
14
Locate the line beginning: <Event id=“50059”. Update the entry to read:
<Event id=“50061” group=“detection” enabled=“yes” default=“no” su/jointfilesconvert/329371/bgroup=“generic”
level=“1” high‑volume=“yes”/>
15
Save the updated file in text format.
16
Recreate the ZIP file from the root directory of the extracted ZIP file.
17
On the user interface, navigate to System | System Administration | Configuration Management.
18
Select Restore From File.
19
Browse to the modified ZIP file, and select Import Config.
20
Apply your changes.
SSL failure events, creation/termination of HTTPS connections, and Web Mail Client events will be
logged in /var/log/messages, with the event id 220050, 220051 and 50061, respectively. You can view
the logs by navigating to System | Logging, Alerting and SNMP | System Log Settings and selecting View the system
logs.
Export audit logs
Follow this process to export audit logs over SSH.
Task
1
Navigate to System | Logging, Alerting and SNMP | System Log Settings.
2
Scroll down the page, and select System Log Archive.
3
Select Transfer via SSH.
The audit logs are exported.
3
Maintaining a TOE configuration
Configure additional settings for Common Criteria
26
McAfee
®
Email Gateway 7.0.1
Common Criteria Evaluated Configuration Guide
Appliances
Kommentare zu diesen Handbüchern