Symantec 10521146 - Network Security 7120 Administration Manual page 200

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

200 Monitoring
Examining incident and event data
Note: Notify us of your iButton's impending expiration. Replace it before it
expires to ensure that the log files continue to be signed and the iButton can
continue to perform its authentication and data hashing functions. See the
Symantec Network Security Installation Guide for instructions on iButton
replacement.
iButton Certificate Expiration: Several times during the 30 days prior to the
expiration of your encryption certificate, warnings of the impending
expiration are displayed in the Active Incidents tab. The notices are sent
every 6 hours. The priority of the notices increases as the certificate lifetime
gets shorter:
Lifetime
life < 1 hour
1 hour =< life < 1 day
1 day =< life < 3 days
3 days =< life < 1 week
1 week =< life < 1 month
Warnings of the impending expiration are displayed in the Active Incidents
tab. Expiration dates are also displayed when Symantec Network Security is
restarted.
Network Security SuperUser Login: Symantec Network Security displays
this event whenever a SuperUser logs into the Network Security console.
Network Security Administrator Login: Symantec Network Security
displays this event whenever an Administrator logs into the Network
Security console.
Network Security StandardUser Login: Symantec Network Security
displays this event whenever a StandardUser logs into the Network Security
console.
Network Security RestrictedUser Login: Symantec Network Security
displays this event whenever a RestrictedUser logs into the Network
Security console.
Email Initiation Request Failed: An error occurred while sending an email
notification from Symantec Network Security.
Successful Email: An email response was successfully sent by Symantec
Network Security.
Priority
Critical
Urgent
High
Medium
Low

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents