Client Log Settings for
group name

You can use this dialog box to perform the following tasks:
  • To enable the uploading of log information from clients to the management server.
  • To set size, time of retention, and damper options for the upload cache that is used on the clients
If some network computers do not connect for long periods of time, it may be useful to limit the size of the upload cache. These settings apply to all the clients in the group.
These settings apply only to the log entries that are kept in the upload cache. They do not affect the number of entries or size of the logs that the client keeps.
Group settings for client logs
Option
Description
Maximum Size
Specifies the maximum size of the data that you want to upload in this log.
The default value is 512 KB for the System, Security and Risk, and Traffic logs. The default value is 1024 KB for the Packet log and the Control log.
Retain for
Specifies the number of days that you want to keep data.
The default value is 14 days.
Upload to management server
Specifies that you want the clients in this group to send this log up to the management server.
The default value is to upload the logs.
Damper period
Specifies the amount of time you want the client to spend condensing similar log records in to a single record.
The default value is 7200 seconds (2 hours).
Damper idle
Specifies the maximum amount of time you want a client to wait between the condensing of similar log records into single records.
The default value is 10 seconds.
Upload maximum size
Specifies the maximum number of records that you want a client to upload to the manager at a time.
The default value is 100 records.
You can view the information from the client logs from the console or by using a web browser.
Displaying information from client logs on the console
Client log
Where to view the information in the console
System Log
View this information in the
System Client Activity
log.
Security and Risk Logs
View this information in the
Risk
log.
Security Logs
View this information in the
Application Control
log, the
Compliance
>
Client Host Integrity
log, and the
Network and Host Exploit Mitigation
>
Attacks
log.
Traffic Log
View this information in the
Network and Host Exploit Mitigation
>
Traffic
log
Packet Log
View this information in the
Network and Host Exploit Mitigation
>
Packets
log.
Control Log
View this information in the
Application Control
log and the
Device Control
log.