Planning the installation

What to do after installation

29

Table 2-5lists the management server log files.

 

Table 2-5

Management server log files

 

 

 

 

File name

Description

 

Default location

 

 

 

sis-agent.*.log

This log file is used for agent activity.

Windows:

 

The asterisk in the file name represents a

Program Files\Symantec\Critical System

 

Protection\Server\Tomcat\logs

 

version number.

 

 

 

 

 

 

 

sis-alert.*.log

This log file is used for alert activity.

Windows:

 

The asterisk in the file name represents a

Program Files\Symantec\Critical System

 

Protection\Server\Tomcat\logs

 

version number.

 

 

 

 

 

 

 

sis-console.*.log

This log file is used for console activity.

Windows:

 

The asterisk in the file name represents a

Program Files\Symantec\Critical System

 

Protection\Server\Tomcat\logs

 

version number.

 

 

 

 

 

 

 

sis-server.*.log

This log file is used for general server

Windows:

 

messages.

 

Program Files\Symantec\Critical System

 

The asterisk in the file name represents a

Protection\Server\Tomcat\logs

 

 

 

version number.

 

 

 

 

 

 

What to do after installation

You can begin enforcing the Symantec Critical System Protection policies on agents immediately after agent installation and registration with the management server.

Symantec recommends that you first apply a policy to a few agents, and then verify that the agent computers are functioning properly with the applied policy.

See the Symantec Critical System Protection Administration Guide for information about applying policies to agents.

Page 29
Image 29
Symantec Critical System manual What to do after installation