Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 182

Configuring Alerts, Clearing Logs

Page 182 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Clearing Logs To clear logs: 1. Select Monitoring > Logs from the menu. The Logs submenu tabs display, with the Log Management screen in view (see Figure 102 on page 178). Locate the Clear the Following Log Information section at the bottom of the screen: Figure 104. Log Management, screen 3 of 3 2. Select one ore more check boxes to specify which logs are cleared: • System. The system event logs are cleared. • Email traffic. The logs with scanned incoming and outgoing email traffic are cleared. • Web traffic. The logs with scanned incoming and outgoing Web traffic are cleared. • Malware. The logs with intercepted viruses and spyware are cleared. • Spam. The logs with intercepted spam are cleared. • Email filter. The logs with intercepted emails are cleared. • Content filter. The logs with intercepted websites, URLs, and FTP sites are cleared. • Application. The logs with intercepted applications are cleared. 3. Click Clear Log Information. Configuring Alerts You can configure the STM to send an email alert when a failure, license expiration, or malware attack or outbreak occurs. Four types of alerts are supported: • Update Failure Alert. Sent when an attempt to update any component such as a pattern file or scan engine firmware fails. • License Expiration Alerts. Sent when a license is about to expire and then again when a license has expired. • Malware Alert. Sent when the STM detects malware threats. • Malware Outbreak Alert. Sent when the malware outbreak criteria that you have configured are reached or exceeded. Outbreak criteria are based on the number of malware threats detected within a specified period of time. 182 | Chapter 6. Monitoring System Access and Performance

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

182
|
Chapter 6.
Monitoring System Access and Performance
ProSecure Web/Email Security Threat Management (STM) Appliance
Clearing Logs
To clear logs:
1.
Select
Monitoring > Logs
from the menu. The Logs submenu tabs display, with the Log
Management screen in view (see
Figure 102
on page 178). Locate the Clear the
Following Log Information section at the bottom of the screen:
Figure 104.
Log Management, screen 3 of 3
2.
Select one ore more check boxes to specify which logs are cleared:
System
. The system event logs are cleared.
Email traffic
. The logs with scanned incoming and outgoing email traffic are cleared.
Web traffic
. The logs with scanned incoming and outgoing Web traffic are cleared.
Malware
. The logs with intercepted viruses and spyware are cleared.
Spam
. The logs with intercepted spam are cleared.
Email filter
. The logs with intercepted emails are cleared.
Content filter
. The logs with intercepted websites, URLs, and FTP sites are cleared.
Application
. The logs with intercepted applications are cleared.
3.
Click
Clear Log Information
.
Configuring Alerts
You can configure the STM to send an email alert when a failure, license expiration, or
malware attack or outbreak occurs. Four types of alerts are supported:
Update Failure Alert
. Sent when an attempt to update any component such as a pattern
file or scan engine firmware fails.
License Expiration Alerts
. Sent when a license is about to expire and then again when
a license has expired.
Malware Alert
. Sent when the STM detects malware threats.
Malware Outbreak Alert
. Sent when the malware outbreak criteria that you have
configured are reached or exceeded. Outbreak criteria are based on the number of
malware threats detected within a specified period of time.