EasyManuals Logo

NETGEAR UTM5 User Manual

NETGEAR UTM5
645 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #487 background imageLoading...
Page #487 background image
Monitoring System Access and Performance
487
ProSecure Unified Threat Management (UTM) Appliance
3. Click Search. The log is queried according to the search criteria that you specified, and the
search results are displayed onscreen.
Search Criteria
(continued)
Protocols For the Malware log only, select one or more check boxes to
specify the protocols that are queried: SMTP, POP3, IMAP,
HTTP, FTP, and HTTPS.
Domain The domain name that is queried.
This field is available for both the Spam and Malware logs.
User The user name that is queried.
This field is available for both the Spam and Malware logs.
Malware Name The name of the malware threat that is queried.
This field is available only for the Malware log.
Client IP The client IP address that is queried.
This field is available for both the Spam and Malware logs.
Sender Email The sender’s email address that is queried.
This field is available only for the Spam log.
Recipient Email The recipient’s email address that is queried.
This field is available for both the Spam and Malware logs.
Subject The email subject line that is queried.
This field is available for both the Spam and Malware logs.
Size The minimum and maximum size (in bytes) of the file that is
queried.
This field is available for both the Spam and Malware logs.
Display The maximum number of pages that is displayed.
Table 129. Quarantine screen settings (continued)
Setting Description

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the NETGEAR UTM5 and is the answer not in the manual?

NETGEAR UTM5 Specifications

General IconGeneral
BrandNETGEAR
ModelUTM5
CategoryFirewall
LanguageEnglish

Related product manuals