Logging
You can enable logging in an MMS profile to write event log messages when the MMS profile options that you have enabled perform an action. For example, if you enable MMS antivirus protection, you could also use the MMS profile logging options to write an event log message every time a virus is detected.
You must first configure how the unit stores log messages so that you can then record these logs messages. For more information, see the FortiOS Handbook Logging and Reporting guide.
Logging
MMS–Antivirus If antivirus settings are enabled for this MMS profile, select the following options to record Antivirus Log messages.
Viruses Record a log message when this MMS profile detects a virus.
Blocked Files Record a log message when antivirus file filtering enabled in this MMS profile blocks a file.
Intercepted Files Record a log message when this MMS profile intercepts a file.
Oversized Files/E- mails Record a log message when this MMS profile encounters an oversized file or email message. Oversized files and email messages cannot be scanned for viruses.
MMS Scanning If MMS scanning settings are enabled for this MMS profile, select the fol- lowing options to record Email Filter Log messages.
Logging
Notification Messages Select to log the number of MMS notification messages sent.
Bulk Messages Select to log MMS Bulk AntiSpam events. You must also select which pro- tocols to write log messages for in the MMS bulk email filtering part of the MMS profile.
Carrier Endpoint Filter
Block
MMS Content Check- sumSelect to log MMS carrier endpoint filter events, such as MSISDN fil- tering. Select to log MMS content checksum activity.
Content Block Select to log content blocking events.
MMS Content Checksum
The MMS Content Checksum menu allows you to configure content checksum lists.
Configure MMS content checksum lists in Security Profiles > MMS Content Checksum using the following table.
MMS Content Checksum
Lists each individual content checksum list that you created. On this page, you can edit, delete or create a content checksum list.
Create New
Creates a new MMS content checksum list. When you select Create New, you are automatically redirected to the New List. This page provides a name field and comment field. You must enter a name to go to MMS Con- tent Checksum Settings page.
Edit Modifies settings to a MMS content checksum. When you select Edit, you are automatically redirected to the MMS Content Checksum Settings page.
Removes an MMS content checksum from the page.
Delete
To remove multiple content checksum lists from within the list, on the MMS Content Checksum page, in each of the rows of the content checksum lists you want removed, select the check box and then select Delete.
To remove all content checksum lists from list, on the MMS Content Check- sum page, select the check box in the check box column and then select Delete.
Name The name of the MMS content checksum list that you created.
# Entries The number of checksums that are included in the content checksum list.
MMS Profiles The MMS profile or profiles that have the MMS content checksum list applied. For example if two different MMS profiles use this content check- sum list, they will both be listed here.
Comments A description given to the MMS content checksum.
Ref. Displays the number of times the object is referenced to other objects. For example, av_1 profile is applied to a security policy; on the Profile page (Security Profiles > AntiVirus > Profiles), 1 appears in Ref. .
To view the location of the referenced object, select the number in Ref., and the Object Usage window appears displaying the various locations of the referenced object.
To view more information about how the object is being used, use one of the following icons that is avialable within the Object Usage window:
- View the list page for these objects – automatically redirects you to the list page where the object is referenced at.
- Edit this object – modifies settings within that particular setting that the object is referenced with. For example, av_1 profile is referenced with a security policy and so, when this icon is selected, the user is redirected to the Edit Policy page.
- View the details for this object – table, similar to the log viewer table, contains information about what settings are configured within that par- ticular setting that the object is referenced with. For example, av_1 profile is referenced with a security policy, and that security policy’s settings appear within the table.