Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Deleting or Downloading Logs

Log entries stored in the Management Server database can be downloaded or deleted via the administration interface. These actions can be performed on Event Logs, Audit Logs and Secure Shell/SSH Tectia Server Logs separately. The administrator specifies a time period, the action to perform (delete/download), and the type of log entries it should be performed on.

[Note]Note

SSH Tectia Connector logs are stored in the same database tables as Secure Shell/SSH Tectia Server logs and will be affected by any actions taken on these tables.

To download logs:

  1. Click on Logging → Delete/download logs. From the Category drop-down menu, select the type of logs you wish to download. The choices are Secure Shell, Event Log, and Audit Log.

  2. Choose the start and end times for the download. By default, the start time is set several years in the past to pick up all log timestamps, and the end time is set to be 2 weeks prior to the current date.

  3. Click Download entries. On the following screen, click the link to download the XML file. On some browsers, you may want to right-click and save the file.

    [Note]Note

    Log entries that are downloaded are left in the database. If you wish to delete the downloaded entries, both steps must be performed separately with the administration interface.

To delete logs:

[Note]Note

The deletion of log entries from the database is permanent and cannot be undone.

  1. Click on Logging → Delete/download logs. From the Category drop-down list, select the type of logs you wish to delete. The choices are Secure Shell, Event Log, and Audit Log.

  2. Choose the start and end times for deletion. By default, the start time is set several years in the past to pick up all log timestamps, and the end time is set to be 2 weeks prior to the current date.

  3. Click Delete entries. You will be asked to confirm the deletion.


 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now