Document information

Document ID: 5415
Subject: Intrusion Detection Logs
Creation date: 12/28/20 11:18 AM
Last modified on: 12/28/20 11:39 AM


Intrusion Detection Logs

Intrusion Detection log snippet

The image above is a snippet from one of the intrusion detection logs: AuthTerminate.log, ConnTerminate.log, FromTerminate.log, HelloTerminate.log, rcptTerminate.log, TimeoutTerminate.log and SMTPError.log.

Any one of these logs will look similar to the with the exception of the third column.

Column # Description
1 IP address of the sender.
2 Timestamp in Java epoch format.
3 Event ID - this is for internal use only.




Add a comment to this document

Do you have a helpful tip related to this document that you'd like to share with other users?

Important: This area is reserved for useful tips. Therefore, do not post questions here. Instead, use our public forums to post questions.