CHAPTER 5
129
Administering F-Secure Anti-Virus for Internet Gateways
5.4.2
Access Log
F-Secure Anti-Virus for Internet Gateways logs all requests in the Access
Log.
You can specify the string format in the Access Log by changing the
Access log format
setting.
The default access log format:
%t \"%r\" %>s %b %{FSFILTER::scanresult}n
%{FSFILTER::action}n %{FSFILTER::infection}n
%{FSFILTER::scansrc}n
The format string of access.log can contain any literal characters. Use
\n
to represent a line change and
\t
to represent a tabulator. For a list of
variables that you can use in the access log, see “
.
You can open the Access Log from the F-Secure Internet Gatekeeper
Web Console by selecting the
Anti-Virus for Internet Gateways
tab and
clicking the
Show Access Log
button.
For more information on the Logging settings, see “
5.4.3
Logfile.log
Logfile.log
is maintained by F-Secure Management Agent, and it contains
all the alerts generated by F-Secure components installed on the host.
Logfile.log
can be found on all hosts running F-Secure Management
Agent.
F-Secure Management Agent uses
Logfile.log
(in
%Program Files%/
F-Secure/Common
directory) to log all the alerts on the host.
Logfile.log
can be viewed with any text editor, for example Windows Notepad.
You can open the
Logfile.log
from the F-Secure Internet Gatekeeper Web
Console Home page by clicking the
Show F-Secure Log
button.
To use quotation marks and backslashes, type one backslash
before them. For example, \”.
Summary of Contents for INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Page 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Page 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Page 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Page 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Page 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Page 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Page 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Page 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Page 414: ...414...