LogLogic Blue Coat ProxySG Log Configuration Guide

Size: px
Start display at page:

Download "LogLogic Blue Coat ProxySG Log Configuration Guide"

Transcription

1 LogLogic Blue Coat ProxySG Log Configuration Guide Document Release: September 2011 Part Number: LL ELS This manual supports LogLogic Blue Coat ProxySG Release 1.0 and later, and LogLogic Software Release 5.1 and later until replaced by a new edition.

2 2011 LogLogic, Inc. Proprietary Information Trademarks This document contains proprietary and confidential information of LogLogic, Inc. and its licensors. In accordance with the license, this document may not be copied, disclosed, modified, transmitted, or translated except as permitted in writing by LogLogic, Inc. LogLogic and the LogLogic logo are trademarks or registered trademarks of LogLogic, Inc. in the United States and/or foreign countries. All other company or product names are trademarks or registered trademarks of their respective owners. Notice The information contained in this document is subject to change at any time without notice. All warranties with respect to the software and accompanying documentation are set our exclusively in the Software License Agreement or in the Product Purchase Agreement that covers the documentation. LogLogic, Inc. 110 Rose Orchard Way, Suite 200 San Jose, CA Tel: Fax: U.S. Toll Free:

3 Contents Preface About This Guide Technical Support Documentation Support Conventions Chapter 1 Configuring Blue Coat ProxySG and the LogLogic Appliance Introduction to Blue Coat ProxySG Prerequisites Configuring Blue Coat ProxySG Enabling Access Logging Setting Up Access Log Uploads Enabling the LogLogic Appliance to Capture Log Data Configuring the LogLogic Appliance for File Collection Adding a Blue Coat ProxySG Device Importing the LogLogic SSL Certificate into the Blue Coat ProxySG Device Creating File Transfer Rules Verifying the Configuration Chapter 2 How LogLogic Supports Blue Coat ProxySG How LogLogic Captures Blue Coat ProxySG Log Data Supported Blue Coat ProxySG Log Data Formats LogLogic Real-Time Reports Chapter 3 Troubleshooting Verifying that Log Messages are Uploaded to the LogLogic Appliance Appendix A Blue Coat ProxySG Best Practices Blue Coat ProxySG Best Practices Optimized and Non-Optimized Report Fields Blue Coat Best Practices Reporting Package Appendix B Format Reference LogLogic Support for Blue Coat ProxySG Blue Coat ProxySG Log Configuration Guide 3

4 4 Blue Coat ProxySG Log Configuration Guide

5 Preface About This Guide The LogLogic Appliance-based solution lets you capture and manage log data from all types of log sources in your enterprise. The LogLogic support for Blue Coat ProxySG enables LogLogic Appliances to capture audit logs from machines running Blue Coat ProxySG. Once the logs are captured and parsed, you can generate reports and create alerts on Blue Coat ProxySG s operations. For more information on creating reports and alerts, see the LogLogic Users Guide and LogLogic Online Help. Technical Support LogLogic is committed to the success of our customers and to ensuring our products improve customers' ability to maintain secure, reliable networks. Although LogLogic products are easy to use and maintain, occasional assistance might be necessary. LogLogic provides timely and comprehensive customer support and technical assistance from highly knowledgeable, experienced engineers who can help you maximize the performance of your LogLogic Appliances. To reach LogLogic Customer Support: Telephone: Toll Free LOGS Local EMEA or APAC: + 44 (0) or +44 (0) support@loglogic.com You can also visit the LogLogic Support website at: When contacting Customer Support, be prepared to provide: Your name, address, phone number, and fax number Your company name and company address Your machine type and release version A description of the problem and the content of pertinent error messages (if any) Documentation Support Your feedback on LogLogic documentation is important to us. Send to DocComments@loglogic.com if you have questions or comments. Your comments will be reviewed and addressed by the LogLogic technical writing team. In your message, please indicate the software name and version you are using, as well as the title and document date of your documentation. Blue Coat ProxySG Log Configuration Guide 5

6 Conventions LogLogic documentation uses the following conventions to highlight code and command-line elements: A monospace font is used for programming elements (such as code fragments, objects, methods, parameters, and HTML tags) and system elements (such as filenames, directories, paths, and URLs). A monospace bold font is used to distinguish system prompts or screen output from user responses, as in this example: username: system home directory: home\app A monospace italic font is used for placeholders, which are general names that you replace with names specific to your site, as in this example: LogLogic_home_directory\upgrade\ Straight brackets signal options in command-line syntax. For example: ls [-AabCcdFfgiLlmnopqRrstux1] [-X attr] [path...] 6 Blue Coat ProxySG Log Configuration Guide

7 Chapter 1 Configuring Blue Coat ProxySG and the LogLogic Appliance This chapter describes the tasks you must perform to properly configure the LogLogic Appliance and Blue Coat ProxySG device to log web usage information such as HTTP traffic and Instant Messenger traffic. In addition, this chapter covers how to configure your systems to work with or without SSL authentication enabled. Introduction to Blue Coat ProxySG Prerequisites Configuring Blue Coat ProxySG Enabling the LogLogic Appliance to Capture Log Data Verifying the Configuration Introduction to Blue Coat ProxySG The Blue Coat ProxySG device is designed to integrate protection and control functions for Internet and intranet traffic without sacrificing performance and employee productivity. The device assists you in managing internet abuse by increasing security, limiting liability, and managing bandwidth usage. The LogLogic Appliance enables you to capture log data and report on critical points of your Blue Coat ProxySG internet access control solution including web cache usage. LogLogic provides an additional level of support by enabling you to generate reports and run searches on data to improve your ability to manage your Blue Coat ProxySG activity. Blue Coat ProxySG log data can be transferred to the LogLogic Appliance using one of the following methods: Continuous Uploads Data is uploaded directly to the Appliance using HTTP or HTTPS Periodic Uploads Data is uploaded to a Host Server and then transferred to the Appliance using FTP(S), SFTP, or SCP The configuration procedures for Blue Coat ProxySG and the LogLogic Appliance depend upon the method you select for your environment. For more information, see How LogLogic Captures Blue Coat ProxySG Log Data on page 27 and Defining the Upload Schedule on page 10. Blue Coat ProxySG Log Configuration Guide 7

8 Prerequisites Prior to configuring the Blue Coat ProxySG and LogLogic Appliance, ensure that you meet the following prerequisites: Blue Coat ProxySG installed Proper access permissions to make configuration changes LogLogic Appliance running Release 5.1 or later installed Administrative access on the LogLogic Appliance 3rd-party FTP, FTP(S), HTTP(S), CIFS, SCP, and/or SFTP server software installed for any platform that does not have these capabilities by default. For more information, see Configuring the LogLogic Appliance for File Collection on page 16. Note: If you are using a periodic upload schedule for Blue Coat ProxySG, you must configure a Host Server with the proper 3rd-party file transfer software. For more information, see Defining the Upload Schedule on page 10. Configuring Blue Coat ProxySG This section describes the configuration steps setting up general access logging on Blue Coat ProxySG. Enabling Access Logging Access logging enables you to monitor web traffic for your environment. The Blue Coat ProxySG device can be set up to generate real-time or schedule logs and reports. Once you set up the Blue Coat ProxySG device for access logging, you must enable it to send the logs to the LogLogic Appliance or a remote Host Server (e.g., SFTP Server). Note: The following steps walk you through the basic procedure for enabling access logging. For more information on setting up the Blue Coat ProxySG for access logging, see the Blue Coat ProxySG Product Documentation. 8 Blue Coat ProxySG Log Configuration Guide

9 To enable access logging: 1. In the Blue Coat Management Console navigation menu, select Access Logging > General. The Default Logging tab appears. This window might appear differently depending on the version of Blue Coat ProxySG you are running. Figure 1 Blue Coat ProxySG Access Logging > General > Default Logging Tab 2. Select the Enable Access Logging checkbox. 3. For each of the following protocols, click Edit, edit the entry as noted, then click OK. HTTP/HTTPS main FTP main SOCKS main TCP-Tunnel main ICP main Instant Messaging IM Windows Media streaming Real Media/QuickTime streaming Blue Coat ProxySG Log Configuration Guide 9

10 Setting Up Access Log Uploads After you enable access logging on Blue Coat ProxySG, you must define an upload schedule. The upload schedule dictates how and when logs are transferred to the LogLogic Appliance or a remote Host Server (e.g., SFTP Server). Defining the Upload Schedule The Blue Coat ProxySG device provides you the ability to upload messages continuously (near real-time) at schedule intervals (using a batch process). Messages sent continuously are available near real-time because of the processing time and network throughput between the Blue Coat ProxySG device and the LogLogic Appliance. If you intend to send messages continuously, then you must send the logs via HTTP or HTTPS using the HTTP Client. For more information, see Setting Up Logging for the HTTP Client on page 12. Messages sent periodically, such as hourly or once a day, are first batched, then saved to disk, and then uploaded as scheduled. If you intend to send messages periodically, then you can must send the logs via a 3rd-party FTP(S), SFTP, or SCP remote Host Server. Caution: If you choose to use periodic uploads, then you must ensure that the time between schedule uploads is greater than the amount of time it takes to upload the batch file containing multiple log entries. The batch file may become large over time, so uploading this file may not complete before the next scheduled upload. To define the upload schedule: 1. In the Blue Coat Management Console navigation menu, go to Access Logging > Logs > Upload Schedule tab. 10 Blue Coat ProxySG Log Configuration Guide

11 Figure 2 Blue Coat ProxySG Access Logging - Upload Schedule tab. 2. In the Log drop-down menu, select main. To enable continuous logging, go to Step 3. To enable periodic logging, go to Step Complete the following steps to modify the upload schedule settings for continuous logging: a. In the Upload type area, in the Upload access log section, select the continuously radio button. b. Set the timing for Wait between connection attempts and Time between keep-alive packets text fields. c. In the Rotate the log file section, set the scheduled time to Every 1 hour. LogLogic recommends that you specify the log rollover time to be greater than or equal to 1 hour so that the logs can be parsed and can be viewed in real-time reports. IMPORTANT! If you accumulated large legacy access log files, you must specify a large value in the Rotate the log file section to transfer files to your LogLogic Appliance. If the value selected is too small, then the access log feed is restarted before the transfer of the legacy data to the LogLogic Appliance is complete. d. Click Apply to save the changes. Blue Coat ProxySG Log Configuration Guide 11

12 2. Complete the following steps to modify the upload schedule settings for periodic logging: a. In the Upload type section, select the periodically radio button. Caution: If you select periodically, you do not see any logs from the Blue Coat ProxySG device on the Host Server (i.e., SFTP Server) until the time set in the Rotate the log file section. b. Set the timing for the Wait between connection attempts text field. c. In the Rotate the log file area, set the scheduled time to upload the log file. d. Click Apply to save the changes. The Blue Coat ProxySG device establishes a new connection when data is available. This connection is maintained for as long as the Blue Coat ProxySG device is sending data. The Blue Coat ProxySG access log data is parsed as soon as it is received by the LogLogic Appliance. Setting Up Logging for the HTTP Client Using HTTP Client for access log uploads enables the LogLogic Appliance to receive Blue Coat ProxySG messages near real-time (i.e., continuously). You can create an HTTP or an HTTPS upload client through the HTTP Client dialog. Note: If you are using a periodic upload schedule, then you do not need to configure the HTTP Client. To set up access logging for HTTP Client: 1. From the Blue Coat Management Console, click Access Logging > Logs. The Logs tab appears. 2. Click the Upload Client tab. 12 Blue Coat ProxySG Log Configuration Guide

13 Figure 3 Blue Coat ProxySG Access Logging - Upload Client Tab. 3. In the Log drop-down menu, select main. 4. In the Client Type drop-down menu, select HTTP Client. 5. Complete the following steps to configure the HTTP Client settings: a. In the Upload Client area, click Settings. The HTTP Client settings: Log main window appears. Blue Coat ProxySG Log Configuration Guide 13

14 Figure 4 Blue Coat ProxySG HTTP Client settings: Log main window b. In the HTTP Client settings: Log main window, set the following for HTTP server connection information: Settings for Select Primary HTTP Server from the drop-down menu Host IP address of the LogLogic Appliance. Note: If you select the Use secure connections (SSL) checkbox, the hostname must match the hostname in the certificate presented by the server. Port Use port number 4433 Path Directory path where the access log facility is uploaded to the server Username User name to log into the LogLogic Appliance Change Password Password to log into the LogLogic Appliance Filename Leave the default entry c. For SSL only, select the Use secure connections (SSL) checkbox. If you are not using SSL, proceed to Step 6. You must associate an SSL CA Certificate from the Host machine (i.e., LogLogic Appliance). For more information, see Importing the LogLogic SSL Certificate into the Blue Coat ProxySG Device on page 21. If you are not using SSL, then do not select this checkbox. 14 Blue Coat ProxySG Log Configuration Guide

15 6. Click OK. 7. In the Upload Client tab, click Apply. Note: If you run Test Upload, you might receive a failure message. However, this does not mean that you have configured the Blue Coat ProxySG device and LogLogic Appliance incorrectly. Verifying Access Log Formats After setting up the Blue Coat ProxySG device to upload messages to the LogLogic Appliance or a Host Server, verify the access log formats. To verify access log formats: 1. From the Blue Coat Management Console navigation menu, go to Access Logging > Formats. The Formats page appears. Figure 5 Blue Coat Access Logging - Formats Page 2. Verify that the Log Formats in the listing are correct and make changes as necessary. For more information on log formats, see the Blue Coat ProxySG product documentation. Blue Coat ProxySG Log Configuration Guide 15

16 Enabling the LogLogic Appliance to Capture Log Data The following sections describe how to enable the LogLogic Appliance to capture Blue Coat ProxySG log data. Configuring the LogLogic Appliance for File Collection The LogLogic Appliance captures Blue Coat ProxySG logs using file pull functionality via a file transfer rule. The deployment method you use to collect Blue Coat ProxySG file-based data depends on the upload schedule (i.e., periodic or continuous) you selected during the configuration procedure. For more information, see Setting Up Access Log Uploads on page 10. Blue Coat ProxySG File Collection Using a Periodic Upload Schedule If you defined a periodic upload schedule (see Defining the Upload Schedule on page 10), then you need to use the following deployment method for file collection: 1. Configure a remote Host Server with file transfer capability to capture log files from the Blue Coat ProxySG host machine. The following procedure explains, at a high-level, how to configure your environment to capture file-based log messages via SFTP. LogLogic recommends using SFTP for Windows-based systems, or SCP for Unix-based systems, to securely transfer files to the LogLogic Appliance from your log source. However, you can use any of the LogLogic-supported protocols in your environment (i.e., FTP(S), HTTP(S), SCP, etc.). Note: For more information on each supported protocol, including whether a Public Key Copy is needed and what search methods (i.e., CSV, Wildcard) are available, see the LogLogic Administration Guide. a. Make sure that a destination directory (i.e., log directory) exists and is accessible on the host machine where Blue Coat ProxySG is installed. The destination directory should contain the original log files that Blue Coat ProxySG generates. b. Transfer the Blue Coat ProxySG log files to a separate publishing directory on a remote Host Server. You can use a script or 3rd-party software that makes a copy of or moves the log files from the destination directory (i.e., log directory) to the publishing directory. In addition, if you are using a script, you can specify the schedule for when the script runs (e.g., hourly, daily, or weekly). Note: LogLogic recommends that you define a clean-up process to handle old log files that accumulate over time. 2. On the LogLogic Appliance, add Blue Coat ProxySG to the Appliance as a new device. For more information, see Adding a Blue Coat ProxySG Device on page Create a file transfer rule and specify SFTP as the Protocol. For more information, see Creating File Transfer Rules on page 24. IMPORTANT! SCP and SFTP have limitations in their ability to pull a large number of files (100 or more). LogLogic recommends that you compress the files into a single file (such as.tar or tar.gz) before the files are pulled by the LogLogic Appliance. 16 Blue Coat ProxySG Log Configuration Guide

17 Blue Coat ProxySG File Collection Using a Continuous Upload Schedule If you defined a continuous upload schedule (see Defining the Upload Schedule on page 10), then you need to use the following deployment method for file collection: 1. Properly configure the HTTP Client on Blue Coat ProxySG (see Setting Up Logging for the HTTP Client on page 12). 2. On the LogLogic Appliance, add Blue Coat ProxySG to the Appliance as a new device. For more information, see Adding a Blue Coat ProxySG Device on page Create a file transfer rule and specify HTTP or HTTPS as the Protocol. For more information, see Creating File Transfer Rules on page 24. Adding a Blue Coat ProxySG Device LogLogic captures Blue Coat ProxySG log files using the file pull method. You must add the server as a new device so LogLogic can properly handle the log file data to make it available through reports and searching. Once you have successfully added an Blue Coat ProxySG device, you must configure file transfer rules for file collection. For more information, see Configuring the LogLogic Appliance for File Collection on page 16. To add Blue Coat ProxySG as a new device: 1. Log in to the LogLogic Appliance. 2. From the navigation menu, click Management > Devices. The Devices tab appears. Blue Coat ProxySG Log Configuration Guide 17

18 Figure 6 Management > Devices > Devices Tab 3. On the Devices tab, click Add New. The Add Device tab appears. 18 Blue Coat ProxySG Log Configuration Guide

19 Figure 7 Add Device Tab 4. On the Add Device tab, complete the following information: Name Name for the Blue Coat ProxySG device. For example, BlueCoat_LX102, where LX102 is the LogLogic Appliance platform and last three digits of the IP address for the appliance. Description (optional) Description of the Blue Coat ProxySG device Device Type Select Blue Coat ProxySG from the drop-down menu Host IP IP address of the machine hosting the Blue Coat ProxySG log data (this can be a remote Host Server or a machine with Blue Coat ProxySG installed) Enable Data Collection Select the Yes radio button Refresh Device Name through DNS Lookups (optional) Select this checkbox to enable the Name field to be automatically updated. The name is obtained using a reverse DNS lookup on the configured refresh interval. The DNS name overrides any manual name you assign. Use User Authentication (optional) Select this checkbox to enable user name and password authentication for the Blue Coat ProxySG device. Use SSL (optional) If you are using an SSL Certificate to enable encryption of transferred files, then proceed with Step 5. If you are not using SSL Certificates, then go to Step 6. Blue Coat ProxySG Log Configuration Guide 19

20 Figure 8 Add Device tab populated with Example Content 1. (Optional) Complete this step only if you are using SSL to encrypt transferred files. You must enable SSL in the LogLogic Appliance, and then export the auto-generated SSL Certificate to the Blue Coat ProxySG device. a. Select the Use SSL checkbox. b. Click anywhere in the SSL Certificate text box. c. Press the Ctrl + A keys to select all text for the certificate, and then press the Ctrl + C keys to copy the text to the clipboard. 2. Verify that all fields are populated correctly, and then click Add to add the device. The Devices tab appears. 3. Verify that the device is in the list of devices. Click the device name to check the values you entered for the device. 4. If you are using SSL, then go to Importing the LogLogic SSL Certificate into the Blue Coat ProxySG Device on page 21 and complete the steps to import the LogLogic SSL Certificate into the Blue Coat ProxySG device. 20 Blue Coat ProxySG Log Configuration Guide

21 Importing the LogLogic SSL Certificate into the Blue Coat ProxySG Device This section only applies if you are using SSL certification to encrypt transferred files between the Blue Coat ProxySG device and the LogLogic Appliance. If you are using SSL, then you must import the SSL Certificate from the LogLogic Appliance into Blue Coat ProxySG. To import the LogLogic Appliance SSL Certificate into the Blue Coat ProxySG device: 1. Log in to the Blue Coat ProxySG web proxy appliance. a. Open a web browser using https and port For example, b. Enter the user name and password. The Blue Coat ProxySG web interface appears. Figure 9 Blue Coat ProxySG Web Interface 2. Click the Management Console link. The Blue Coat Management Console appears. Blue Coat ProxySG Log Configuration Guide 21

22 Figure 10 Blue Coat Management Console 3. From the Blue Coat Management Console, click SSL > CA Certificates. The CA Certificates tab appears. 22 Blue Coat ProxySG Log Configuration Guide

23 Figure 11 Blue Coat ProxySG SSL - CA Certificate Tab 4. In the CA Certificates tab click Import. The Import CA Certificate window appears. 5. Click in the CA Certificate text box, and then press and hold the Ctrl + V keys to paste in the LogLogic SSL Certificate. If you do not have the LogLogic SSL Certificate on your clipboard, return to the LogLogic Appliance and navigate to the Blue Coat ProxySG device details page. In the LogLogic interface, click Administration > Manage Devices, then click the Blue Coat ProxySG device name in the list. Use the Ctrl + A and Ctrl + C keys to select and copy all of the SSL Certificate text. Blue Coat ProxySG Log Configuration Guide 23

24 Figure 12 Example Import CA Certificate Entries. 6. Click OK to import the LogLogic SSL Certificate into the Blue Coat ProxySG device. Note: A dialog box may prompt you for the user name and password of the Blue Coat ProxySG device. 7. Verify that the LogLogic SSL Certificate appears in the list on the CA Certificates tab. 8. Click Apply to save changes. Creating File Transfer Rules After you have added your Blue Coat ProxySG device, you can create a File Transfer Rule for the access log files. File Transfer Rules enable the LogLogic Appliance to pull files from the Host Server publishing the Blue Coat ProxySG log files. LogLogic supports the following wildcards: * (asterisk),? (question mark), and [...] (open and close brackets) using directory queries. If you use wildcards, you must enable directory listing on your Host Server. Examples: file /foo/file, /bar/*.log /foo?/bar*/*.aud, /foo1/file1.tar.gz, /foo1/file2.z /foo[2-8]/bar*/net*.log LogLogic can pull and decompress archive files, extract individual files from the archive files, and then process the individual files. The following file types are supported:.tar.bz2,.tar.gz, tar.z,.tgz,.taz,.tar,.gz,.z,.z,.zip,.zip. For more information, see the LogLogic Administration Guide. 24 Blue Coat ProxySG Log Configuration Guide

25 To create a file transfer rule: 1. Log in to the LogLogic Appliance. 2. From the navigation menu, select Management > Devices. 3. Select the File Transfer Rule tab. 4. Add a rule for the Blue Coat ProxySG log files you want to capture by completing the following steps: a. From the Device Type drop-down menu, select the machine where Blue Coat ProxySG is installed. b. From the Device drop-down menu, select the appropriate Blue Coat ProxySG device. Note: If you have added only one Blue Coat ProxySG device, the device name is automatically added. c. Click Add New then enter the appropriate information for the following required fields: Rule Name Name of the transfer rule (e.g., Blue Coat ProxySG log files) Protocol Specify the appropriate protocol (e.g., HTTP(S) if you are using a continuous upload schedule from ProxySG, SFTP, FTP(S), SCP, etc. if you are using a periodic upload schedule) Note: LogLogic recommends using a secure file transfer protocol, such as SFTP for Windows-based devices or SCP for UNIX-based devices. If you are using SFTP or SCP, you must copy the Appliance s public key to the machine where the logs are located. For more information, see Configuring the LogLogic Appliance for File Collection on page 16 and the LogLogic Administration Guide. User ID Specify only if the protocol requires a User ID Password/Verify Password Specify only if required for the User ID Files Full path (after the IP address) to the Blue Coat ProxySG machine or the Host Server where the Blue Coat ProxySG log files are located. For example: /log/file_name.log To capture all logs in a specific directory specify the asterisk (*) wildcard. For example: /log/*.zip The server can be the host machine where the device is installed or a remote Host Server with file transfer functionality. For more information, see Configuring the LogLogic Appliance for File Collection on page 16. File Format Select W3C from the drop-down menu Collection Time Specify the time you want to retrieve the log file from the Host Server (i.e., a Host Server or the Blue Coat ProxySG machine) File Transfer History Click this button if you want to see the file transfer history. Use Advanced Duplication Detection Select the Yes radio button if you want the LogLogic Appliance to check for duplicate data while capturing the Blue Coat ProxySG logs. Enable Select the Yes radio button to enable the File Transfer Rule d. Click Add. Blue Coat ProxySG Log Configuration Guide 25

26 Verifying the Configuration The section describes how to verify that the configuration changes made to Blue Coat ProxySG and the LogLogic Appliance are applied correctly. To verify the configuration: 1. Log in to the LogLogic Appliance. 2. From the navigation menu, select Dashboards > Log Source Status. The Log Source Status tab appears. 3. Locate the IP address for each Blue Coat ProxySG device. If the device name (Blue Coat ProxySG) appears in the list of devices, then the configuration is correct. If the device does not appear in the Log Source Status tab, check the Blue Coat ProxySG logs for events that should have been sent. If events were detected and are still not appearing on the LogLogic Appliance, verify the Blue Coat ProxySG configuration and the LogLogic Appliance configuration. You can also verify that the LogLogic Appliance is properly capturing log data from Blue Coat ProxySG by trying to view the data in the reports. LogLogic recommends checking the reports to make sure that the data obtained is valid and matches expectations. For more information, see LogLogic Real-Time Reports on page 30. If the device name appears in the list of devices but event data for the device is not appearing within your reports, you need to verify that the LogLogic Appliance is actually capturing the logs properly. For more information, see Verifying that Log Messages are Uploaded to the LogLogic Appliance on page Blue Coat ProxySG Log Configuration Guide

27 Chapter 2 How LogLogic Supports Blue Coat ProxySG This chapter describes LogLogic s support for Blue Coat ProxySG. LogLogic enables you to track web usage information captured by the Blue Coat ProxySG device in real-time or on a scheduled basis. How LogLogic Captures Blue Coat ProxySG Log Data Supported Blue Coat ProxySG Log Data Formats LogLogic Real-Time Reports How LogLogic Captures Blue Coat ProxySG Log Data Access logs are made available in real-time (i.e., continuously) or at scheduled intervals (i.e., periodically) and contain log records that can be made specific to each protocol. For example, you can track the network traffic flowing through your environment and append an access log at the end of each transaction for a specified protocol such as HTTP or HTTPS. Access logs are directed to specified log facilities. Log facilities associate logs with a configured format and upload schedule. Log facilities can also be encrypted and digitally signed before they are uploaded. All log data stored in log facilities can be uploaded to a LogLogic Appliance for analysis and future archiving. Blue Coat ProxySG log data can be uploaded directly to the LogLogic Appliance using HTTP or HTTPS if you are uploading files continuously. Log data can also be uploaded to a remote Host Server and then transferred to the Appliance using FTP(S), SFTP, or SCP if you are uploading files periodically. For more information, see Defining the Upload Schedule on page 10. Figure 13 on page 28 provides a deployment example for capturing Blue Coat ProxySG access log messages continuously from the HTTP Client. Figure 14 on page 28 provides a deployment example for capturing Blue Coat ProxySG access log messages periodically from a remote Host Server. An SFTP server is used as a remote Host Server in the periodic upload example. For more information, see Configuring the LogLogic Appliance for File Collection on page 16. Blue Coat ProxySG Log Configuration Guide 27

28 Figure 13 Continuous File Upload Functionality (using HTTP(S)) and Connectivity for Blue Coat ProxySG and a LogLogic Appliance End User Intranet Internet Blue Coat ProxySG HTTP/S Upload (HTTP Client) Internet Website End User log data LogLogic Appliance Reports Database Alerts Figure 14 Periodic File Upload Functionality (using SFTP) and Connectivity for Blue Coat ProxySG and a LogLogic Appliance End User Intranet Internet Blue Coat ProxySG Internet Website End User Host Server LogLogic Appliance SFTP Upload log data Database Reports Alerts All Blue Coat ProxySG log data captured by the LogLogic Appliance is parsed and made available to the LogLogic Agile Report Engine and search. The Agile Report Engine provides report templates that can be run as-is or modified to create customized reports targeting specific information. For example, you can create customized reports that display the top cache server and status for a given time frame, the most requested file types for a given time frame, or the top URLs requested for a given time frame. For more information, see LogLogic Real-Time Reports on page 30. In addition, the data is made available so you can create alerts that notify you of issues on your Blue Coat ProxySG device. For more information on creating reports and alerts, see the LogLogic User Guide and LogLogic Online Help. Note: Blue Coat ProxySG records log data using GMT time while the LogLogic Appliance reports data using local time. In LogLogic releases prior to Hotfix 2, you must consider the time difference of when log data was captured by the Blue Coat ProxySG device and the current time of the LogLogic Appliance. If you have LogLogic Hotfix 2 or later, then you do not have to calculate the time difference. 28 Blue Coat ProxySG Log Configuration Guide

29 Supported Blue Coat ProxySG Log Data Formats LogLogic supports access logs in various formats such as ELFF, NCSA/Common, SmartReporter, SQUID, SurfControl, and Websense. Each log format applies to a specific type of log data. For example, ELFF (W3C Extended Log File Format) is a general format with specific implementations such as IM, Main, P2P, and streaming, NCSA/Common contains only basic HTTP access information, and SQUID contains cache statistics. Table 1 provides a list of the Blue Coat ProxySG fields that LogLogic parses. Table 1 Blue Coat ProxySG Fields Parsed by LogLogic bytes c-dns c-ip cached cs(content-type) cs(referer) cs(user-agent) cs(x-forwarded-for) cs-auth-group cs-auth-groups cs-method cs-types cs-uri cs-uri-query cs-uri-stem current-time date r-dns r-ip r-port rs(content-type) s-dns s-ip s-port sc-bytes sc-status time time-taken x-action x-connect-time x-hiercode x-play-time x-product x-protocol x-sc-contentlength x-smartfilter-categories x-smartfilter-result x-status x-timestamp x-transaction x-username x-virus-details x-virus-id Blue Coat ProxySG Log Configuration Guide 29

30 LogLogic Real-Time Reports LogLogic provides pre-configured Real-Time Reports for Blue Coat ProxySG log data. The following Real-Time Reports are available: All Unparsed Events Displays data for all events retrieved from the Blue Coat ProxySG log for a specified time interval Web Cache Activity - Displays locally-stored web cache information served during a specified time interval To access LMI 5 Real-Time Reports: 1. In the top navigation pane, click Reports. 2. Click Network Activity. The following Real-Time Reports are available: Web Cache Activity 3. Click Operational. The following Real-Time Reports are available: All Unparsed Events You can create custom reports from the existing Real-Time Report templates. For more information, see the LogLogic User Guide and LogLogic Online Help. 30 Blue Coat ProxySG Log Configuration Guide

31 Chapter 3 Troubleshooting This chapter contains troubleshooting information regarding the configuration and/or use of log collection for Blue Coat ProxySG. Verifying that Log Messages are Uploaded to the LogLogic Appliance Verifying that Log Messages are Uploaded to the LogLogic Appliance If you set messages to be uploaded continuously, then you can view the results of your tests immediately. If you set messages to be uploaded periodically, then the messages are sent at the schedule time. However, you can force uploads if necessary. It is possible to test that messages are being uploaded from the Blue Coat ProxySG device to the LogLogic Appliance in many ways. The following steps represent one example of how you can verify that you have set up your environment properly. Note: The Blue Coat ProxySG upload client uses GMT to when uploading data. In LogLogic versions prior to Hotfix 2, on the LogLogic Appliance, you must calculate the GMT time equivalent to your local time when searching and reporting on data. For example, if your Blue Coat ProxySG device is located in New York (EST), and you want to run a report on data that occurred from 13:00 to 15:00 (1pm to 3pm), then you must specify GMT time in your reports and searches as 17:00 to 19:00. If you have LogLogic Hotfix 2 or later, then you do not have to calculate the time difference. To verify that Log Messages are uploaded to the LogLogic Appliance: 1. On a Microsoft Windows machine, open an Instant Messenger window (e.g., Yahoo! Instant Messenger). 2. Send a message. 3. Log in to the LogLogic Appliance to view the test message sent by the Blue Coat ProxySG device. 4. From the navigation menu, select Summary Reports > Top Web Activity > Web Cache Activity. The Web Cache Activity tab appears. 5. In the Device Type drop-down menu, select Blue Coat ProxySG. 6. In the Source Device drop-down menu, select All Blue Coat ProxySG. 7. Set the Time Interval to capture the test message you sent. For example, set the specific time to be from 1 hour before you sent the message to the current time. 8. Click Run. The Web Cache Activity tab is populated with the appropriate data for the device. 9. View the test message and details to verify the message was sent properly. a. Locate the Source Device. The Source Device can be identified by the Source IP. Blue Coat ProxySG Log Configuration Guide 31

32 b. Drill down on a listed item to view the Blue Coat ProxySG message details. The Web Cache Activity tab is populated with the appropriate data. 10. Verify that the test message was sent. Note: If you do not see the test message in the Web Cache Activity tab, then verify that you completed the steps properly. 32 Blue Coat ProxySG Log Configuration Guide

33 Appendix A Blue Coat ProxySG Best Practices This appendix describes best practices recommended by LogLogic for use with Blue Coat ProxySG. It also provides a description of LogLogic s Blue Coat Best Practices Reporting Package. Blue Coat ProxySG Best Practices Optimized and Non-Optimized Report Fields Blue Coat Best Practices Reporting Package Blue Coat ProxySG Best Practices LogLogic recommends adhering to the following best practices while configuring Blue Coat ProxySG and the LogLogic Appliance: Continuous Log Collection vs. Periodic Log Collection It is possible to gather and transfer logs using continuous or periodic collection methods. If you intend to transfer over 100 messages per second, LogLogic recommends using the periodic method. For more information, see Defining the Upload Schedule on page 10. If you use the periodic collection method, make sure that each chunk of log data that is transferred from Blue Coat ProxySG to the Host Server is less than 2 Gigabytes (GB) (1.8 GB maximum). Regardless of the log collection method used (i.e., periodic or continuous), make sure that the network connection between Blue Coat ProxySG, the Host Server (if applicable), and the LogLogic Appliance is as fast and stable as possible. The maximum recommended Blue Coat ProxySG log collection rate, per LogLogic Appliance per day, should be less than 60 million records (or be approximately 21 GB in size). All LogLogic platform families (i.e., LX, ST, MX) support Blue Coat ProxySG log data. However, for better performance, LogLogic recommends using the LX 2010 platform. LogLogic recommends running Release 4.2 Hotfix 1 or later on the LogLogic Appliance. Optimized and Non-Optimized Report Fields Blue Coat ProxySG log data can be viewed within the LogLogic Appliance s Web Cache Activity report. For more information, see LogLogic Real-Time Reports on page 30. In order to improve reporting performance, LogLogic attempts to pre-summarize log data as it is collected on the Appliance. The log data is stored in a manner that helps optimize the speed at which the data can be retrieved during reporting. By default, LogLogic summarizes or optimizes specific fields of parsed data collected for the Web Cache Activity report. So, each report field (i.e., Advanced Option) is either optimized or non-optimized. As a result, reports that exclusively use optimized fields will run faster than reports that include non-optimized fields. Blue Coat ProxySG Log Configuration Guide 33

34 For example, if you ran a report that contained one non-optimized field and three optimized fields, that report s run time will be constrained by the non-optimized field. Therefore, the report will run slower than a report that contained only optimized fields. Table 2 on page 34 provides a listing of all the optimized and non-optimized fields available within the Web Cache Activity report. Note: When using periodic collection, it may take approximately one hour for every 8 Gigabytes of batched log data (i.e., approximately 25 million messages collected) to complete the automatic parsing and aggregation processes needed before report generation is possible. Table 2 Web Cache Activity Report - Advanced Options Advanced Option Optimized Non-Optimized Source Device Source User Source IP Source Host Domain Name Destination IP Destination Port Peer IP Peer Host Peer Status Method URL Cache Code Status Type Size Filter Category Filter Result User Agent Referred By X Protocol X Action X Status X Product Virus ID Virus Details User Group 34 Blue Coat ProxySG Log Configuration Guide

35 Caution: When you drill-down on the Web Cache Activity report's results there is no default sort-by selection. The drill-down results are generally in order by time. If you specify a sort-by selection for this report's drill-down, performance in generating the drill-down results is slower. The default timeout period for reports is 15 minutes. Some reports might require a run time that exceeds 15 minutes. If you run into this issue, consider the following workarounds: Shorten the Time Interval for the report Modify the Advanced Options to include fewer fields Change the default timeout period on the LogLogic Appliance: Caution: LogLogic does not recommend changing the default timeout period. However, if you do change the default, you should only use this command on the Appliance where you will run the report. 1. Log in to the LogLogic Appliance s Command Line Interface (CLI). 2. Type in the following command: mysql logappconfig -e 'update Settings set maxidledbquery=####;' Where the maxidledbquery value (i.e., ####) is the timeout period (in seconds) for reports. The default is 900 seconds (15 minutes). For example, if you wanted to change the timeout to 7200 seconds (2 hours), the command would be: mysql logappconfig -e 'update Settings set maxidledbquery=7200;' 3. To save the configuration change on the Appliance, type in the following command: /loglogic/bin/loadsettings Blue Coat ProxySG Log Configuration Guide 35

36 Blue Coat Best Practices Reporting Package LogLogic also provides a Blue Coat Best Practices Reporting Package that includes pre-defined custom reports that allow you to monitor data regarding user activity, policy violations, etc. Note: The Blue Coat Best Practices Reporting Package is not part of a Log Source Package (LSP). This reporting package is available upon request from LogLogic s Account team. To access Blue Coat Best Practices Reports: 1. Log in to the LogLogic Appliance. 2. From the navigation tree, select Custom Reports. 3. Select BlueCoat Best Practices. The following Custom Reports are available: Domains by Unique User Domains visited by unique users yesterday sorted by count Files Downloaded via the Web All Web-based downloads yesterday greater the 5 Kilobytes (KB) Files Uploaded via the Web All Web-based uploads in the past day Filter Results by Count Blue Coat filter results for the past day sorted by count Peer Servers and Status Yesterday's peer web servers providing data for cache servers and status Top Bandwidth Total number of bytes transferred yesterday Top Categories Visited Blue Coat filter categories visited yesterday sorted by count Top Domains Accessed Domains visited yesterday sorted by count Top Spyware Src IPs Spyware Source IP addresses sorted by the number of bytes transferred during the past day Top Src IPs by Bandwidth Source IP addresses sorted by the number of bytes transferred in the past day Top URLs Visited Visited URLs in the past day sorted by count Top Users by Bandwidth Top users by bandwidth for the past day Top Users by Page Views Top users by number of total page views for the past day Web Access to Applications Access to Web-based applications in the past day The performance time for each report depends upon the fields used and the amount of data being displayed. Table 3 on page 37 provides a breakdown of each report, the Advanced Options (i.e., fields) used within the report by default, and an estimated run time in minutes. The run time estimate in minutes is based upon log data containing approximately 35 million messages (or be approximately GB in size). Note: There is a direct correlation between longer report run times and reports that make use of non-optimized fields. For more information, see Optimized and Non-Optimized Report Fields on page 33 and Table 2 on page Blue Coat ProxySG Log Configuration Guide

37 Table 3 Best Practices Reports, Advanced Options, and Run Times Report Default Advanced Options Run Time (mins) Domains by Unique User Source Device, Source User, Domain Name, Count Files Downloaded via the Web Source Device, Source IP, Domain Name, Method, Status, Size, Count 8.21 Files Uploaded via the Web Source Device, Source IP, Method, Status, Size, Count 0.04 Filter Results by Count Source Device, Filter Result, Count 0.12 Peer Servers and Status Source Device, Peer IP, Peer Host, Peer Status, Size, Count Top Bandwidth Source Device, Size 0.01 Top Categories Visited Source Device, Filter Category, Count 0.13 Top Domains Accessed Source Device, Domain Name, Count 9.91 Top Spyware Src IPs Source Device, Source IP, Size, Filter Category, Count 0.02 Top Src IPs by Bandwidth Source Device, Source IP, Size, Count 0.04 Top URLs Visited Source Device, Domain Name, URL, Count Top Users by Bandwidth Source Device, Source User, Size 0.01 Top Users by Page Views Source Device, Source User, Count 0.01 Web Access to Applications Source Device, Source User, Domain Name, URL, Status, Count Note: The Advanced Options listed here do not represent all of the options available within a report. The options listed only represent the fields that are selected to be displayed by default. Blue Coat ProxySG Log Configuration Guide 37

38 38 Blue Coat ProxySG Log Configuration Guide

39 Appendix B Format Reference This appendix describes the log format and report supported by Blue Coat ProxySG. LogLogic Support for Blue Coat ProxySG Table 4 LogLogic Support for Blue Coat ProxySG Supported Log Format Agile Reports date time time-taken c-ip sc-status s-action sc-bytes cs-bytes cs-method cs-uri-scheme cs-host cs-uri-port cs-uri-path cs-uri-query cs-username cs-auth-group s-hierarchy s-supplier-name rs(content-type) cs(referer) cs(user-agent) sc-filter-result cs-categories x-virus-id s-ip Web Cache Activity Sample Log :42: CONNECT tcp / NONE "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-us; rv: ) Gecko/ Firefox/ " PROXIED "none" Field Description date - The date on which the activity occurred. time - The time, in coordinated universal time (UTC), at which the activity occurred. time-taken Time taken for transaction to complete in seconds. c-ip - The IP address of the client that made the request. sc-status - The HTTP status code. s-action What type of action did the appliance take to process this request. sc-bytes - The number of bytes that the server sent. cs-bytes - The number of bytes that the server received. cs-method - The requested action, for example, a GET method. Blue Coat ProxySG logs can be classified according to the values in the cs-method field. HEAD GET POST PUT DELETE TRACE OPTIONS cs-uri-scheme Scheme from the 'log' URL. cs-host - The host header name, if any. cs-uri-port Port from the 'log' URL. cs-uri-path Path from the 'log' URL. Does not include query. cs-uri-query The query, if any, that the client was trying to perform. A Universal Resource Identifier (URI) query is necessary only for dynamic pages. cs-username The name of the authenticated user who accessed your server. Anonymous users are indicated by a hyphen. Blue Coat ProxySG Log Configuration Guide 39

40 LogLogic Support for Blue Coat ProxySG -- continued Field Description (continued) cs-auth-group One group that an authenticated user belongs to. If a user belongs to multiple groups, the group logged is determined by the Group Log Order configuration specified in VPM. If Group Log Order is not specified, an arbitrary group is logged. Note that only groups referenced by policy are considered. s-hierarchy How and where the object was retrieved in the cache hierarchy.time-taken Time taken for transaction to complete in seconds. cs-supplier-name Hostname of the upstream host (not available for a cache hit). rs(content-type) - Response header: Content-Type. cs(referer) The site that the user last visited. This site provided a link to the current site. cs(user-agent) The browser type that the client used. sc-filter-result Content filtering result: Denied, Proxied, or Observed. cs-categories All content categories of the request URL x-virus-id Identifier of a virus if one was detected s-ip - The IP address of the server on which the log file entry was generated. 40 Blue Coat ProxySG Log Configuration Guide

LogLogic Blue Coat ProxySG Syslog Log Configuration Guide

LogLogic Blue Coat ProxySG Syslog Log Configuration Guide LogLogic Blue Coat ProxySG Syslog Log Configuration Guide Document Release: September 2011 Part Number: LL600070-00ELS100000 This manual supports LogLogic Blue Coat ProxySG Release 1.0 and later, and LogLogic

More information

LogLogic Microsoft Dynamic Host Configuration Protocol (DHCP) Log Configuration Guide

LogLogic Microsoft Dynamic Host Configuration Protocol (DHCP) Log Configuration Guide LogLogic Microsoft Dynamic Host Configuration Protocol (DHCP) Log Configuration Guide Document Release: September 2011 Part Number: LL600026-00ELS090000 This manual supports LogLogic Microsoft DHCP Release

More information

LogLogic Trend Micro OfficeScan Log Configuration Guide

LogLogic Trend Micro OfficeScan Log Configuration Guide LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and

More information

LogLogic Cisco IPS Log Configuration Guide

LogLogic Cisco IPS Log Configuration Guide LogLogic Cisco IPS Log Configuration Guide Document Release: March 2011 Part Number: LL600072-00ELS090000 This manual supports LogLogic Cisco IPS Release 1.0 and later, and LogLogic Software Release 4.9.1

More information

LogLogic Microsoft Internet Information Services (IIS) Log Configuration Guide

LogLogic Microsoft Internet Information Services (IIS) Log Configuration Guide LogLogic Microsoft Internet Information Services (IIS) Log Configuration Guide Document Release: September 2011 Part Number: LL60001-00ELS090000 This manual supports LogLogic Microsoft IIS Release 1.0

More information

LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide

LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide Document Release: Septembere 2011 Part Number: LL600066-00ELS100000 This manual supports LogLogic General Database Collector

More information

LogLogic Cisco NetFlow Log Configuration Guide

LogLogic Cisco NetFlow Log Configuration Guide LogLogic Cisco NetFlow Log Configuration Guide Document Release: September 2011 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 1.0, and LogLogic Software Release

More information

Juniper Secure Access SSL VPN Log Configuration Guide

Juniper Secure Access SSL VPN Log Configuration Guide Juniper Secure Access SSL VPN Log Configuration Guide Document Release: March 2012 Part Number: LL600049-00ELS01000000 This manual supports LogLogic Juniper Secure Access SSL VPN Release 1.0 and later,

More information

LogLogic Symantec Endpoint Protection Log Configuration Guide

LogLogic Symantec Endpoint Protection Log Configuration Guide LogLogic Symantec Endpoint Protection Log Configuration Guide Document Release: September 2011 Part Number: LL60005-00ELS100001 This manual supports LogLogic Symantec Endpoint Protection Release 1.0 and

More information

LogLogic Apache Web Server Log Configuration Guide

LogLogic Apache Web Server Log Configuration Guide LogLogic Apache Web Server Log Configuration Guide Document Release: September 2011 Part Number: LL60009-00ELS090001 This manual supports LogLogic Apache Web Server Release 1.0 and later, and LogLogic

More information

LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide

LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide Document Release: September 2011 Part Number: LL600027-00ELS090000 This manual supports LogLogic Microsoft DNS Release 1.0 and later,

More information

LogLogic Cisco NetFlow Log Configuration Guide

LogLogic Cisco NetFlow Log Configuration Guide LogLogic Cisco NetFlow Log Configuration Guide Document Release: March 2012 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 2.0, and LogLogic Software Release 5.1

More information

LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide

LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide Document Release: September 2011 Part Number: LL600015-00ELS090000 This manual supports LogLogic Juniper Networks

More information

Blue Coat Systems SG Appliance

Blue Coat Systems SG Appliance Blue Coat Systems SG Appliance Configuration and Management Guide Volume 9: Access Logging Version SGOS 5.1.x Volume 9: Access Logging Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale,

More information

LogLogic Check Point Management Station Log Configuration Guide

LogLogic Check Point Management Station Log Configuration Guide LogLogic Check Point Management Station Log Configuration Guide Document Release: September 2011 Part Number: LL600013-00ELS090000 This manual supports LogLogic Check Point Management Station Release 2.0

More information

LogLogic IBM i5/os Collector Guide

LogLogic IBM i5/os Collector Guide LogLogic IBM i5/os Collector Guide Software Release: 1.0 Document Release: December 2010 Part Number: LL600020-00EI5010001 This manual supports LogLogic IBM i5/os Collector Release 1.0 and later, and LogLogic

More information

LogLogic Microsoft SQL Server Log Configuration Guide

LogLogic Microsoft SQL Server Log Configuration Guide LogLogic Microsoft SQL Server Log Configuration Guide Document Release: March 2012 Part Number: LL600028-00ELS090002 This manual supports LogLogic Microsoft SQL Server Release 2.0 and later, and LogLogic

More information

Microsoft Active Directory (AD) Service Log Configuration Guide

Microsoft Active Directory (AD) Service Log Configuration Guide Microsoft Active Directory (AD) Service Log Configuration Guide Document Release: October 2011 Part Number: LL600011-00ELS090000 This manual supports LogLogic Microsoft AD Service Release 1.0 and above,

More information

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Blue Coat Systems ProxySG Appliance

Blue Coat Systems ProxySG Appliance Blue Coat Systems ProxySG Appliance Configuration and Management Suite Volume 8: Access Logging Version SGOS 5.4.x Volume 8: Access Logging Contact Information Americas: Blue Coat Systems Inc. 420 North

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Microsoft Internet Information Services (IIS)

Microsoft Internet Information Services (IIS) McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Microsoft Internet Information Services (IIS) September 30, 2014 Microsoft IIS Page 1 of 11 Important Note: The information

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

User Identification and Authentication

User Identification and Authentication User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

LogLogic McAfee Firewall Enterprise (Sidewinder) Log Configuration Guide

LogLogic McAfee Firewall Enterprise (Sidewinder) Log Configuration Guide LogLogic McAfee Firewall Enterprise (Sidewinder) Log Configuration Guide Document Release: September 2011 Part Number: LL600046-00ELS900001 This manual supports LogLogic Sidewinder Release 1.2 and later,

More information

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Configuration Guide. Websense Web Security Solutions Version 7.8.1

Configuration Guide. Websense Web Security Solutions Version 7.8.1 Websense Web Security Solutions Version 7.8.1 To help you make the transition to Websense Web Security or Web Security Gateway, this guide covers the basic steps involved in setting up your new solution

More information

Using RADIUS Agent for Transparent User Identification

Using RADIUS Agent for Transparent User Identification Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides

More information

www.apacheviewer.com Apache Logs Viewer Manual

www.apacheviewer.com Apache Logs Viewer Manual Apache Logs Viewer Manual Table of Contents 1. Introduction... 3 2. Installation... 3 3. Using Apache Logs Viewer... 4 3.1 Log Files... 4 3.1.1 Open Access Log File... 5 3.1.2 Open Remote Access Log File

More information

Transparent Identification of Users

Transparent Identification of Users Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

WebMarshal User Guide

WebMarshal User Guide WebMarshal User Guide Legal Notice Copyright 2014 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Deployment Guide Microsoft IIS 7.0

Deployment Guide Microsoft IIS 7.0 Deployment Guide Microsoft IIS 7.0 DG_IIS_022012.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites... 4 4 Accessing the AX Series Load Balancer...

More information

v6.1 Websense Enterprise Reporting Administrator s Guide

v6.1 Websense Enterprise Reporting Administrator s Guide v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services

Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP

More information

RealPresence Platform Director

RealPresence Platform Director RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director

More information

Security Guidelines for MapInfo Discovery 1.1

Security Guidelines for MapInfo Discovery 1.1 Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

McAfee Content Security Reporter 2.0.0

McAfee Content Security Reporter 2.0.0 Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

HP Web Jetadmin Database Connector Plug-in reference manual

HP Web Jetadmin Database Connector Plug-in reference manual HP Web Jetadmin Database Connector Plug-in reference manual Copyright notice 2004 Copyright Hewlett-Packard Development Company, L.P. Reproduction, adaptation or translation without prior written permission

More information

Network Agent Quick Start

Network Agent Quick Start Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Burst Technology. bt-webfilter User Guide

Burst Technology. bt-webfilter User Guide Burst Technology presents bt-webfilter User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com

More information

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12 DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Using DC Agent for Transparent User Identification

Using DC Agent for Transparent User Identification Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify

More information

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as

More information

CA NetQoS Performance Center

CA NetQoS Performance Center CA NetQoS Performance Center Install and Configure SSL for Windows Server 2008 Release 6.1 (and service packs) This Documentation, which includes embedded help systems and electronically distributed materials,

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites

More information

Installing AWStats on IIS 6.0 (Including IIS 5.1) - Revision 3.0

Installing AWStats on IIS 6.0 (Including IIS 5.1) - Revision 3.0 AWStats is such a great statistical tracking program to use, but there seems to be a lack of easy-tofollow documentation available for installing AWStats on IIS. This document covers the basic setup process

More information

SuperLumin Nemesis. Administration Guide. February 2011

SuperLumin Nemesis. Administration Guide. February 2011 SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Eucalyptus 3.4.2 User Console Guide

Eucalyptus 3.4.2 User Console Guide Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Websense Web Security Gateway: What to do when a Web site does not load as expected

Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.

More information

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication

More information

EMC Data Domain Management Center

EMC Data Domain Management Center EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes

More information

Application Control and URL Filtering

Application Control and URL Filtering Application Control and URL Filtering R77 Versions Administration Guide 17 May 2015 Classification: [Protected] 2015 Check Point Software Technologies Ltd. All rights reserved. This product and related

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1 First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

More information

CA Spectrum and CA Service Desk

CA Spectrum and CA Service Desk CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using

More information

Adaptive Log Exporter Users Guide

Adaptive Log Exporter Users Guide IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12 M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.

More information

HP IMC User Behavior Auditor

HP IMC User Behavior Auditor HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC

More information

Introducing the BIG-IP and SharePoint Portal Server 2003 configuration

Introducing the BIG-IP and SharePoint Portal Server 2003 configuration Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on

More information

Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6

Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 INTEGRATION GUIDE May 2014 3725-75304-001 Rev B Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved.

More information

Best Practices for Controlling Skype within the Enterprise. Whitepaper

Best Practices for Controlling Skype within the Enterprise. Whitepaper Best Practices for Controlling Skype within the Enterprise Whitepaper INTRODUCTION Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Managing the System Event Log

Managing the System Event Log This chapter includes the following sections: System Event Log, page 1 Viewing the System Event Log for an Individual Server, page 2 Viewing the System Event Log for the Servers in a Chassis, page 2 Configuring

More information