27.11.2012 Views

IronPort - daily management guide - AsyncOS 7.6.1

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Log Types<br />

Timestamps in Log Files<br />

5-8<br />

Using <strong>IronPort</strong> Bounce Logs, page 5-17<br />

Using <strong>IronPort</strong> Status Logs, page 5-19<br />

Using <strong>IronPort</strong> Domain Debug Logs, page 5-22<br />

Using <strong>IronPort</strong> Injection Debug Logs, page 5-23<br />

Using <strong>IronPort</strong> System Logs, page 5-24<br />

Using <strong>IronPort</strong> CLI Audit Logs, page 5-25<br />

Using <strong>IronPort</strong> FTP Server Logs, page 5-26<br />

Using <strong>IronPort</strong> HTTP Logs, page 5-27<br />

Using <strong>IronPort</strong> NTP Logs, page 5-28<br />

Using Scanning Logs, page 5-28<br />

Using <strong>IronPort</strong> Anti-Spam Logs, page 5-29<br />

Using <strong>IronPort</strong> Anti-Virus Logs, page 5-29<br />

Using <strong>IronPort</strong> Spam Quarantine Logs, page 5-30<br />

Using <strong>IronPort</strong> Spam Quarantine GUI Logs, page 5-30<br />

Using <strong>IronPort</strong> LDAP Debug Logs, page 5-31<br />

Using Safelist/Blocklist Logs, page 5-32<br />

Using Reporting Logs, page 5-33<br />

Using Reporting Query Logs, page 5-34<br />

Using Updater Logs, page 5-35<br />

Understanding Tracking Logs, page 5-36<br />

Using Authentication Logs, page 5-37<br />

Cisco <strong>IronPort</strong> <strong>AsyncOS</strong> 7.6 for Email Daily Management Guide<br />

Chapter 5 Logging<br />

The following log files include the begin and end date of the log itself, the version of <strong>AsyncOS</strong>, and the<br />

GMT offset (provided in seconds, and only at the beginning of the log):<br />

Anti-Virus log<br />

LDAP log<br />

System log<br />

Mail log<br />

Using <strong>IronPort</strong> Text Mail Logs<br />

They contain details of email receiving, email delivery and bounces. Status information is also written<br />

to the mail log every minute. These logs are a useful source of information to understand delivery of<br />

specific messages and to analyze system performance.<br />

These logs do not require any special configuration. However, you must configure the system properly<br />

to view attachment names, and attachment names may not always be logged. For information, see<br />

Enabling and Disabling Local Message Tracking, page 3-2 and Tracking Service Overview, page 3-1.<br />

OL-25138-01

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!