You can filter events in the event log by one or more criteria.
To filter email traffic processing events in the event log:
Event information is displayed as a table.
This opens the add filter window.
a. Select one of the following criteria: |
b. Select one of the following logical operators: |
c. Enter the following value: |
---|---|---|
Date and time |
|
Message processing period. |
Sender email |
|
Text for searching sender email addresses. You can enter an email address (for example: example-email@example.com), domain name (for example: example.com) or several symbols from the email address (for example: exa). |
Recipient email |
|
Text for searching recipient email addresses. |
Subject |
|
Message header search text |
Rule name |
|
Name of the rule that was applied when processing the message. |
Action |
|
Action that was performed on the message. |
Sender IP |
|
Search text for the IP address from which the message was sent. You can enter the address in IPv4 or IPv6 format. |
Application message ID |
|
Unique identifier assigned to the message by the program. |
SMTP message ID |
|
Message ID on the mail server. This ID can be used for finding an event when responding to a user request, if you have configured an ID to be added to notifications about rejected messages. |
Node |
|
Cluster node that processed the message. |
Scan statuses In the drop-down list on the right, select one of the following detection technologies:
|
|
Click the Select statuses field. In the drop-down list, select the check boxes next to the statuses that you want to use to filter events. Statuses can be combined with the logical "OR" operator. The set of displayed statuses depends on the selected technology. |
You can enter multiple filtering criteria. To add another criterion, click Add filter.
The table of events is displayed in accordance with filtering criteria.
The table displays information about the last 5000 events. If more than 5000 events match the filtering criteria, consider refining the search criteria.
Page top