System Logs and Error Messages
660
ProSecure Unified Threat Management (UTM) Appliance
Spam Logs
This section describes logs that are generated when the UTM filters spam email messages.
Message 2009-08-01 00:00:01 HTTP ldap_domain ldap_user 192.168.1.3 192.168.35.165
http://192.168.35.165/testcases/files/virus/normal/%b4%f3%d3%da2048.rar
Keyword Block
Explanation Logs that are generated when web content is blocked because of a keyword
violation. The message shows the date and time, protocol, domain, user, client IP
address, server IP address, URL, reason for the action, and the action that is taken.
Recommended Action None.
Table 180. Content-filtering and security logs: spam
Message 2009-02-28 23:59:59 SMTP radius_domain radius_user1 192.168.1.2
192.168.35.165 xlzimap@test.com xlzpop3@test.com Blocked by list.dsbl.org 0
RBL Block
Explanation Logs that are generated when spam messages are blocked by the RBL. The
message shows the date and time, protocol, domain, user, client IP address, server
IP address, sender, recipient, subject line, size, mechanism that detected the spam,
and the action that is taken.
Recommended Action None.
Message 2009-02-28 23:59:59 SMTP radius_domain radius_user1 192.168.1.2
192.168.35.165 xlzimap@test.com xlzpop3@test.com Blocked by customized
blacklist 0 Heuristic Block
Explanation Logs that are generated when spam messages are blocked by the blacklist. The
message shows the date and time, protocol, domain, user, client IP address, server
IP address, sender, recipient, subject line, size, mechanism that detected the spam,
and the action that is taken.
Recommended Action None.
Message 2009-02-28 23:59:59 SMTP radius_domain radius_user1 192.168.1.2
192.168.35.165 xlzimap@test.com xlzpop3@test.com Blocked by customized
blacklist 58882 Distributed Spam Analysis Block
Explanation Logs that are generated when spam messages are blocked by distributed spam
analysis. The message shows the date and time, protocol, protocol, domain, client
IP address, server IP address, sender, recipient, subject line, size, mechanism that
detected the spam, and the action that is taken.
Recommended Action None.
Table 179. Content-filtering and security logs: web filtering and content filtering (continued)