What information do the individual log files provide?

Article:HOWTO66172  |  Created: 2012-01-31  |  Updated: 2012-02-24  |  Article URL http://www.symantec.com/docs/HOWTO66172
Article Type
How To



The System Logs page lists and time stamps each action a PGP Universal Server takes. Analysis of the logs can help you determine how your configuration of the server and the policies you have established are affecting your email.

The list shows the most recent events at the top.

The list can be filtered by what actions were logged, date the action occurred, time the action occurred, and type of message (Information, Warnings, Notices, and Errors). You can filter on the following types of actions:

  • Administration logs are audit logs of configuration changes made through the administration console interface.
  • Backup logs provide information about events such as data and configuration restoration, and automatic and manual backups.
  • Client logs display messages about connections made from client software. For example, PGP Whole Disk Encryption event notices include device detection, disk encryption or decryption, device status changes, errors during events, and WDRT use or creation.
  • Cluster logs include messages about cluster join events and data replication notices.
  • Data Layer logs provide information on the data layer service, which is part of the system that sits between the PGP Universal Server database and the rest of the code.
  • Groups logs provide information on the group manager service.
  • Ignition Key logs record events such as adding and removing ignition keys and using ignition keys to unlock the server.
  • Mail logs record mail proxy activities such as PGP Universal Server finding recipient keys, IMAP connections, and the starting and stopping of mail services.
  • Postfix logs display events associated with sending mail messages.
  • RDD logs provide information about events associated with the PGP RDD feature, including viewing the hardware recovery passphrase.
  • Update logs provide information about software-update specific actions.
  • Verified Directory logs include information about events such as user submission of keys and key-verification email.
  • Web Messenger logs display events such as users logging in and out of the service and messages being sent.

You can also search the log and save a copy of the log as a text file at any time.



Article URL http://www.symantec.com/docs/HOWTO66172


Terms of use for this information are found in Legal Notices