If you have access rights to a server configuration, you can view its
security event log at any time. The security event log is not a typical .Log
file, as its data is stored in the application database. This operation can be
performed only when the server is running.
To view the security event log
Depending upon the number of users and the amount of activity on a
server configuration, the security event log may grow rapidly. To keep the log
to a reasonable size, you can have the Server delete old entries. First, decide
how long you want to have security events available, then configure the server
configuration to purge entries that are older than this time period. This
operation can be performed only when the server is running.
To set the interval for purging the security event log
- Open the
Server Administration tool.
If you are using the
Server Administration tool
installed with the client, you can administer remote servers only.
- Select the appropriate
server configuration from the list of servers. If you have not yet logged on,
you will be asked to do so.
- Click
from the menu. The
System Policy dialog box appears.
- Select the
Security Events tab.
- Select the
Purge Security Event Entries Older Than __
Days check box. (Clearing this check box keeps the entries
indefinitely.)
- Type the number of days in
the text box. The range is 30 to 1000. The default is 180. The next time the
server configuration starts, entries that exceed the purge limit are deleted.
- Click
OK.
- Restart the server
configuration for the purge interval to take effect.