Modifying the Subject Line of Policy – Generated Email Tracks

Article #ETM237B


Email Tracks can be assigned to TeleWall® Security Policy Rules so that appropriate personnel are automatically notified via email when a call matches a specific TeleWall® Security Policy Rule. This technical bulletin explains how to modify the default Subject line of TeleWall Security Policy email messages.

Note: This technical bulletin does not apply to System Event Tracks.

Versions Affected

TeleWall® Firewall v3.0-4.0

More Information

By default, the Subject field of TeleWall Security Policy email messages contains the following information:

·         The call disposition (whether the call was allowed or terminated)

·         The call type

·         The called and calling phone numbers

·         The number of the rule that fired

·         The name of the Security Policy containing the Rule

·         The Rule’s comment

For example, an email Subject might appear as follows:

“Allowed Call of Type Modem from 1(210)555-1212 to 1(210)555-1000 fired rule 8 of Policy MODEM WATCH: Allow and log all outbound modem calls.”

The subject and content of TeleWall Security Policy Email Tracks are defined by a file named, located in the ETM® Server installation directory. It is important to note that this file also determines Page, SNMP, and Real-Time Alert Track messages, so any changes you make to modify the email Subject field also apply to these other message types.

To change the Subject of TeleWall Security Policy email messages

1.       Open in a text editor. If you accepted the installation defaults, this file is located at the following path:

Windows—C:\Program Files\SecureLogix\ETM\

Solaris— /opt/SecureLogix/ETM/

2.       The email Subject is defined by the section of the file that reads as follows:


{7} Call of Type {6} From {2} to {3} fired rule {1} of policy {0}: {8}

Notice the indexing key at the top of the file, which identifies the meaning of each of the numbers within the curly brackets. For example, {2} represents the calling phone number, and {3} represents the called number. When the email message is generated, the actual values in the call data are inserted in the locations designated by these placeholders. That is, {2} is replaced with the actual calling number, {3} is replaced with the called number, and so forth. The key at the bottom of the file determines the terminology used for the direction, call type, and call disposition.

3.       To modify the email Subject line, delete components that you do not want to include from the Short Description, then save the file. For example, if you do not want the called and calling phone numbers to appear in the Subject, delete the text that is shown underlined and italicized in the example below.


{7} Call of Type {6} From {2} to {3} fired rule {1} of policy {0}: {8}

The file section then appears as follows:


{7} Call of Type {6} fired rule {1} of policy {0}: {8}

Based on this section, the sample Subject line now appears as follows:

“Allowed Call of Type Modem fired rule 8 of Policy MODEM WATCH: Allow and log all outbound modem calls.”

4.       Restart the ETM Server for the change to take effect.

Note: You can also change the terminology used for the direction, call type, and call disposition by editing the values following the EQUAL SIGNs (=) in the terminology key at the bottom of the file. DO NOT modify the values preceding the EQUAL SIGNs.

Last Update: 04/04/02

SecureLogix Corporation

13750 San Pedro, Suite 230 • San Antonio, Texas 78232 • (210) 402-9669 •

Support (877) SLC-4HELP • EMAIL •

ETM, SecureLogix, SecureLogix Corporation, TeleWatch Secure, TWSA, the ETM Emblem, the SecureLogix Diamond Emblem, and the ETM Application Suite Emblems are trademarks or registered trademarks of SecureLogix Corporation in the U.S.A. and other countries. All other trademarks mentioned herein are believed to be trademarks of their respective owners.

© Copyright 2002 SecureLogix Corporation. All Rights Reserved.
U.S. Patents No. US 6,249,575 B1 and US 6,320,948 B1. U.S. and Foreign Patents Pending.

This product includes:
Data Encryption Standard Software developed by Eric Young (
© Copyright 1995 Eric Young. All Rights Reserved.
Style Report software owned and licensed exclusively by InetSoft Technology Corp.
© Copyright 1996-2000 InetSoft Technology Corp. All Rights Reserved.

Published on December 3, 2002  |  Updated on August 9, 2021

Related Articles

Need Support?
Can't find the answer you're looking for? Don't worry we're here to help!