Network security support
3.11
Configure logging
53
UM Security BRS-2A
Release
8.7
05/2022
3.11 Configure logging
Configure logging severity levels and destinations.
The necessary settings depend on our security requirements. See the user manual "Configuration"
on how to configure logging severity levels and destinations.
Note: Secure logging also relies on the synchronization of the device system clock to a trustworthy
source (see on page 35 “Configure time synchronization”).
The audit trail function is always active and cannot be disabled. Neither can the audit trail be
deleted by resetting the device to the delivery state.
3.11.1 Configure an audit trail
Note: The audit trail function is always active and cannot be disabled. Neither can the audit trail be
deleted by resetting the device to the delivery state.