NETGEAR STM300EW-100NAS Network Hardware User Manual


 
ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual
6-34 Monitoring System Access and Performance
v1.0, September 2009
You can query and view the spam quarantine file and the malware quarantine file separately and
filter the information based on a number of criteria. You can filter the spam quarantine file using
the following criteria:
Start date and time
End date and time
•User name
Source IP address
Sender e-mail address
Recipient e-mail address
Subject
Size of the e-mail
You can filter the malware quarantine file using the following criteria:
Start date and time
End date and time
Protocols (HTTP, HTTPS, FTP, SMTP, POP3, and IMAP)
•User name
•Malware name
Client IP address
Recipient e-mail address
Recipient e-mail address
URL or subject
Size of the file
To query the quarantine files:
1. Select Monitoring > Quarantine from the menu. The Quarantine screen displays (see
Figure 6-14 on page 6-35).
2. Depending on the selection that you make from the Quarantine File Type pull-down menu, the
screen adjusts to display the settings for the selected type of quarantine file. Figure 6-14 on
page 6-35 displays the spam quarantine file settings as an example.