Configuring The Windows Event Log Device - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - ADAPTIVE LOG EXPORTER REV1 Manual

Strm adaptive log exporter
Table of Contents

Advertisement

10
C
ONFIGURING THE
L
D
OG
EVICE
In Microsoft Windows, an event is any significant occurrence in the system, a
program that requires users to be notified, or an entry added to a log. The event
log device records application, security, and system events in the strm Event
Viewer. Using the Event Viewer, you view hardware, software, and system
component information. You can also monitor security events on a local or remote
computer. Event logs enable you to identify and diagnose the source of current
system problems or help you predict potential system problems.
This chapter provides information on configuring your Windows Event Log device
using the Adaptive Log Exporter. For information on adding or managing a device,
see
Chapter 4 Managing
Enter values the following parameters:
Application Log — Select the check box if you wish the device to monitor the
application log. The application log contains events logged by programs, for
example, a database program may record a file error in the application log. The
specific events recorded by the application log are determined by the software
program.
Security Log — Select the check box if you wish the device to monitor the
security log. The security log records events (for example, valid and invalid
logon attempts) and events related to resource use (for example, creating,
opening, or deleting files). You must be logged in with administrator privileges
STRM Adaptive Log Exporter
W
Devices.
E
INDOWS
VENT

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents