Table of Contents | v |
User Authentication Services | 33 |
Chapter 5: Advanced Operations | 35 |
ECMS Transmitter Pooling | 35 |
Backup and Restore | 35 |
Management Appliance Upgrade | 36 |
Firmware Management | 37 |
Chapter 6: Events and Event Logs | 39 |
Introduction | 39 |
Event Severity and Categories | 39 |
Event severity | 39 |
Event categories | 40 |
Displaying the Event Log | 40 |
Changing the Event Log Retention Period | 40 |
Creating an Event Log.csv File | 41 |
Appendices | 43 |
Appendix A: Technical Specifications | 44 |
Appendix B: Technical Support | 45 |
License Information | 47 |