|Subject:||Intrusion Detection Logs|
|Creation date:||12/28/20 11:18 AM|
|Last modified on:||12/28/20 11:39 AM|
The image above is a snippet from one of the intrusion detection logs: AuthTerminate.log, ConnTerminate.log, FromTerminate.log, HelloTerminate.log, rcptTerminate.log, TimeoutTerminate.log and SMTPError.log.
Any one of these logs will look similar to the with the exception of the third column.
|1||IP address of the sender.|
|2||Timestamp in Java epoch format.|
|3||Event ID - this is for internal use only.|
Do you have a helpful tip related to this document that you'd like to share with other users?