Log Settings: SecurityThe Log Settings page specifies the number of days to keep security protection log data for machine IDs licensed to use Endpoint Security. Certain machines, such as web servers, may warrant maintaining a longer history of virus attacks then other types of machines. The list of machine IDs you can select depends on the machine ID / group ID filter. To display on this page, machine IDs must have the Endpoint Security client software installed on the managed machine using the Security > Install/Remove page. Apply Configuration Click Apply Configuration to apply the number of days specified in the <N> days to keep log entries field to selected machine IDs. <N> days to keep log entries Enter the number of days to maintain security protection log data. Check-in status These icons indicate the agent check-in status of each managed machine. Hovering the cursor over a check-in icon displays the agent quick view window.
Note: Different icon images display when this add-on module is installed in a 5.x VSA. The Remote Control > Control Machine page displays a legend of the specific icons your VSA system is using. (Select All Checkbox) Click this checkbox to select all rows in the paging area. If checked, click this checkbox to unselect all rows in the paging area. Machine.Group ID The list of Machine.Group IDs displayed is based on the Machine ID / Group ID filter and the machine groups the user is authorized to see using System > User Security > Scopes. Log Days Before Expiration Shows the number of days security protection log data is maintained for a machine ID. | |||
Topic 2947: Send Feedback. Download a PDF of this online book from the first topic in the table of contents. Print this topic. |