Policy event logs provide details on the policy rules that were triggered (based on the queried scanning condition), the actions taken and the message details.
To view policy event logs:
Choose Logs > Query from the menu.
Next to Type, select Policy events. The query screen for policy event logs appears.
In the second drop down box next to Type, select the scanning condition which you would like to query.
Virus and malicious code
Spam
Attachment name or type
Size
Content
Others
Scanning exceptions
All
Type any of the following
additional information:
|
|
|
|
|
|
If you leave any text box blank, all results for that item will be displayed.
Click Display Log.
A timestamp, action, rule, and message ID appear for each event that matches the selected scanning condition.
Click the timestamp link to see the following information: (click here to expand)
Timestamp
Sender
Recipient
Subject
Message size in MB
Violating attachments
Rule type
Rule(s)
Final action that IMSA took on the message
Message ID
Internal ID
Scanner that detected the message
Perform any of the additional actions:
To change the number of items that appears in the list at one time, select a new display value from the drop down box on the top of the table.
To sort the table, click the column title.
To print the query results, click Print current page.
To save the query result to a comma separated value file, click Export to CSV.
|
You may use the asterisk (*) wildcard character when performing a query. For example, typing *A*;*B* will produce results that contain A or B. Typing A*;*B in the query produces results containing strings that start with A or end with B. The semicolon (;) represents the OR operation. |
See also: