Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1212
 
39-6
User Guide for AsyncOS 10.0 for Cisco Email Security Appliances
 
Chapter 39      Logging
  Overview
Log Retrieval Methods
Log files can be retrieved based upon one of the following file transfer protocols. You set the protocol 
while creating or editing the log subscription in the GUI or via the 
logconfig
 command during the log 
subscription process. 
Note
When using a Log Push method on a particular log, that log will be locally unavailable for 
troubleshooting or searching via the CLI. 
AMP Engine 
Logs
AMP Archive
Scanning Logs
Spam 
Quarantine
Spam 
Quarantine GUI
Safe/Block Lists 
Logs
Reporting Logs
Reporting Query 
Logs
Updater Logs
Tracking Logs
Authentication 
Logs
Configuration 
History Logs
API Logs
Table 39-2
Log Type Comparison  (continued)
Contains
Tr
ansactional
Stateless
Recorded as text
Recorded as mbox file
Recorded as binary
Periodic Status 
Information
M
e
ssage R
e
ceiving 
In
for
m
ation
Del
ivery Information
Individu
al Ha
rd 
Bounc
e
s
Individu
al Soft Bounces
Injection S
M
TP 
Conversati
on
Hea
d
er Logging
Del
ivery SMTP 
Conversatio
n
Configuration Information