Log configuration procedures, Configuring log rotation, Enabling syslog – HP Secure Key Manager User Manual

Page 80: Enabling signed logs, Verifying a secure log using microsoft outlook, Verifying a secure log using openssl

Advertising
background image

Log configuration procedures

Configuring log rotation

To configure log rotation:

1.

Log in to the Management Console as an administrator with Logging access control.

2.

Navigate to the Log Configuration page (Device > Log Configuration) and click the Rotation &

Syslog tab.

3.

Select a log in the Rotation Schedule section and click Properties to access the Log Rotation

Properties section.

4.

Click Edit.

5.

Use the Rotation Schedule and Rotation Time fields to specify when the log will be rotated.

6.

Specify the number of logs that will be maintained in the log archive using the Num Logs Archived

field.

7.

Enter a value in the Max Log File Size field. When a log file reaches this size it is automatically

rotated, regardless of the Rotation Schedule and Rotation Time settings.

8.

Enter a transfer destination if you would like the rotated log moved off of the SKM.

9.

Click Save.

Enabling syslog

To enable syslog:

1.

Log in to the Management Console as an administrator with Logging access control.

2.

Navigate to the Log Configuration page (Device > Log Configuration) and click the Rotation &

Syslog tab.

3.

Select a log in the Syslog Settings section and click Edit.

4.

Select Enable Syslog and enter the server IPs, ports, and syslog facility.

5.

Click Save.

6.

Repeat steps 3, 4 and 5 to enable syslog for multiple logs.

Enabling signed logs

To enable signed logs:

1.

Log in to the Management Console as an administrator with Logging access control.

2.

Navigate to the Log Configuration page (Device > Log Configuration) and click the Log Signing tab.

3.

Click Edit in the Log Settings section.

4.

Select Sign Log for the log(s) you would like to be signed.

5.

Click Save. From now on, the system will sign the selected logs with the log signing certificate

created when the SKM was initialized.

Verifying a secure log using Microsoft Outlook

To verify a secure log using Microsoft Outlook:

1.

Move the log file off of the SKM or download it to a Windows machine.

80

Performing configuration and operation tasks

Advertising