01.01.2013 Views

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8<br />

Monitoring<br />

Logging<br />

• Found viruses log — Stores log files that record the names of viruses and other malware that were<br />

found to infect requested objects<br />

The log also records date and time, user name, IP address of the client a request was sent from,<br />

requested URL.<br />

• Incident logs — A number of logs for storing log files that record incidents concerning various<br />

functions, such as licensing, monitoring, or updates<br />

To these default logs, you can add logs that you have created yourself.<br />

View log files<br />

The log files that exist on the appliance can be viewed on its user interface.<br />

To view log files on the appliance:<br />

1 Select the Troubleshooting top-level menu.<br />

2 On the appliances tree, go to the appliance you want to view log files for and select Log Files. A list<br />

of log file folders appears.<br />

3 Double-click the folder or subfolder with the log files you want to view. The folder opens to display its<br />

log files.<br />

4 Select the log file you want to view and, on the toolbar above the list, click View.<br />

Log file handling using rules<br />

When log files use rules, they have their entries written by events of those rules. If a logging rule<br />

applies, one event sets the parameter values that are recorded, another writes these values into a log<br />

file. The log for this file is specified by the settings of the write event. These settings include also<br />

options for configuring log file rotation, deletion, and pushing.<br />

So, when handling log files using rules, you need to take care of the following:<br />

• Logging rules — Rules including the criteria and events that write log file entries when the criteria<br />

are matched<br />

• Logging rule sets — Rule sets containing logging rules<br />

These rule sets are nested on the appliance in top-level rule sets known as log handlers. A Default<br />

log handler is provided after the initial setup.<br />

• Logging event settings — Settings that specify the log for the log files and measures, such as<br />

rotation, deletion, and pushing<br />

The log and the measures are handled by a particular module (or engine) on the appliance. By<br />

default, this is the File System Logging engine.<br />

If you want to use log files of your own, you need to configure all these items in an appropriate way.<br />

For more information, see Use self-configured log files.<br />

278 <strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> <strong>7.1.5</strong> <strong>Product</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!