Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 178

Log Management, screen 1 of 3, Table 51., Email Logs Settings,

Page 178 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Figure 102. Log Management, screen 1 of 3 3. Complete the fields, select the radio button and check boxes, and make your selections from the drop-down lists as explained in the following table: Table 51. Email Logs Settings Setting Send to Frequency Description (or Subfield and Description) The email address of the recipient of the log file. This is normally a user with administrative privileges. You enter up to three email address, separated by commas. Click Send Now to immediately send the logs that you first need to have specified (see the information later in this table). Note: To limit the size of the email, the STM does not send the actual logs to the specified email address but an email that contains links to the actual logs. These links remain active for a period of 10 days, after which the logs are no longer available. Select a radio button to specify how often the log file is sent: • When the space is full. Logs are sent when the storage space that is assigned to the logs is full. • Daily. Logs are sent daily at the time that you specify from the drop-down lists (hours and minutes). • Weekly. Logs are sent weekly at the day and time that you specify from the drop-down lists (weekday, hours, and minutes). 178 | Chapter 6. Monitoring System Access and Performance

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

178
|
Chapter 6.
Monitoring System Access and Performance
ProSecure Web/Email Security Threat Management (STM) Appliance
Figure 102.
Log Management, screen 1 of 3
3.
Complete the fields, select the radio button and check boxes, and make your selections from
the drop-down lists as explained in the following table:
Table 51.
Email Logs Settings
Setting
Description (or Subfield and Description)
Send to
The email address of the recipient of the log file. This is normally a user with
administrative privileges. You enter up to three email address, separated by commas.
Click
Send Now
to immediately send the logs that you first need to have specified (see
the information later in this table).
Note:
To limit the size of the email, the STM does not send the actual logs to the
specified email address but an email that contains links to the actual logs. These links
remain active for a period of 10 days, after which the logs are no longer available.
Frequency
Select a radio button to specify how often the log file is sent:
When the space is full
. Logs are sent when the storage space that is assigned to the
logs is full.
Daily
. Logs are sent daily at the time that you specify from the drop-down lists (hours
and minutes).
Weekly
. Logs are sent weekly at the day and time that you specify from the
drop-down lists (weekday, hours, and minutes).