Cisco Cisco Content Security Management Appliance M390 Guía Del Usuario
15-7
AsyncOS 8.3 for Cisco Content Security Management User Guide
Chapter 15 Logging
Log Types
Log Type Comparison
summarizes the characteristics of each log type.
Using Configuration History Logs
A configuration history log consists of a configuration file with an additional section listing the name of
the user, a description of where in the configuration the user made changes, and the comment the user
entered when committing the change. Each time a user commits a change, a new log is created containing
the configuration file after the change.
the user, a description of where in the configuration the user made changes, and the comment the user
entered when committing the change. Each time a user commits a change, a new log is created containing
the configuration file after the change.
Table 15-4
Log Type Comparison
Contains
Tr
ansactiona
l
Stateless
Recorded as T
ext
Recorded as Binary
Header Logging
Per
iodi
c
St
a
tus
Information
Message Receiving
Information
Delivery Information
Individual Hard
Bounces
Individual Soft
Bounces
C
onfigu
ratio
n Information
Authentication Logs
•
•
Backup Logs
•
•
CLI Audit Logs
•
•
•
Configuration History Logs
•
•
•
FTP Server Logs
•
•
•
HTTP Logs
•
•
•
Haystack Logs
•
•
Text Mail Logs
•
•
•
•
•
•
•
•
LDAP Debug Logs
•
•
NTP Logs
•
•
•
Reporting Logs
•
•
•
Reporting Query Logs
•
•
•
SMA Logs
•
•
•
SNMP Logs
•
•
Safelist/Blocklist Logs
•
•
•
Spam Quarantine GUI
•
•
•
Spam Quarantine
•
•
•
Status Logs
•
•
•
System Logs
•
•
•
Tracking Logs
•
•
•
•
•
•
•
Updater Logs
•
•