Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - ADAPTIVE LOG EXPORTER REV1 Manual page 54

Strm adaptive log exporter
Table of Contents

Advertisement

52
C
ONFIGURING THE
W
E
L
D
INDOWS
VENT
OG
EVICE
or as a member of the administrators group to enable, use, and specify which
events you wish to record in the security log.
System Log — Select the check box if you wish the device to monitor the
system log. The system log contains events logged by Windows XP system
components. For example, if a driver fails to load during startup, an event is
recorded in the system log. Windows XP predetermines the events that are
logged by system components.
Remote Machine— Select the check box if you wish the device to retrieve the
logs from a remote machine. Enter the desired Universal Naming Convention
(UNC) name. The entered string can be up to 255 characters in length. For
example, \\tango123
Note: When accessing remote logs, make sure that you configure the Adaptive
Log Exporter service to run as a user with Administrative privileges on the remote
system. For more information, see the Configure how a service is started technical
note on www.microsoft.com.
Poll Interval — Specify the remote poll interval enter a value, in milliseconds.
The default is 5000 milliseconds.
STRM Adaptive Log Exporter

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents