3
To export the file, select Export.
A link to a .txt file appears in the browser's lower left corner.
Available logs are described in the following table. If a log file is empty, however, it will
not appear in the drop-down list of available logs.
Log
ampws.log
auth.log
btmp
daemon.log
debug
Figure 7, Logs
Table 7, Logs
Description
Contains information about protection status and logs
protection events with temperature information at the
time of event.
Contains system authorization information, including
user logins and authentication methods that were
used.
Contains information about failed login attempts.
Contains information logged by the various back-
ground daemons that run on the system.
Contains errors and debug information.
17