Cisco Cisco Email Security Appliance C370D Guia Do Utilizador
39-6
User Guide for AsyncOS 10.0 for Cisco Email Security Appliances
Chapter 39 Logging
Overview
Log Retrieval Methods
Log files can be retrieved based upon one of the following file transfer protocols. You set the protocol
while creating or editing the log subscription in the GUI or via the
while creating or editing the log subscription in the GUI or via the
logconfig
command during the log
subscription process.
Note
When using a Log Push method on a particular log, that log will be locally unavailable for
troubleshooting or searching via the CLI.
troubleshooting or searching via the CLI.
AMP Engine
Logs
Logs
•
•
•
AMP Archive
•
Scanning Logs
•
•
•
•
Spam
Quarantine
Quarantine
•
•
•
Spam
Quarantine GUI
Quarantine GUI
•
•
•
Safe/Block Lists
Logs
Logs
•
•
•
Reporting Logs
•
•
•
Reporting Query
Logs
Logs
•
•
•
Updater Logs
•
Tracking Logs
•
•
•
•
•
•
•
•
Authentication
Logs
Logs
•
•
Configuration
History Logs
History Logs
•
•
•
API Logs
•
•
Table 39-2
Log Type Comparison (continued)
Contains
Tr
ansactional
Stateless
Recorded as text
Recorded as mbox file
Recorded as binary
Periodic Status
Information
M
e
ssage R
e
ceiving
In
for
m
ation
Del
ivery Information
Individu
al Ha
rd
Bounc
e
s
Individu
al Soft Bounces
Injection S
M
TP
Conversati
on
Hea
d
er Logging
Del
ivery SMTP
Conversatio
n
Configuration Information