7-30 Dell PowerVault 720N, 740N, and 760N System Administrator and Command Reference Guide
6WHS
To disable CIFS access logging, enter the following command:
RSWLRQVFLIVDFFHVVBORJJLQJHQDEOHRII
6SHFLI\LQJWKH$FWLYH(YHQW/RJ
'HVFULSWLRQ
Use this procedure to specify the active event log. You follow this procedure when
you want to specify the name of a file to which the system writes access logging
information. You can do this at any time. After you complete this procedure, if access
logging is enabled, the system writes access logging information to the file you
specified.
3UHUHTXLVLWHV
You must have the path name of the file to use. This file must be in an existing writ-
able directory.
6WHS
To specify the active log, center the following command at the command line:
RSWLRQVFLIVDFFHVVBORJJLQJILOHQDPHSDWKBQDPH
path_name is the path name in UNIX format of the file to which you want the system
to write access logging information.
6HWWLQJD6\VWHP$&/RQD)LOH
'HVFULSWLRQ
Use this procedure to set a system ACL(SACL) on a file. You must complete this pro-
cedure to monitor access activity on a file. You complete this procedure when you
have decided to monitor access to a file by specified users or groups. The procedure
is the standard Windows NT procedure for setting a SACL on a file. After you com-
plete this procedure, if access logging is enabled, the filer logs accesses to the file by
the users or groups you specified.
3UHUHTXLVLWHV
You must have the following items to complete the procedure:
The name of the file you want to monitor
The name of the users or groups whose access to the file you want to monitor