Quick Reference Guide
Chapter 6. Monitoring System Access and Performance | 209
ProSecure Web/Email Security Threat Management (STM) Appliance
You can query and view the spam quarantine file and the malware quarantine file separately
and filter the information based on a number of criteria. You can filter the spam quarantine file
using the following criteria:
• Start date and time
• End date and time
• Domain name
• User name
• Source IP address
• Sender email address
• Recipient email address
• Subject
• Size of the email
You can filter the malware quarantine file using the following criteria:
• Start date and time
• End date and time
• Protocols (HTTP, HTTPS, FTP, SMTP, POP3, and IMAP)
• Domain name
• User name
• Malware name
• Client IP address
• Recipient email address
• Recipient email address
• URL or subject
• Size of the file










