EasyManua.ls Logo

Belden HIRSCHMANN HiOS-2A - Configure Logging; Configure an Audit Trail

Belden HIRSCHMANN HiOS-2A
66 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Network security support
3.11
Configure logging
53
UM Security BRS-2A
Release
8.7
05/2022
3.11 Configure logging
Configure logging severity levels and destinations.
The necessary settings depend on our security requirements. See the user manual "Configuration"
on how to configure logging severity levels and destinations.
Note: Secure logging also relies on the synchronization of the device system clock to a trustworthy
source (see on page 35 “Configure time synchronization”).
The audit trail function is always active and cannot be disabled. Neither can the audit trail be
deleted by resetting the device to the delivery state.
3.11.1 Configure an audit trail
Note: The audit trail function is always active and cannot be disabled. Neither can the audit trail be
deleted by resetting the device to the delivery state.

Table of Contents

Related product manuals