470
Monitoring the security gateway
Monitoring log files
To unlock user accounts
1
In the SGMI, in the left pane, under Monitors, click
Status
.
2
In the right pane, on the Clientless VPN Failed Logons tab, in the Locked user accounts list, all
locked out users are displayed.
3
Select a user account, and then click
Unlock
.
Related Information
None.
Monitoring log files
The Monitors section of the SGMI includes Logs, which has two tabs that let you monitor current
information about event log messages and IDS/IPS alerts:
■
The Event Logs window, which shows detailed information about all connections and connection
attempts.
■
IDS/IPS Alerts window, which shows detailed information about IDS/IPS alerts.
You perform the following tasks to monitor event log files:
■
Configuring the logging service
■
Viewing, copying, and printing current log files
■
■
Opening, deleting, and backing up archived log files
■
Adding or removing Event Log table columns
■
■
Displaying selected log messages
■
Configuring the logging service
For the security gateway, the logging service lets you configure settings that affect how the security
gateway collects information on all system events, connections, and connection attempts.
For example, using the Service Parameters for Log Properties dialog box, you can configure whether
the local log files for each managed security gateway are saved in binary (default) or text format. You
can also specify the maximum size of the log file and the frequency (in hours) with which it is saved.
Prerequisites
None.
To configure the logging service
1
In the SGMI, in the left pane, under System, click
Configuration
.
2
In the right pane, on the Services tab, in the Services table, check
Logging Service
.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...