List of logs
Logs are listed alphabetically.
A-J

-
Audit
Logs information from the service responsible for adding reporting data to the report database, and generating scheduled reports.
-
Avira Scanner
Secure Exchange Gateway checks for new anti-virus definitions at frequent intervals. If new updates are available from Avira, it downloads them and validates them to ensure they are fit for live deployment. This log shows the messages output by the download and validation scripts.
When exported to a syslog server, the time stamp of this log represents the time of export, rather than the time the log was generated. -
Backup Log
Logs details of backups.
-
Console Authentication
Logs the use of secure shell (sshd) to log in to the Secure Exchange Gateway Console, and the user of the su command from the Console.
-
Exchange Message Transport Server
Logs activity on the Exchange server including configuration and file system changes.
-
General System
Log output from syslog-ng.
-
Hardware Event Log
Logs information about hardware events, such as disk-failures and temperature warnings.
-
Health and Statistics Gatherer
Logs information about statistics displayed by the Health page.
-
Infrastructure
Logs information from the service responsible for message area management, batch processing, managed downloads, and message tracking.
K-R

-
Kernel
Logs Linux kernel information.
-
LDAP Agent
Logs information from the service responsible for updating LDAP Synchronized Address Lists.
-
Manager Relationship Updater
Logs when synchronization of the data in the manager relationships file occurs.
-
Message Transactions
Logs details of messages processed by Secure Exchange Gateway. The Message Transaction log displays the date and time of the event, the message ID, message event type and outcome, attachment names and sender and recipient information. Message Transaction logs are recorded once per hour, with a delay of approximately 10 minutes.
-
Messaging Service
Logs details of message transactions between Secure Exchange Gateway and a connected Information Governance server (IGS) or Critical Information Protection server (CIPS).
-
Peer Communications
Logs details of peer communications.
-
PMM End User Operations
Logs the following PMM operations:
- ARL: message automatically released because the sender was trusted
- NFY: message digest sent to a user
- DLT: message deleted by a user
- LNK: request to send a user a link to their trusted sender management page (PMM Lite mode only)
- RFP: false-positive reports when a message is released as Not Junk Email
- RLS: message released by a user
- Queries made to Active Directory as a result of users logging in to the PMM portal
-
PMM Infrastructure
Logs information from the service that generates PMM message digests and actions users' PMM deliver and delete requests.
-
PMM User Interface Server
Logs warnings for any discrepancies in the certificate
A digital means of proving your identity. When you send a digitally-signed message, you are sending your certificate and public key. Certificates are issued by a certification authority and can expire or be revoked. used by the server.
-
PMM User Interface Service
Logs information from the web server that responds to users' PMM Deliver and Delete requests.
-
Policy Enforcement
Logs information from the Secure Exchange Gateway Policy Engine.
-
Policy Enforcement Alerts
Logs all alerts generated by the Secure Exchange Gateway Policy Engine, including those generated as a result of "Generate an Alert" actions in content rules.
S-Z

-
Services
Logs the starting and stopping of the system services during:
- System startup
- System shutdown
- Installation of a software upgrade
When exported to a syslog server, the time stamp of this log represents the time of export, rather than the time the log was generated. -
Service Availability Log
Logs the status history of supported services, including managed lists and anti-virus updates.
-
SMTP
Logs information from the inbound and outbound Postfix.
AUTH: Successful SMTP authentication is indicated with details.
-
Sophos Scanner
Displays detected threats including the EICAR test, which is used by Sophos to validate updates to the anti-virus definitions.
When exported to a syslog server, the time stamp of this log represents the time of export, rather than the time the log was generated. -
Sophos Updates
Secure Exchange Gateway checks for new anti-virus definitions at frequent intervals. If new updates are available from Sophos, it downloads them and validates them to ensure they are fit for live deployment. This log shows the messages output by the download and validation scripts.
When exported to a syslog server, the time stamp of this log represents the time of export, rather than the time the log was generated. -
SQL Database Log
Logs information about the SQL database.
-
System Errors
Logs all system errors collectively.
-
System Maintenance Log
Logs output from general housekeeping (e.g. database optimization) and configuration deployment tasks
-
System Services
Logs data written to /var/log/cs-gateway/daemon.log, in particular from the Network Time Protocol service.
-
Transaction Log Export
Logs information about the Transaction Log Export Log.
-
Upgrade Service
Logs information from the service responsible for automatic software upgrades.
-
User Authentication
Logs information relating to Active Directory user authentication.
-
User Interface Service
Logs information from the Secure Exchange Gateway web server that handles user interface requests.
-
User Interface Service Access Log
Logs user session navigation information.