Viewing ES Logs
247
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
Viewing ES Logs
Introduction
Enterprise Scanner records many of its actions in log files that you can view in the
Proventia Manager. ES logs contain actions that are related only to Enterprise Scanner,
excluding actions related to system activities. This topic describes the most useful ES logs.
Log file descriptions
The following table describes the ES log files:
Procedure
To view the ES logs:
1. On the navigation pane in Proventia Manager, select
Logs
, and then select
ES Logs
.
2. Select a log to view in the
Select Log
list.
Log Name (
file_name
)
Description
Trace Log (
CrmTrace.log
)
The log for the CRM that handles interaction with SiteProtector’s
Sensor Services and Event Services components. The log file
includes information about the following:
•
interaction with the Sensor and Event services
•
ESM startup
•
other operational details
Note:
This log file is created as
\tmp\issCSFTrace.tmp
; the
log file name is changed about half way through the initialization
of the CRM.
Interface Log (
crm-esm.log
)
The interface log, which details communications between the
CRM and the ESM.
Engine Log (
iss-esm.log
)
The ESM blade log. This log file contains low-level information
related to Common Assessment Module (CAM) sessions that are
executed by discovery and assessment tasks, including all
exception, info, and trace messages produced by CAM.
Scheduler Log
(
iss-esmScheduler.log
)
The log file for the Enterprise Scanner task scheduler includes
high-level information about the following:
•
interactions with the Asset Service and Task Service
•
the scheduling and running of background and ad hoc
discovery and assessment tasks
Table 94:
ES log descriptions
Summary of Contents for Proventia Network Enterprise
Page 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Page 8: ...8 Contents IBM Internet Security Systems ...
Page 14: ...Preface 14 IBM Internet Security Systems ...
Page 15: ...Part I Getting Started ...
Page 16: ......
Page 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Page 70: ......
Page 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Page 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Page 121: ...Part III Scanning ...
Page 122: ......
Page 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Page 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Page 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Page 165: ...Part IV Analysis Tracking and Remediation ...
Page 166: ......
Page 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Page 197: ...Part V Maintenance ...
Page 198: ......
Page 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Page 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Page 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Page 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Page 258: ...Glossary 258 IBM Internet Security Systems ...
Page 268: ......