Quick Reference Guide

Chapter 6. Monitoring System Access and Performance | 197
ProSecure Web/Email Security Threat Management (STM) Appliance
Search Criteria
(continued)
Domain The domain name that is queried.
This field is available for the following logs:
Email traffic, Web traffic, Virus, Spyware, Spam, Email filters, Content
filters, and Application.
User The user name that is queried.
This field is available for the following logs:
Email traffic, Web traffic, Virus, Spyware, Spam, Email filters, Content
filters, and Application.
Client IP The client IP address that is queried.
This field is available for the following logs:
Email traffic, Web traffic, Virus, Spyware, Spam, Content filters, and
Application.
Server IP The server IP address that is queried.
This field is available for the following logs:
Email traffic, Web traffic, Virus, Spyware, Content filters, and
Application.
Reason Select one or more check boxes to specify the reasons that are
queried:
The following reasons can be selected:
• For the Email filters log: keyword, file type, file name, password, and
size limit.
• For the Content filters log: Web category, file type, blacklist, and size
limit.
Virus Name The name of the virus that is queried.
This field is available only for the Virus log.
Spyware Name The name of the spyware that is queried.
This field is available only for the Spyware log.
Action Select one or more check boxes to specify the malware treatment
actions that are queried.
The following actions can be selected:
• For the Virus and Spyware logs: Delete, Quarantine, Quarantine
email, Block email, or Log.
• For the Spam log: Block, Tag, or Quarantine.
Detected By Select one or all check boxes to specify the method by which spam is
detected: Blacklist, RBL, or Distributed Spam Analysis.
This field is available only for the Spam log.
Subject The email subject that is queried:
This field is available for the following logs:
Email traffic, Spam, and Email filters.
Sender Email The email address of the sender that is queried.
This field is available only for the Email traffic log.
Table 58. Log Query Settings (Continued)
Setting Description (or Subfield and Description)