12
Chapter 2: System
Viewing and Managing the System Logs
Network Storage System (NSS) Administrator Guide
Chapter
2
Viewing and Managing the System Logs
The NSS captures various types of information into log files, such as user access details. The logs can
be stored locally or sent to a remote server on the network. Since local space allocated for log files is
limited, the logs are overwritten once the space is filled. Each new event overwrites the oldest event
recorded in the file.
To work with the log files:
1. From the
Manager Menu
, click
System
Logs.
The
System Logs
page appears.
2. You can view, download, or delete any of the following types of log files:
•
Admin:
A full list of time-stamped actions that were initiated through the NSS configuration
interface.
•
Web Access:
This log displays IP addresses of the systems that accessed the NSS
configuration interface and the date and time of the authentication requests. This information
helps you detect unauthorized attempts to access the NSS configuration interface.
•
CIFS Sharing:
A time-stamped event log of events initiated by users accessing shares through
CIFS.
•
FTP Access:
A time-stamped log of FTP actions, including user logins, file transfers, and user
logouts.