This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

LOG of global size limit setup

I have setup a size limit inbound mail to 30mb.

This rule works but i doesn't find the relativ log.

Where can i find this?

 

Thanks.

 

 



This thread was automatically locked due to age.
Parents
  • In the Additional Actions section, you can configure extra actions.

    Select Add a log entry if you want events that trigger this policy rule to be logged to the message policy log. Events are displayed in the log as key/value pairs with the form user_<key>=<value>, where user_ is added to beginning of the assigned key. The message policy log is accessible through either FTP backup or syslog.

    • Select Add or Replace to configure whether a log entry will be added or replaced.
      Note:
      If you select Add, there can be multiple entries of the same key, but with different values. For example, if multiple policies trigger, entries similar to the following will appear:
      user_policy=strip_suspect_attachment
      user_policy=quarantine_for_spam

      If you select Replace, and multiple log entries with the same key are present, all of them will be replaced.

    • In the Key text box, enter the key that you want to assign to this log entry.
      Note: Keys will be logged with the prefix user_. Keys may only contain alphanumeric characters, or the underscore ("_") character.
    • In the Value text box, enter the value that you want assigned as the key for this log entry.

    You can choose arbitrary key/value pairs.

     

     

    Aiman Ansari

Reply
  • In the Additional Actions section, you can configure extra actions.

    Select Add a log entry if you want events that trigger this policy rule to be logged to the message policy log. Events are displayed in the log as key/value pairs with the form user_<key>=<value>, where user_ is added to beginning of the assigned key. The message policy log is accessible through either FTP backup or syslog.

    • Select Add or Replace to configure whether a log entry will be added or replaced.
      Note:
      If you select Add, there can be multiple entries of the same key, but with different values. For example, if multiple policies trigger, entries similar to the following will appear:
      user_policy=strip_suspect_attachment
      user_policy=quarantine_for_spam

      If you select Replace, and multiple log entries with the same key are present, all of them will be replaced.

    • In the Key text box, enter the key that you want to assign to this log entry.
      Note: Keys will be logged with the prefix user_. Keys may only contain alphanumeric characters, or the underscore ("_") character.
    • In the Value text box, enter the value that you want assigned as the key for this log entry.

    You can choose arbitrary key/value pairs.

     

     

    Aiman Ansari

Children
No Data