Log Actions - Check Point HARMONY R81 Administration Manual

Endpoint server
Table of Contents

Advertisement

Log Actions

This setting defines when Media Encryption & Port Protection creates log entries when a
storage device is attached to an endpoint computer. You can select one of these predefined
log actions:
Action
Do not log security
events
Log only critical events
Log critical and security
events
Log all events
You cannot define custom log actions.
This table shows the applicable Media Encryption & Port Protection events and their severity
classification.
Event
Description
ID
3
Policy update completed successfully
7
Device authorization successful
8
Device authorization failed
11
Device access is blocked when attached to the endpoint
computer
15
Encrypted storage created successfully
16
Encrypted storage device removed
20
Device is attached to an endpoint computer and access is
allowed
21
A user follows the Ask User procedure to override a rule
22
A users does not follow the Ask User procedure to override a
rule
23
A storage device file operation is blocked
Description
Disable all log entries.
Create log entries only for events that are classified as critical.
Create log entries only for events that are classified as critical
or security events.
Create log entries for all events.
R81 Harmony Endpoint Server Administration Guide      |      271
Log Actions
Classification
Low
Low
Critical
Critical
Low
Critical
Security
Critical
Critical
Critical

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the HARMONY R81 and is the answer not in the manual?

Table of Contents

Save PDF