User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Viewing the Event Log
342 Check Point Safe@Office User Guide
b. Press CTRL+C.
If you are using Internet Explorer, and this is the first time that you copy logs, a
dialog box asks you whether you want to allow the Safe@Office Portal to access
your clipboard. In this case, click Allow access.
The selected logs are copied to your clipboard.
8. To clear all displayed events:
a. Click Clear.
A confirmation message appears.
b. Click OK.
All events are cleared.
Table 56: Event Log Columns
This column... Displays...
No The log message number
Date The date on which the event occurred, in the format DD:MM:YYYY,
where:
DD=date
MM=month, in abbreviated form
YYYY=year
Time The time at which the event occurred, in the format hh:mm:ss, where:
hh=hour
mm=minutes
ss=seconds
Information A description of the logged event