EasyManua.ls Logo

NETGEAR UTM5 - Page 486

NETGEAR UTM5
645 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Monitoring System Access and Performance
486
ProSecure Unified Threat Management (UTM) Appliance
Figure 289.
2. Enter the settings as explained in the following table:
Table 129. Quarantine screen settings
Setting Description
File Type Select one of the following file types from the drop-down list:
Spam. All intercepted spam.
Malware. All intercepted viruses, spyware, and other malware threats.
View All Select one of the following radio buttons:
View All. Display or download the entire selected log.
Search Criteria. Query the selected log by configuring the search criteria that
are available for the selected log.
Search Criteria
Start Date/Time From the drop-down lists, select the year, month, day, hours,
and minutes for the start date and time.
This field is available for both the Spam and Malware logs.
End Date/Time From the drop-down lists, select the year, month, day, hours,
and minutes for the end date and time.
This field is available for both the Spam and Malware logs.

Table of Contents

Related product manuals