Your browser does not allow storing cookies. We recommend enabling them.

PreviousNextUp[Front page] [Index]

Viewing Log Entries

Log events can be searched by clicking View Log Entries on the main menu. The search options are the same as on the main Database Search page, with the exception that the searched Log events can be restricted based on the event type.

Figure : Searching for log entries

To start the search, click the Proceed button. After the search is complete, the results are displayed. Depending on the event and object type there may be additional links beside the log entry.

Figure : Search results for log entries

Some objects such as CAs and Certifier Servers allow detailed auditing of the made changes. Clicking the view original link shows the object in its original state before the logged change. Changes between revisions can be viewed by clicking the Prev and Next buttons. An example of CA settings is shown in Figure Auditing changes.

Figure : Auditing changes

PreviousNextUp[Front page] [Index]




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now