Monitor System Access and Performance
517
ProSecure Unified Threat Management (UTM) Appliance
View and Manage the Quarantined Spam Table
When you query the spam quarantine file, the Quarantine screen with the Quarantined Spam
table displays:
Figure 303.
The Quarantined Spam table has the following columns (not all columns are shown in the
previous figure):
• Check box. Lets you select the table entry.
• Date. The date that the email was received.
• Protocol. The protocol (SMTP) in which the spam was found.
• Domain. The domain in which the spam was found.
• User. The user name that was used to log in to the UTM.
• Client IP. The client IP address from which the spam originated.
• From. The email address of the sender.
• To. The email address of the recipient.
• Subject. The email subject line.
• Size (Bytes). The size of the email in bytes.