Next Topic

Previous Topic

Book Contents

Log Settings: Security

The Log Settings page specifies the number of days to keep security protection log data for machine IDs licensed to use Endpoint Security. Certain machines, such as web servers, may warrant maintaining a longer history of virus attacks then other types of machines.

The list of machine IDs you can select depends on the machine ID / group ID filter. To display on this page, machine IDs must have the Endpoint Security client software installed on the managed machine using the Security > Install/Remove page.

Apply Configuration

Click Apply Configuration to apply the number of days specified in the <N> days to keep log entries field to selected machine IDs.

<N> days to keep log entries

Enter the number of days to maintain security protection log data.

Check-in status

These icons indicate the agent check-in status of each managed machine. Hovering the cursor over a check-in icon displays the agent quick view window.

Online but waiting for first audit to complete

Agent online

Agent online and user currently logged on.

Agent online and user currently logged on, but user not active for 10 minutes

Agent is currently offline

Agent has never checked in

Agent is online but remote control has been disabled

The agent has been suspended

Note: Different icon images display when this add-on module is installed in a 5.x VSA. The Remote Control > Control Machine page displays a legend of the specific icons your VSA system is using.

(Select All Checkbox)

Click this checkbox to select all rows in the paging area. If checked, click this checkbox to unselect all rows in the paging area.

Machine.Group ID

The list of Machine.Group IDs displayed is based on the Machine ID / Group ID filter and the machine groups the user is authorized to see using System > User Security > Scopes.

Log Days Before Expiration

Shows the number of days security protection log data is maintained for a machine ID.