Monitoring System Access and Performance
467
ProSecure Unified Threat Management (UTM) Appliance
Query the Quarantine Logs (UTM9S Only)
The UTM9S can quarantine spam and malware files. Before you can query the Spam and
Malware logs, you need to have done the following:
1. You have integrated a ReadyNAS (see Connect to a ReadyNAS on page 415).
2. You have configured the quarantine settings (see Configure the Quarantine Settings on
page 416).
3. You have selected to quarantine emails, attachments, objects, and web files on one or
more of the following screens:
• Email Anti-Virus screen (see Customize Email Antivirus and Notification Settings on
page 179)
• Distributed Spam Analysis screen (see Configure Distributed Spam Analysis on
page 191)
• Malware Scan screen (see Configure Web Malware Scans on page 197)
• FTP screen (Configure FTP Scans on page 219)
Querying and viewing quarantined logs is described in the following sections:
• Query the Quarantined Logs
• View and Manage the Quarantined Spam Table
• View and Manage the Quarantined Infected Files Table
• Spam Reports for End Users
Query the Quarantined Logs
 To query the quarantine logs:
1. Select Monitoring > Quarantine. The Quarantine screen displays. (The following figure
shows the Spam log information settings as an example.)
Depending on the selection that you make from the File Type drop-down list, the screen
adjusts to display either the settings for the Spam log or the Malware log.