HP XP20000/XP24000 HP StorageWorks XP24000/XP20000 Audit Log Reference Guide ( - Page 3

Contents, Information Output in the Audit Log Information File

Page 3 highlights

Contents 1 Introduction 12 Purpose of Audit Logs...12 Download the Audit Log Information Files to the Remote Web Console Computer 13 Download the Syslog Information File to the Remote Web Console Computer 13 Transferring the Audit Log Information File to the FTP Server 13 Transferring the Audit Log Files to Syslog Servers 15 Storing Audit Logs...17 Audit Log File Description...18 2 Audit Log File Format 20 Audit Log Information File...20 Syslog Information File...22 Syslog Information File Monitoring Threshold 26 3 Information Output in the Audit Log Information File 27 Operation of Remote Web Console and SVP 27 Receiving Command from the Host 36 DKA Encryption License Key Operation 36 PIN Deletion Tool Operation...36 Audit Log Reproduced Output 37 Audit Log Lost Output...37 4 Sample Audit Logs of Remote Web Console PC and SVP Operations 38 5 Account Function 39 Set User Account Operation...39 Set Login Message Operation 41 6 Audit Log Function 43 Audit Log Buffer...43 Create File...43 DKCAuditLog was lost...43 Over MaxLine Event...44 Over Threshold Event...44 Set FTP Server Operation...44 Set Syslog Server Operation...45 SIM Complete Operation...46 7 BASE Function 47 Certificate Update Operation 47 Control Panel Backup Operation 47 Control Panel Restore Operation 48 Delete CVAE Info Operation...48 Environment Setting Operation 49 Login Operation...49 Logout Operation...50 Release HTTP Block Operation 50 Contents 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279

Contents
1 Introduction
.............................................................................................
12
Purpose of Audit Logs
..............................................................................................................
12
Download the Audit Log Information Files to the Remote Web Console Computer
............................
13
Download the Syslog Information File to the Remote Web Console Computer
.................................
13
Transferring the Audit Log Information File to the FTP Server
..........................................................
13
Transferring the Audit Log Files to Syslog Servers
.........................................................................
15
Storing Audit Logs
..................................................................................................................
17
Audit Log File Description
........................................................................................................
18
2 Audit Log File Format
................................................................................
20
Audit Log Information File
........................................................................................................
20
Syslog Information File
............................................................................................................
22
Syslog Information File Monitoring Threshold
.........................................................................
26
3 Information Output in the Audit Log Information File
......................................
27
Operation of Remote Web Console and SVP
..............................................................................
27
Receiving Command from the Host
............................................................................................
36
DKA Encryption License Key Operation
......................................................................................
36
PIN Deletion Tool Operation
....................................................................................................
36
Audit Log Reproduced Output
..................................................................................................
37
Audit Log Lost Output
..............................................................................................................
37
4 Sample Audit Logs of Remote Web Console PC and SVP Operations
..............
38
5 Account Function
......................................................................................
39
Set User Account Operation
.....................................................................................................
39
Set Login Message Operation
..................................................................................................
41
6 Audit Log Function
....................................................................................
43
Audit Log Buffer
......................................................................................................................
43
Create File
.............................................................................................................................
43
DKCAuditLog was lost
.............................................................................................................
43
Over MaxLine Event
................................................................................................................
44
Over Threshold Event
..............................................................................................................
44
Set FTP Server Operation
.........................................................................................................
44
Set Syslog Server Operation
....................................................................................................
45
SIM Complete Operation
.........................................................................................................
46
7 BASE Function
..........................................................................................
47
Certificate Update Operation
...................................................................................................
47
Control Panel Backup Operation
...............................................................................................
47
Control Panel Restore Operation
...............................................................................................
48
Delete CVAE Info Operation
....................................................................................................
48
Environment Setting Operation
.................................................................................................
49
Login Operation
.....................................................................................................................
49
Logout Operation
...................................................................................................................
50
Release HTTP Block Operation
.................................................................................................
50
Contents
3