Planning the installation
What to do after installation
29
Table
| Table | Management server log files | |
|
|
|
|
File name | Description |
| Default location |
|
|
| |
This log file is used for agent activity. | Windows: | ||
| The asterisk in the file name represents a | Program Files\Symantec\Critical System | |
| Protection\Server\Tomcat\logs | ||
| version number. |
| |
|
|
| |
|
|
| |
This log file is used for alert activity. | Windows: | ||
| The asterisk in the file name represents a | Program Files\Symantec\Critical System | |
| Protection\Server\Tomcat\logs | ||
| version number. |
| |
|
|
| |
|
|
| |
This log file is used for console activity. | Windows: | ||
| The asterisk in the file name represents a | Program Files\Symantec\Critical System | |
| Protection\Server\Tomcat\logs | ||
| version number. |
| |
|
|
| |
|
|
| |
This log file is used for general server | Windows: | ||
| messages. |
| Program Files\Symantec\Critical System |
| The asterisk in the file name represents a | Protection\Server\Tomcat\logs | |
|
| ||
| version number. |
|
|
|
|
|
|
What to do after installation
You can begin enforcing the Symantec Critical System Protection policies on agents immediately after agent installation and registration with the management server.
Symantec recommends that you first apply a policy to a few agents, and then verify that the agent computers are functioning properly with the applied policy.
See the Symantec Critical System Protection Administration Guide for information about applying policies to agents.