Hp Secure Key Manager User Manual Page 250

  • Download
  • Add to my manuals
  • Print
  • Page
    / 352
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 249
Figure 140 Viewing the Activity Log Settings section
The following table describes the components of the Activity Log Settings section.
Table 122 Activity Log Settings section components
DescriptionComponent
There are two possible levels for the Activity Log:
Normal: All requests received by the KMS Server are recorded in the log. This is the
default log level.
Low: All requests received by the KMS Server, except for successful cryptographic
requests, are recorded in the log.
Log entries include the request type, request details (such as key name), and indicate if
the request was successful.
IMPORTANT:
Setting the log level to Low may put the SKM out of compliance with the Payment
Card Industry (PCI) data security standard for maintaining an audit trail of all key
accesses.
Log Level
Click Edit to edit the Activity Log settings.Edit
Log Viewer page
The Log Viewer page enables you to view and download logs. This page contains the following
sections:
System Log
Audit Log
Activity Log
Client Event Log
System Log
The System Log contains a record of all system events, such as:
Service starts, stops, and restarts.
SNMP traps.
Hardware failures.
Successful or failed cluster replication and synchronization.
Failed log transfers.
License errors.
Using the Management Console250
Page view 249
1 2 ... 245 246 247 248 249 250 251 252 253 254 255 ... 351 352

Comments to this Manuals

No comments