Operation Manual
The Outpost Log System
6 The Outpost Log System
77
6.1 Introduction
Outpost Firewall performs many different functions as it protects your computer from
attacks. Each action it takes is referred to as an event and every event is logged.
To make it easy for you to view these event logs our engineers created the Outpost Log
Viewer. This shows you the history of every operation Outpost Firewall performed
including:
• Every application and connection that was allowed or blocked by Outpost
Firewall.
• The specific activities of each Outpost Firewall plug-in.
• The start of every program and all changes made to policies, configuration settings
and passwords.
The main features of the Outpost Log Viewer are:
• One mouse click to view the entire log or a selection of specific events. See the
6.3 How to Display Logs chapter for details.
• Customized display of the logs. You can view only the information you need by
selecting columns and limiting their parameters and sorting by any parameter.
• Preset selections of events can be displayed. You can easily switch between
connections blocked during the last ten minutes, for instance, or all connections
allowed today. You can also create, edit and remove selections of events to be
displayed. See the
6.4 Working with Logs and Filters chapter for details.
• Filters can be added to organize the data displayed.
• Logs can be copied and/or exported according to presets, filters or selected records.
• Log files can be cleared to save hard drive space.
• Customized SQL queries can be created for specific monitoring purposes.
• Logs can even be browsed via the Microsoft Management Console (MMC) snap-in.
• Logging can be disabled by clearing the Tools > Enable Logging check box from
the Outpost main window.










