Cisco Cisco Customer Voice Portal 8.0(1) Installation Guide

Page of 40
Double-click the Cisco Security Agent icon—the white shield with a red flag in the
Windows system tray.
Click Events (on the left, in the Tasks section).
Click View.
Note: Clicking Purge deletes all events stored in securitylog.txt. However, csalog.txt still
contains that information.
You can also:
Copy securitylog.txt to a machine that has Excel and change the name to securitylog.csv.
Double-click securitylog.csv, opening it as an Excel spreadsheet.
You may find it most convenient to see the contents of a spreadsheet cell by clicking on
the cell and looking at the contents in the field above the spreadsheet matrix.
For diagnosing problems, the most important fields are DateTime, Severity, Text, and User.
Ignore the RawEvent field; it contains essentially the same information that is presented in the
other fields, but in a form that is unprocessed, and difficult to read.
The ordering of the severity levels, from least to most severe, is:
Information
Notice
Warning
Error
Alert
Critical
Emergency
Understanding How the Cache Works
Cisco Security Agent caches your responses to queries. This is a convenience feature, so that
you do not have to respond to a popup each time you do a repetitive action.
When you are queried, the Agent remembers the response permanently or temporarily. This
way, when the same rule is triggered again, the action is allowed, denied, or terminated based
on the answer that was provided previously with no popup query box appearing again either
permanently or for some period of time.
Cisco Security Agent Installation/Deployment Guide for Cisco Unified Customer Voice Portal Release 8.0(1)
22
Chapter 8: Messages, Logs, and Caching
Event Messages and Log Files