HP Sygate Security Agent User Guide

Viewing Logs

To view logs on the Agent:

1.Do one of the following: o Click ToolsLogs.

o On the toolbar, click the drop-down arrow next to the Logs icon.

Note: Click the Logs icon to display the most recently viewed log.

2.Click one of the following log types: Security Log, Traffic Log, Packet Log, or System Log.

Each log opens the Log Viewer dialog box. The Log Viewer is a data sheet, where each row represents a logged event, and the columns display information regarding the event. For more information on the differences between the icons and parameters of each log, see Security Log, Traffic Log, Packet Log, and System Log.

3.In the Log Viewer dialog box, click the View menu and click either Local View, the default setting, or Source View.

Depending on whether you choose the local view or source view, you can view various options, which vary between each log.

4.In the View menu, click a different log name if you wish.

5.Click Refresh or press F5 to update the log that you are viewing.

6.Click FileExit to close the log.

Security Log

The Security Log records potentially threatening activity directed towards your device, such as port scanning, or denial of service attacks. The Security Log is probably the most important log file in the Agent.

Icons for the Security Log

When you open a Security Log, icons are displayed at the left side of the first column. These are graphical representations of the kind of attack logged on each line, and they provide an easy way to scan the Security Log for possible system errors.

28