Hp Secure Key Manager Manuel d'utilisateur Page 80

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 327
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 79
Log congurati
on procedures
Conguring log rotation
To congure log rotation:
1. Log in to the Management Console as an administrator with Logging access control.
2. Navigate to the Log Conguration page (Device > Log Conguration) and click the Rotation &
Syslog tab.
3. Select a log in the Rotation Schedule section and click Properties to access the Log Rotation
Properties section.
4. Click Edit.
5. Use the Rotation Schedule and Rotation Time elds to specify when the log will be rotated.
6. Specify the number of logs that will be maintained in the log archive using the Num Logs Archived
eld.
7. Enter a value in the Max Log File Size eld. When a log lereachesthissizeitisautomatically
rotated, regardless of the Rotation Schedule and Rotation Time settings.
8. Enter a transfer destination if you would like the rotated log moved off of the SKM.
9. Click Save.
Enablin
gsyslog
To enable syslog:
1. Log in to the Management Console as an administrator with Logging access control.
2. Navigate to the Log Conguration page (Device > Log Conguration) and click the Rotation &
Syslog
tab.
3. Select a log in the Syslog Settings section and click Edit.
4. Select Enable Syslog and enter the server IPs, ports, and syslog facility.
5. Click Save.
6. Repe
at steps 3, 4 and 5 to enable syslog for multiple logs.
Enabling signed logs
To enable signed logs:
1. Log in to the Management Console as an administrator with Logging access control.
2. Navigate to the Log Conguration page (Device > Log Conguration) and click the Log Signing tab.
3. Click Edit in the Log Settings section.
4. Select Sign Log for the log(s) you would like to be signed.
5. Click Save. From now on, the system will sign the selected logs with the log signing certicate
created when the SKM was initialized.
VerifyingasecurelogusingMicrosoftOutlook
To verify a secure log using Microsoft Outlook:
1. Move the log le off of the SKM or download it to a Windows machine.
80
Performing conguration and operation tasks
Vue de la page 79
1 2 ... 75 76 77 78 79 80 81 82 83 84 85 ... 326 327

Commentaires sur ces manuels

Pas de commentaire