No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

eSight V300R010C00 Maintenance Guide 07

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Security Logs

Security Logs

Security logs record security operations that are performed on the eSight, such as logging in to the server, changing passwords, creating users, and logging out of the server.

Log Format and Content

Log format: Operation Level Operator Time Terminal Operation Object Result Details

Log example: User login Minor admin 2016-03-09 11:00:05 10.134.49.62 LocalNMS Success User name: admin

Table 9-254 describes the preceding parameters in the log format.

Table 9-254 Parameters in a security log

Parameter

Description

Operation

Name of an operation performed on the eSight.

Operation Level

Level of the damage caused by an operation performed on the eSight, such as warning, minor, and risk.

User Name

User who performs an operation.

Executed on

Time when an operation is performed. It is accurate to second.

Terminal

IP address of the host where an operation is performed.

Operation Object

Object that an operation is performed on.

Result

Operation result, such as success, failure, and partial success.

Details

Other information about an operation.

Querying eSight Security Logs

The security logs of the eSight record the operations that affecting security of the eSight. By querying the security logs, you can know the operations performed on the eSight client and take proper measures to ensure the normal running of the eSight.

Prerequisites
  • You have the operation rights for "Log Management".
  • You have logged in to the eSight client.
Context
  • Security logs are stored in the "T_SECURITYLOG" table of the database, and you can query security logs using the eSight client.
  • All security logs are queried if you do not set any search criteria.
  • The query result is generated based on the existing data in the database.
Procedure
  1. Choose "System > Security Management > Log Management" from the main menu.
  2. In the navigation tree in the left pane, choose "Log Management > Security Logs".
  3. On the "Security Logs" page, view the log information, or set search criteria to view specified log information.

    After clicking the value in the "Details" column of the target log, you can view logs details in "Security Log Details".

    NOTE:

    A maximum of 800 characters can be displayed in "Details". Contents other than the first 800 characters are displayed as "...".

    The eSight server time is used for the filter criteria "Time period". The value is 24 hours before the current time. For example, if the current time is 11:00:00, November 12, 2012, the default value of "Time period" is from 11:00:00, November 11, 2012 to 11:00:00, November 12, 2012.

  4. (Optional) Export the security logs and back them up for future analysis.

Switching between pages will cause log exporting to be interrupted.

Task

Procedure

Export all security logs

Click "Export All" to export all security logs.

Export the selected security logs

  1. In the log list, select the check box before "Operation" of the required log.
  2. Click "Export Selected" to export the selected security logs.
NOTE:
  • Log files are automatically downloaded to the default save path specified in the browser.
  • Log files are saved in the ".zip" format, and decompressed to the ".csv" format.
Translation
Download
Updated: 2019-06-30

Document ID: EDOC1100044373

Views: 24967

Downloads: 74

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next