Network security support
3.11
Configure logging
53
UM Security BRS-2A
Release
8.7
05/2022
3.11
Configure logging
Configure logging severity levels and destinations.
The necessary settings depend on our security requirements. See the user manual "Configuration"
on how to configure logging severity levels and destinations.
Note:
Secure logging also relies on the synchronization of the device system clock to a trustworthy
source
(see on page 35 “Configure time synchronization”)
.
The audit trail function is always active and cannot be disabled. Neither can the audit trail be
deleted by resetting the device to the delivery state.
3.11.1
Configure an audit trail
Note:
The audit trail function is always active and cannot be disabled. Neither can the audit trail be
deleted by resetting the device to the delivery state.
Summary of Contents for HIRSCHMANN HiOS-2A
Page 6: ...Contents 6 UM Security BRS 2A Release 8 7 05 2022 ...
Page 8: ...Document History 8 UM Security BRS 2A Release 8 7 05 2022 ...
Page 10: ...Safety instructions 10 UM Security BRS 2A Release 8 7 05 2022 ...
Page 54: ...Network security support 3 11 Configure logging 54 UM Security BRS 2A Release 8 7 05 2022 ...
Page 62: ...Index 62 UM Security BRS 2A Release 8 7 05 2022 ...
Page 66: ......