Примеры использования Log settings на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Log Settings Window Control Elements.
Restarting the command with the same log settings will overwrite the existing log file.
Under Log settings clear the Use profile settings check box.
Use the Log> Settings command from the same menu to customize log settings. .
In the Log Settings section, click any link to open the Log Settings window.
You can view the full name of a detected object in the task log see Section"Configuring log settings" on page 152.
By default, the Event log settings are defined by the profile that includes the protected server.
In the Notification settings window that will open, check the boxes for the required events in the Log field and click the Log Settings button.
All registry keys and other configuration settings(for example, audit log settings and folder location settings) set in DHCP server properties.
Configuring log settings in Kaspersky Security 10.1 Console You can edit the following settings of logs of Kaspersky Security 10.1 for Windows Server.
Mof hardware configuration inventory file,the security event log settings of client computers must also be configured to log success logon events.
Configuring log settings in Kaspersky Embedded Systems Security Console You can edit the following settings of logs of Kaspersky Embedded Systems Security.
Possibility to configure common application settings for all servers in the array, such as update settings, Backup settings, and log settings. .
If you are configuring the Event log settings for a separate server, select a server see section"Viewing and editing server settings" on page 36.
If the trace log is maintained andyou wish to change its settings, enter KAVSHELL TRACE command with/ON key and specify log settings with values of/S and/LVL keys see table below.
If the security event log settings are not set correctly, these reports will contain no data, even if the appropriate hardware inventory reporting class is enabled.
To ensure that Kaspersky Anti-Virus uses the values configured in the server settings, clear the Use profile settings check box on the General settings tab in the Log settings section.
For more information about modifying security event log settings to log all Success logon events, see How to Enable Success Logon Event Logging. .
From one of the collections, select one or multiple resources for which you want to enable auditing or update the audit settings, right-click and select Out of Band Management, andthen click Enable Auditing and Apply Audit Log Settings.
If you do not change the log settings when you enable trace log generation, Kaspersky Endpoint Security will trace Kaspersky Endpoint Security subsystems with the Debug information level of detail.
To enable the hardware inventory client agent to inventory the information requiredto support these reports, you must first modify the Windows security event log settings on clients to log all Success logon events, as well as enable the SMS_SystemConsoleUser SMS_def. mof reporting class.
Configure the Event log settings(see section"Configuring Event log settings" on page 70) or statistics storage settings see section"Configuring statistics settings" on page 71.
To define the logging settings, perform the following steps.
In the Logs settings window, configure the logs in accordance with your requirements.
Upon app deletion, PHP error logging setting is disabled.
In the Logs settings window define the following settings of Kaspersky Security 10.1 for Windows Server according to your requirements.
If the application is running on a Microsoft Exchange DAG, the logging settings configured on one of the servers will be automatically applied to all servers within the DAG.
Use the FTP Logging feature page to configure logging features at the server or site level,and to configure logging settings.
If you move to another PDA, and you wish to keep your data and settings, make a backup, remove the card, insert it into the other PDA, then return to this Settings page, and push the Restore Data button as described in the next section. iGO will then restart, and all your previous POIs,track logs, settings, city and find history lists will also appear on the new PDA.
System Inspection: management of settings for control of file operations and Windows Event Log inspection settings.