EasyManuals Logo

NETGEAR UTM5 User Manual

NETGEAR UTM5
645 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #480 background imageLoading...
Page #480 background image
Monitoring System Access and Performance
480
ProSecure Unified Threat Management (UTM) Appliance
Figure 288.
2. Enter the settings as explained in the following table:
Table 128. Logs Query screen settings
Setting Description
Log Type Select one of the following log types from the drop-down list:
• Traffic. All scanned incoming and outgoing traffic.
• Spam. All intercepted spam.
• System. The system event logs that you have specified on the Email and
Syslog screen (see Configure and Activate System, Email, and Syslog Logs
on page 439). However, by default, many more types of events are logged in
the system logs. Note that you cannot specify further search criteria on the
Log Query screen, that is, when you select System from the drop-down list,
the System Logs screen displays.
• Service Logs. All events that are related to the status of scanning and
filtering services that you access from the Application Security main
navigation menu. These events include update success messages, update
failed messages, network connection errors, and so on.
• Malware. All intercepted viruses, spyware, and other malware threats.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the NETGEAR UTM5 and is the answer not in the manual?

NETGEAR UTM5 Specifications

General IconGeneral
BrandNETGEAR
ModelUTM5
CategoryFirewall
LanguageEnglish

Related product manuals