- Message tracking
-
Records message details such as the sender, recipient(s), message size, attachment(s), and the final action that IMSS has taken. The query result also indicates the name and type of the policy rule that was triggered.
- System events
-
Provides details on system events such as scan engine and pattern file updates, scanner service status changes, administrator operations, and errors that IMSS encountered.
- Policy events
-
Provides details on the policy rules that were triggered, the actions taken, and the message details.
- URL click tracking
-
Provides details on URL clicks such as the message sender, recipient(s), URL, message ID, and whether the URL is blocked, warned or clicked through.
- Quarantine events
-
Provides details on quarantine events, for example, the percentage of release events in all the quarantine events.
- MTA events
-
Provides connection details of Postfix on the local computer where the central controller is installed.
- Sender filtering
-
Provides the time when IMSS started and stopped blocking messages from the queried IP address or sender address.
For most log queries, IMSS supports wildcards (*)
and exact matches (for example, to view mail recipients whose name includes A or B,
set
the recipient(s) to “*A*;*B*”). IMSS uses exact
matching by default. Leaving the search condition blank displays all logs. For
multiple-condition items, use semicolons (;) to separate the entries for recipient(s)
and attachment(s).
