User guide
xiv WatchGuard Firebox System
Viewing the WSEP application ..................................... 180
Starting and stopping the WSEP .................................. 181
Setting the log encryption key ..................................... 181
Setting Global Logging and Notification Preferences ...... 182
Log file size and rollover frequency ............................... 182
Setting the interval for log rollover ................................ 183
Scheduling log reports ............................................... 184
Controlling notification ............................................... 184
Setting a Firebox friendly name for log files .................... 185
Customizing Logging and Notification by Service or
Option
............................................................... 185
Setting Launch Interval and Repeat Count ...................... 187
Setting logging and notification for a service .................. 188
Setting logging and notification for default packet-handling
options
............................................................ 188
Setting logging and notification for blocked sites and ports 189
CHAPTER 14 Reviewing and Working with Log Files 191
Log File Names and Locations ...................................... 191
Viewing Files with LogViewer ........................................ 192
Starting LogViewer and opening a log file ...................... 192
Setting LogViewer preferences .................................... 192
Searching for specific entries ....................................... 193
Copying and exporting LogViewer data ......................... 193
Displaying and Hiding Fields ........................................ 195
Working with Log Files ................................................. 197
Consolidating logs from multiple locations ..................... 198
Copying log files ....................................................... 198
Forcing the rollover of log files ..................................... 198
Saving log files to a new location ................................. 199
Setting log encryption keys ......................................... 199
Sending logs to a log host at another location ................ 200
CHAPTER 15 Generating Reports of Network
Activity ................................................... 203
Creating and Editing Reports ........................................ 204
Starting a new report ................................................. 204