Querying Logs Parent topic

You can perform queries on the following types of events or information:
Message tracking
Records message details such as the sender, recipient(s), message size, attachment(s), and the final action that IMSS has taken. The query result also indicates the name and type of the policy rule that was triggered.
System events
Provides details on system events such as scan engine and pattern file updates, scanner service status changes, administrator operations, and errors that IMSS encountered.
Policy events
Provides details on the policy rules that were triggered, the actions taken, and the message details.
URL click tracking
Provides details on URL clicks such as the message sender, recipient(s), URL, message ID, and whether the URL is blocked, warned or clicked through.
Quarantine events
Provides details on quarantine events, for example, the percentage of release events in all the quarantine events.
MTA events
Provides connection details of Postfix on the local computer where the central controller is installed.
Sender filtering
Provides the time when IMSS started and stopped blocking messages from the queried IP address or sender address.
For most log queries, IMSS supports wildcards (*) and exact matches (for example, to view mail recipients whose name includes A or B, set the recipient(s) to “*A*;*B*”). IMSS uses exact matching by default. Leaving the search condition blank displays all logs. For multiple-condition items, use semicolons (;) to separate the entries for recipient(s) and attachment(s).