Mail security log displays triggering events for mail security rules for which logging is enabled. The following information is displayed:
-
UserGate node where the event occurred
-
Time triggered
-
User
-
Sender
-
Recipient
-
Rule
-
Source zone
-
Source IP address
-
Source port
-
Destination zone
-
Destination IP address
-
Destination port
-
Application
-
Application layer protocol
-
Bytes sent/received
-
Packets sent/received
Administrators can select to display only the columns they need. To do this, click on any of the columns and set the checkmarks for the columns you want to display in the context menu that appears.
To assist in finding the events of interest, the records can be filtered by various criteria such as the protocol, date range, action, etc.
By clicking Export as CSV, the administrator can save the filtered log data in a .csv file for subsequent analysis.
Click Show to open a window with a detailed event description.