Quick Reference Guide
196 | Chapter 6. Monitoring System Access and Performance
ProSecure Web/Email Security Threat Management (STM) Appliance
3. Select the check boxes and radio buttons, make your selections from the drop-down lists,
and complete the fields as explained in the following table:
Table 58. Log Query Settings
Setting Description (or Subfield and Description)
Log Type Select one of the following log types from the drop-down list:
• Email traffic. All scanned incoming and outgoing email traffic.
• Web traffic. All scanned incoming and outgoing email traffic.
• Virus. All intercepted viruses.
• Spyware. All intercepted spyware.
• Spam. All intercepted spam, including spam that was detected through the blacklist,
real-time blacklist, and distributed spam analysis.
• Email filters. All emails that are intercepted because of keyword, file type, file name,
password, or size limit violations.
• Content filters. All websites, URLs, and FTP sites that are intercepted because of
Web category, blacklist, file type, or size limit violations.
• System. The system event logs that include all system errors, informational messages,
configuration changes, and system software updates.
• Application. All intercepted application access violations.
View All Select one of the following radio buttons:
• View All. Display or download the entire selected log.
• Search Criteria. Query the selected log by configuring the search criteria that are
available for the selected log.
Search Criteria
Start Date/Time From the drop-down lists, select the year, month, day, hours, and
minutes for the start date and time.
This field is available for the following logs:
Email traffic, Web traffic, Virus, Spyware, Spam, Email filters, Content
filters, System, and Application.
End Date/Time From the drop-down lists, select the year, month, day, hours, and
minutes for the end date and time.
This field is available for the following logs:
Email traffic, Web traffic, Virus, Spyware, Spam, Email filters, Content
filters, System, and Application.
Protocols Select one or more check boxes to specify the protocols that are
queried.
The following protocols can be selected:
• For the Email traffic log: SMTP, POP3, and IMAP.
• For the Web traffic log: HTTP, HTTPS, and FTP.
• For Virus, and Spyware logs: SMTP, POP3, IMAP, HTTP, HTTPS,
and FTP.
• For the Spam log: SMTP and POP3.
• For the Email filters log: SMTP, POP3, and IMAP.
• For the Content filters log: HTTP, HTTPS, and FTP.










