Solved

checkpoint R75 security logging SmartView Tracker/Monitor

Posted on 2014-04-09
3
585 Views
Last Modified: 2014-04-18
hi,

when looking at the SmartView Tracker I can only see access logs and network activity for today, how can I see past logs and configure retention of the logs ?

thanks.
0
Comment
Question by:iNc0g
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 28

Accepted Solution

by:
mikebernhardt earned 500 total points
ID: 39990344
Go to File/Open and select previous log of your choice.
0
 

Author Comment

by:iNc0g
ID: 39990833
Thanks.  is there an option to configure how long logs are being kept ?
also, when are they deleted automatically?

thanks.
0
 
LVL 28

Expert Comment

by:mikebernhardt
ID: 39992481
Not sure. I think there's a separate scripted process for archiving the logs and purging them.

According to the help, you may find what you need in Checkpoint Security Gateway properties, but I don't know where that is to be found.
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
Optimal Xbox 360 connectivity requires "OPEN NAT". If you use Juniper Netscreen or SSG firewall products in a home setting, the following steps will allow you get rid of the dreaded warning screen below and achieve the best online gaming environment…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question