You
can perform queries on the following types of events or information:
- Message tracking
-
Records message details such as the sender, recipient(s), message size,
attachment(s), and the final action that IMSS has taken. The query result also
indicates the name and type of the policy rule that was triggered.
- System events
-
Provides details on system events such as scan engine and pattern file
updates, scanner service status changes, administrator operations, and
errors that IMSS encountered.
- Policy events
-
Provides details on the policy rules that were triggered,
the actions taken, and the message details.
- URL click tracking
-
Provides details on URL clicks such as the message sender, recipient(s), URL,
message ID, and whether the URL is blocked, warned or clicked through.
- Quarantine events
-
Provides details on quarantine events, for example, the percentage of release
events in all the quarantine events.
- MTA events
-
Provides connection details of Postfix on the local computer where the
central controller is installed.
- Sender filtering
-
Provides the time when IMSS started and
stopped blocking messages from the queried IP address or sender address.
For most log queries, IMSS supports wildcards (*)
and exact matches (for example, to view mail recipients whose name includes A or B,
set
the recipient(s) to “*A*;*B*”). IMSS uses exact
matching by default. Leaving the search condition blank displays all logs. For
multiple-condition items, use semicolons (;) to separate the entries for recipient(s)
and attachment(s).