NETGEAR STM300EW-100NAS Network Hardware User Manual


 
ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual
Monitoring System Access and Performance 6-37
v1.0, September 2009
The Quarantined Spam table shows the following columns:
Checkbox. Lets you select the table entry.
Date. The date that the e-mail was received.
Protocol. The protocol (SMTP) in which the spam was found.
User. The user name that was used to log on the STM.
Client IP. The client IP address from which the spam originated.
From. The e-mail address of the sender.
To. The e-mail address of the recipient.
Subject. The e-mail subject line.
Size (Bytes). The size of the e-mail in bytes.
Figure 6-16 show the Quarantined Spam table with data.
After you have selected one or more table entries, take one of the following actions (or click the
Return hyperlink to return to the previous screen):
Send as Spam. The selected spam e-mail files are tagged as spam for Distributed Spam
Analysis, and are sent to the intended recipients.
Figure 6-15
Figure 6-16