CHAPTER 9
239
The Logging Directory
The logging directory is defined when installing the application. It can be
changed by clicking
Browse
.
Action log
The action log is collecting data about the actions done by the firewall
continuously. It is a normal text file with the maximum size of 10 MB, and
can be viewed with any text editing application capable of reading large
files. The action log file can be cleared and removed anytime, so it is easy
to restart into a new file if the file size gets too big. You can view the action
log by clicking
Show Action Log
on the
Logging
page.
Practical examples of how to read the action log:
Change of firewall policy, for example a security level change:
07/16/03 15:48:01,success,general,daemon,Policy file has been
reloaded.
Opening a local connection, inbound or outbound:
The fields are:
Home users can use the packet logging to record evidence of
intrusion attempts.
The action log uses the standard unix syslog format
1
2
3
4
5
6
7
8
9
10
07/16/03
16:54:41
info
appl control
C:\WINNT\system32\services.exe
allow
send
17
10.128.128.14
137
1.
Date
2.
Time
3.
Type
4.
Internal Reason
5.
Name of application
6.
Application control action
7.
Network action
8.
Protocol
9.
Remote ip
10. Remote port
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...