Quick Reference Guide

Chapter 6. Monitoring System Access and Performance | 209
ProSecure Web/Email Security Threat Management (STM) Appliance
You can query and view the spam quarantine file and the malware quarantine file separately
and filter the information based on a number of criteria. You can filter the spam quarantine file
using the following criteria:
Start date and time
End date and time
Domain name
User name
Source IP address
Sender email address
Recipient email address
Subject
Size of the email
You can filter the malware quarantine file using the following criteria:
Start date and time
End date and time
Protocols (HTTP, HTTPS, FTP, SMTP, POP3, and IMAP)
Domain name
User name
Malware name
Client IP address
Recipient email address
Recipient email address
URL or subject
Size of the file