Infected Files table has the following columns (not all columns are shown in the previous figure):

Check box. Lets you select the table entry.

Date. The date that the file was received.

Protocol. The protocol (SMTP, POP3, IMAP, HTTP, FTP, HTTPS) in which the spyware or virus was found.

Domain. The domain name that was used to log in to the UTM.

User. The user name that was used to log in to the UTM.

Malware Name. The name of the spyware or virus.

Filename. The name of the file in which the spyware or virus was found.

Monitor System Access and Performance

518

Page 518
Image 518
NETGEAR UTM5EW-100NAS, STM150EW-100NAS manual View and Manage the Quarantined Infected Files Table, 518