Security logs, Security logs 38 – Nortel Networks NN44470-100 User Manual
Page 38
- 38 -
MAS fault management
Nortel Media Application Server 6.0 for AS 5300
Fundamentals
NN44470-100 01.01 Standard
Release 6.0 03 June 2008
Copyright © 2008, Nortel Networks
You can configure logs to syslog destinations and to be sent as SNMP traps
when generated.
To view event logs, use the Nortel MAS Console. The following table describes
the information that you can view in each event log.
Security Logs
Security logs provide Security Administrators and Auditors the ability to track
critical operations of the system and to analyze historical data should a
security breach occur. Security logs are viewed using the Event Viewer
Administrative tool.
Security logs are archived using the Save Log File As... popup menu option in
the Event Viewer. It is the responsibility of onsite personnel to transfer these
files off of the system if a backup of the security logs is required.
Access to security logs is restricted to either SSA or SA users.
The following parameters are set during installation:
•
MaximumLogSize = 81920 KB
•
AuditLogRetentionPeriod = 2
Windows OS Security Logs
All system events such as logins, file access, file handling, and network
access are all tracked using various Windows operating system services.
The rules that govern these logs are factory configured and installed on
the server during installation.
Field
Description
Type
Event log severity. (Error, Warning, or
Informational). In addition, a colored icon
represents the log type. Red indicates Error, yellow
indicates Warning, and white indicates
Informational.
Timestamp
Timestamp of when the event was logged. You can
configure the timestamp to display as either local
time or Coordinated Universal Time (UTC) time.
UTC time is useful for correlating logs with events
in other time zones.
Id
Identifier assigned to the event log.
Description
A description of the event log.
Source
The platform component that generated the log.