You
can perform queries on the following types of events or information:
- Message tracking
-
Records message details such as the sender, recipient(s),
message size, attachment(s), and the final action that IMSS has taken. The query result also
indicates the name and type of the policy rule that was triggered.
- System events
-
Provides details on system events such as scan engine and
pattern file updates, scanner service status changes, administrator
operations, and errors that IMSS
encountered.
- Policy events
-
Provides details on the policy rules that were triggered, the actions taken,
and the message details.
- Quarantine events
-
Provides details on quarantine events, for example, the percentage of release
events in all the quarantine events.
- MTA events
-
Provides connection details of Postfix on
the local computer where the central controller is installed.
- IP filtering
-
Provides the time when IMSS started and
stopped blocking messages from the queried IP address.
For most log queries, IMSS
supports wildcards (*) and exact matches (for example, to view mail recipients whose
name includes A or B, set the recipient(s) to “*A*;*B*”). IMSS uses exact matching by default. Leaving the
search condition blank displays all logs. For multiple-condition items, use semicolons
(;) to separate the entries for recipient(s) and attachment(s).