475
Monitoring the security gateway
Monitoring log files
Opening, deleting, and backing up archived log files
You can open, delete, and back up log files older than 24 hours (or files that have been rolled over the
same day) using the Open Log button on the Event Logs tab. The number and size of the archived log
files depend on the configuration of the logging service.
Prerequisites
Complete the following task before beginning this procedure:
■
“Configuring the logging service”
Using the Open Archived Log File dialog box
From the Open Archived Log File dialog box, you can either open, delete or backup an archived log file.
To open archived log files
1
In the SGMI, in the left pane, under Monitors, click
Logs
.
2
In the right pane, on the Event Logs tab, click
Open Log
.
3
In the Open Archived Log File dialog box, select the log file for the day you want, and to open, click
OK
.
To delete an archived log file
1
In the SGMI, in the left pane, under Monitors, click
Logs
.
2
In the right pane, on the Event Logs tab, click
Open Log
.
3
In the Open Archived Log File dialog box, select the log file for the day you want to delete, and then
click
Delete
.
To back up an archived log file
1
In the SGMI, in the left pane, under Monitors, click
Logs
.
2
In the right pane, on the Event Logs tab, click
Open Log
.
3
In the Open Archived Log File dialog box, select the log file for the day you want to backup and then
click
Backup
.
4
In the Backup Log File dialog box, save the archived log file to the desired location.
Related Information
None.
Adding or removing Event Log table columns
You can add or remove Event log table columns to view more log event details.
The new table layout is retained during the current SGMI session. The default column layout is
displayed if you log off and then log back on.
Prerequisites
None.
To add or remove Event Log table columns
1
In the SGMI, in the left pane, under Monitors, click
Logs
.
2
To change the columns in the Event Log table, right-click an entry and select
Show Columns
.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...