Configure system, event and audit logging – Milestone XProtect Express 2014 User Manual

Page 132

Advertising
background image

Milestone XProtect

®

Express 2014

Administrator's Manual

www.milestonesys.com

132

Advanced configuration

Log integrity checks

All log files, except Management Application log files, are subjected to an integrity check once every
24 hours. The integrity check is performed by your system's Log Check service. The result of the
integrity check is automatically written to a file named according to the structure
LogCheck_YYYYMMDD.log, for example LogCheck_20091231.log. Like the log files themselves, the
log check files are by default placed in the appropriate All Users folder for the operating system you
are using.

Any inconsistencies are reported in the form of error messages written in the log check file.

Possible error messages:

Name

Description

Log integrity information was
not found. Log integrity can't
be guaranteed.

The log file could not be checked for integrity.

Log information does not
match integrity information.
Log integrity can't be
guaranteed.

The log file exists, but does not contain the expected information.
Log integrity cannot be guaranteed.

[Log file name] not found

The log file was not present.

[Log file name] is empty

The log file was present, but empty.

Last line changed/removed in
[log file name]

The last line of the log file did not match the validation criteria.

Encrypted data missing in [log
file name] near line [#]

The encrypted part of the relevant log line was not present.

Inconsistency found in [log
file name] near line [#]

The log line does not match the encrypted part.

Inconsistency found in [log
file name] at beginning of log
file

The log file header is not correct. This situation is most likely to
occur if a user has attempted to delete the beginning of a log file.

Note: Other messages that are not error-related may also appear in the log check file.

Configure system, event and audit logging

XProtect Express can generate various logs.

To configure logging, do the following:

1. Expand Advanced Configuration, right-click Logs and select Properties.

2. Specify properties (see "Log properties" on page 133) for your system logs, including the event

log and the audit log. Administrators can only disable/enable audit logging. All other logs are
compulsory.

Advertising