EFT Server activities can be logged in various places:
The main EFT Server activity log is saved in the Logs subdirectory of the installation directory (e.g., C:\Documents and Settings\All Users\Application Data\GlobalSCAPE\EFT Server Enterprise\Logs). The file name depends on the log file format (ex, in, nc) and the date/time it was created. For example, a log file in the Microsoft IIS format created on August 22, 2007 is named in070822.log.
When EFT Server’s Download and Copy/Move Action offloads or downloads files to/from other servers, the session is recorded to a client log file: cl[yymmdd].log, e.g., cl060312.log.
HTTP request headers, Authentication Manager activity, and Configuration load activity, can be saved to the EFT.log file using Log4Cplus logging.
EFT Server service startup and failure events appear in the Windows Event Viewer Application Log.
Auditing and Reporting module (ARM) errors can be logged to a text file and viewed in the Windows Event Viewer.
AS2 information is logged to the ARM database.
For more on logging, refer to Log Settings, The Client Log, The EFT.log, and EFT Server in the Windows Event Viewer.
Note: On Windows 2008, Application Data files for all users are in a hidden folder named %systemroot%\ProgramData instead of under Documents and Settings\All Users\Application Data.