Logging And Log File Locations On Local Hosts; The Logfile.log File - F-SECURE CLIENT SECURITY 8.00 Administrator's Manual

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

9.5

Logging and Log File Locations on Local Hosts

9.5.1

The LogFile.log file

4. To set the scanning schedule, select either Daily, Weekly or Monthly
under Scan performed.
Select Daily to perform the scan every day at the scheduled time.
The weekdays on the right are all selected and greyed out.
Select Weekly to perform the scan every week at the scheduled
weekday and time. You can select as many weekdays from the
right as you like, and the scan is performed on each of the
selected days.
Select Monthly to perform the scan every month at the scheduled
date and time. You can select up to three days of the month on
which the scan is performed.
5. Select the start time of the scan from the Start time drop-down list. If
you want to start the scan only when the computer is not used, select
the After computer is not used for check box and select the idle time
from the drop-down list.
For instructions on how to configure scheduled scanning from the Policy
manage Advanced Mode user interface, see
Scanning", 255.
From the F-Secure Client Security local user interface you can access
several log files that provide you with data about the network traffic.
LogFile.log contains all alerts that F-Secure Client Security has generated
since its installation. The file has a maximum size to which it can grow.
Logfile.log is maintained by F-Secure Management Agent, and it can be
found on all hosts running F-Secure Management Agent.
Logfile.log is located in %Program Files%/F-Secure/Common directory,
and it can be viewed with any text editor, for example Windows Notepad.
You can also access the LogFile.log from the local user interface:
CHAPTER 9
"Configuring Scheduled
235

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CLIENT SECURITY 8.00 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Client security

Table of Contents