Sophos Email Appliance syslog capabilities
Information about the syslog capabilities of the Sophos Email Appliance.
Syslog is a tool for sending log messages from a client system to a server or receiver. The logs can be used for auditing and analysis. Syslog uses a standard protocol, described by RFC 5424. The Sophos Email Appliance can be configured to send log messages to a syslog receiver, where the information can be collected and analyzed.
The Email Appliance can produce several kinds of logs. Each has an associated category that indicates what facility generated the log information, and a value that indicates the severity of the log message. The following table lists the appliance’s log types, and associated information:
|
|
Facility |
|
Severity |
|
---|---|---|---|---|---|
administrator audit | auth | 4 | Notice: normal but significant condition | 5 | Always logged when syslog is enabled. Provides information about system changes, authorizations and similar events. |
system status | auth | 4 | Notice: normal but significant condition | 5 | Optional. Provides information about system events such as reboots and upgrades. |
message policy | 2 | Informational: informational messages | 6 | Optional. Provides information about policy events that the appliance has been configured to log. | |
mail transfer agent | 2 | Informational: informational messages | 6 | Optional. Provides detail information about email messages sent or received by the appliance. |
The following sections provide a number of examples of log entries for each type of available log. These can be used to aid in configuring analysis and auditing software.
Administrator audit log examples
- A log entry showing a successful login attempt:
Jan 11 22:34:14 somehost admin-ui[24874]: [NOTICE] [192.0.2.143] admin/en: logged in with tz=America/Vancouver window=1280x811 screen=1280x1024 ua=Mozilla/5.0 (Windows; U;Windows NT 5.1; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 (.NET CLR 3.5.30729)
- A log entry showing internal variable changes:
Jan 11 03:36:54 somehost3 admin-ui[1652]: [NOTICE] [192.0.2.96] admin/en: config: option 'proxy_enabled' set to '1' (was '0')
- A log entry showing a policy being updated to a new setting:
Jan 11 03:57:11 somehost admin-ui[1200]: [NOTICE] [192.0.2.96] admin/en: policy: outbound virus action set to discard (was quarantine)
- A log entry showing an administrator performing a log search:
Jan 11 06:33:34 somehost admin-ui[27250]: [NOTICE] [192.0.2.96] admin/en: Log search: atime='2010-01-09T08:00:00' count='1000' sort='-time' timezone='America/Vancouver' to='tlsuser1@somehost2.example' ztime='2010-01-11T08:00:00'
- Logging out of the appliance’s admin interface:
Jan 11 22:32:39 esa10 admin-ui[24529]: [NOTICE] [192.0.2.125] admin/en: logged out
System status log example
- This example shows a selection of typical events that will be recorded in the system
status log:
Jan 11 03:35:15 somehost3 shutdown: start: system starting up Jan 11 03:38:08 somehost3 sophox-register[3350]: Updated license. Jan 11 03:38:18 somehost3 sea-upgrade[5274]: factory_probe: no updates available on http://tankrepo/repo/esa/projects/trident/freebsd/ Jan 11 03:46:43 somehost3 shutdown: reboot: UI: register/update Jan 11 03:47:43 somehost3 shutdown: reboot by root: UI: register/update Jan 11 22:21:27 somehost3 data-update: appliance failed to retrieve data updates from Sophos Jan 11 21:51:10 somehost3 sea-upgrade[99777]: download: no updates available on http://esa.sophos.com/es4000/delta Jan 11 04:29:39 somehost3 appliance-status[20828]: appliance status changed to error from ok <System fans> Jan 11 04:38:44 somehost3 appliance-status[26639]: appliance status changed to ok from warn Jan 11 05:26:28 somehost3 sea-upgrade[79970]: download: found update 1.127 Jan 11 05:26:28 somehost3 sea-upgrade[79970]: starting download: http://127.0.0.1/1/120/tank-1.127-n.tar.gz Jan 11 05:26:28 somehost3 sea-upgrade[79970]: finished download: http://127.0.0.1/1/120/tank-1.127-n.tar.gz
Message policy log examples
- A simple example of a message policy log entry, showing a message being quarantined:
Jan 11 20:26:14 q=4B4B8966_98410_2_1 f=<junk@example.com>: t=<tester2@host.example> Rule=Quarantine type=Legit b=ok action=quarantine inbound S=one fur= r=192.0.2.107 tm=0.22 a=d/eom
- A more complex entry, showing a spam message being processed:
Jan 11 20:11:36 q=4B4B85F4_90724_2_1 f=<junk@example.com>: t=<tester1@host.example> b=ok action=deliver h=BASE64_ENC_TEXT h=DATE_IN_PAST_96_XX h=FROM_NAME_ONE_WORD h=MIME_TEXT_ONLY_MP_MIXED h=SUPERLONG_LINE h=BODY_SIZE_10000_PLUS h=TO_NO_NAME h=__BAT_BOUNDARY h=__CT h=__CTYPE_HAS_BOUNDARY h=__CTYPE_MULTIPART h=__CTYPE_MULTIPART_MIXED h=__HAS_MSGID h=__MIME_TEXT_ONLY h=__MIME_VERSION h=__MOZILLA_MSGID h=__SANE_MSGID h=__STOCK_PHRASE_6 h=__SXL_SIG_TIMEOUT h=__TO_MALFORMED_2 h=__USER_AGENT inbound S=?q?This_should_exceed p=0.112 fur= r=192.0.2.107 tm=4.11 a=a/eom
A mail transfer agent log example
- This is a selection from a the mail transfer log, showing an email message being
received:
Jan 11 22:06:52 somehost3 postfix/smtpd[26327]: connect from test.example[192.0.2.107] Jan 11 22:06:56 somehost3 postfix/smtpd[26327]: 3A3D12FE3F1C_B4BA100F: client=test.example[192.0.2.107] Jan 11 22:06:56 somehost3 postfix/cleanup[26434]: 3A3D12FE3F1C_B4BA100F: message-id=<200106290254.f5T2sEO19584@smtp1.example.com> Jan 11 22:06:56 somehost3 postfix/qmgr[2937]: 3A3D12FE3F1C_B4BA100F: from=<user@test.example>, size=16031, nrcpt=1 (queue active) Jan 11 22:06:56 somehost3 postfix/smtpd[26327]: disconnect from test.example[192.0.2.107]