User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Viewing the Event Log
Chapter 12: Viewing Logs 339
Chapter 12
This chapter describes the Safe@Office appliance logs.
This chapter includes the following topics:
Viewing the Event Log.............................................................................339
Viewing the Security Log.........................................................................34
3
Viewing the Event Log
The Event Log displays general appliance events, including the following:
• Authentication attempts
• Changes in setup
• Internet connection status changes
• Errors
• Warnings
This information is useful for troubleshooting. You can export the logs to an *.xls
(Microsoft Excel) file, and then store it for analysis purposes or send it to technical
support.
Note: You can configure the Safe@Office appliance to send event and security logs
to a Syslog server. For information, see Configuring Syslog Logging on page
689.
Viewing Logs