List of logs
Logs are listed alphabetically.
A-J

-
Apache access log
Logs details of Apache access.
-
Apache error log
Logs details of Apache errors.
-
Audit
Logs information from the service responsible for adding reporting data to the report database, and generating scheduled reports.
-
Avira Scanner
Secure Web Gateway checks for new anti-virus definitions at frequent intervals. If new updates are available from Avira, it downloads them and validates them to ensure they are fit for live deployment. This log shows the messages output by the download and validation scripts.
When exported to a syslog server, the time stamp of this log represents the time of export, rather than the time the log was generated. -
Backup Log
Logs details of backups.
-
Console Authentication
Logs the use of secure shell (sshd) to log in to the Secure Web Gateway Console, and the user of the su command from the Console.
-
Decryption Service Log
Logs events from the HTTPS decryption layer.
-
General System
Log output from syslog-ng.
-
Hardware Event Log
Logs information about hardware events, such as disk-failures and temperature warnings.
-
Health and Statistics Gatherer
Logs information about statistics displayed by the Health page.
-
Infrastructure
This service manages Alarms and Housekeeping tasks.
K-R

-
Kerberos Log
Logs Kerberos details.
-
Kernel
Logs Linux kernel information.
-
Mail Alert Transport
Logs Mail Alert Transport information.
-
Messaging Service
Logs details of message transactions between Secure Web Gateway and a connected Information Governance server (IGS) or Critical Information Protection server (CIPS).
-
Peer Communications
Logs details of peer communications.
-
Proxifier Log
Log for the service which intercepts HTTPS traffic when transparency is enabled.
-
Proxy Transaction Log
Logs completed request transactions in Web Server Extended Log File format.
S-Z

-
Services
Logs the starting and stopping of the system services during:
- System startup
- System shutdown
- Installation of a software upgrade
When exported to a syslog server, the time stamp of this log represents the time of export, rather than the time the log was generated. -
Service Availability Log
Logs the status history of supported services, including managed lists and anti-virus updates.
-
Sophos Scanner
Displays detected threats including the EICAR test, which is used by Sophos to validate updates to the anti-virus definitions.
When exported to a syslog server, the time stamp of this log represents the time of export, rather than the time the log was generated. -
Sophos Updates
Secure Web Gateway checks for new anti-virus definitions at frequent intervals. If new updates are available from Sophos, it downloads them and validates them to ensure they are fit for live deployment. This log shows the messages output by the download and validation scripts.
When exported to a syslog server, the time stamp of this log represents the time of export, rather than the time the log was generated. -
SQL Database Log
Logs information about the SQL database.
-
System Errors
Logs all system errors collectively.
-
System Maintenance Log
Logs output from general housekeeping (e.g. database optimization) and configuration deployment tasks
-
System Services
Logs data written to /var/log/cs-gateway/daemon.log, in particular from the Network Time Protocol service.
-
Transaction Log Export
Logs information about the Transaction Log Export Log.
-
Upgrade Service
Logs information from the service responsible for automatic software upgrades.
-
URL Category Database Update Log
Logs information about the URL Category Database Updates.
-
User Authentication
Logs information relating to Active Directory user authentication.
-
User Interface Service
Logs information from the Secure Web Gateway web server that handles user interface requests.
-
User Interface Service Access Log
Logs user session navigation information.
-
Web Proxy Events
Logs events information from the Web Proxy. The information recorded depends on the logging level (Error, Warning, or Information) selected on the Proxy Monitoring page.
-
Web Proxy Requests
Logs requests handled by the Web Proxy. To record the information, Proxy Request Logging needs to be enabled on the Proxy Monitoring page. This log file is purged of data older than 30 days, and displays an alarm if the data exceeds a default threshold value of 2 GB.
-
Web Transaction Log
Logs web requests and responses