If logging of audit events and modified settings is enabled in Event Log settings, when settings in the Settings → Protection section are edited, detailed information about the changes is recorded in an Audit Log event.
For each modified tab of the Protection section, a separate event is displayed in the Audit Log on the Audit tab.
The following table shows how the settings in the Protection section are coded in an Audit Log record.
Codes of settings from the Protection → Anti-Virus section in the audit event record
Setting in the Protection → Anti-Virus section |
Code in the audit event record |
Examples |
---|---|---|
Use Anti-Virus |
Possible values:
|
Settings modified:
|
Maximum scanning time (s) |
|
|
Maximum scanned level of archives |
|
|
Use heuristic analysis |
Possible values:
|
|
Heuristic analysis level |
Possible values:
|
|
Some legitimate applications |
Possible values:
|
Codes of settings from the Protection → Link scanning section in the audit event record
Setting in the Protection → Link scanning section |
Code in the audit event record |
Examples |
Scan links |
Possible values:
|
Settings modified:
|
Maximum scanning time (s) |
|
|
Adware links |
Possible values:
|
|
Links related to some legitimate applications |
mlf_settings.exclude_other_detect Possible values:
|
Codes of settings from the Protection → Anti-Spam section in the audit event record
Setting in the Protection → Anti-Spam section |
Code in the audit event record |
Examples |
Use Anti-Spam |
|
Settings modified:
|
Maximum scanning time (s) |
|
|
Use Moebius |
|
|
Protection against AD spoofing |
|
|
Group LDAP: distinguishedName |
|
|
IP and domain reputation |
|
|
Use Anti-Spam Quarantine |
|
|
Maximum Quarantine duration (s) |
|
|
Maximum number of messages |
|
|
Maximum Quarantine size (MB) |
|
Codes of settings from the Protection → Anti-Phishing section in the audit event record
Setting in the Protection → Anti-Phishing section |
Code in the audit event record |
Examples |
Use Anti-Phishing |
Possible values:
|
Settings modified:
|
Maximum scanning time (s) |
|
Codes of settings from the Protection → Content Filtering section in the audit event record
Setting in the Protection → Content Filtering section |
Code in the audit event record |
Examples |
Use Content Filtering |
Possible values:
|
Settings modified:
|
Maximum scanning time (s) |
|
|
Maximum scanned level of archives |
|
Codes of settings from the Protection → External services section in the audit event record
Setting in the Protection → External services section |
Code in the audit event record |
Examples |
KSN server timeout (s) |
|
Settings modified:
|
Allow connection to DNS server |
Possible values:
|
|
DNS server timeout (s) |
|
|
Use SPF |
Possible values:
|
|
Use DKIM |
Possible values:
|
|
Use DMARC |
Possible values:
|