立即与支持人员聊天
与支持团队交流

ControlPoint 8.8.1 - for Office 365 Administration Guide

Preface The ControlPoint Configuration Site Managing Your Farm List Managing Your ControlPoint License Updating the ControlPoint Scheduler Windows Job Setting Up ControlPoint Services Using Discovery to Collect Information for the ControlPoint Database Cache Using Sensitive Content Manager Services Preparing Your Environment for Using ControlPoint Sentinel Registering and Re-registering the ControlPoint Online App for Modern Authentication Running ControlPoint Online Operations Using PowerShell Modifying ControlPoint Configuration Settings
Changing Default Settings for Actions and Analyses Changing Default Settings to Improve Application Performance Changing Settings to Improve Discovery Performance Changing Default Settings for Navigation Changing Trace Switch Logging Levels Changing Default Settings for Compliance Managing Site Provisioning Settings Setting Preferences for the ControlPoint Scheduler Changing Settings for Anomalous Activity Detection Miscellaneous and Custom Configuration Settings Special-Purpose Configuration Settings ControlPoint Online-Specific Settings
Troubleshooting

Changing Trace Switch Logging Levels

ControlPoint contains a number of trace switches that control the type and level of detail that is captured in the ControlPoint Administration (xcAdmin) log. Quest Support may suggest that one or more of these be changed for diagnosis and troubleshooting purposes.

NOTE Trace switches are Advanced settings.

Valid values for all trace switches, listed from least to most detail, are:

·Disabled

·Error (the default)

·Warnings

·Info

·Verbose

Trace Log Valid Values

Note that as the logging level increases, the amount of detail is "additive." For example, if you select the logging level Info, then Errors and Warnings will also be included.

If you want to change the logging level  for...

Edit the following setting ...

the SharePoint hierarchy building for navigation and selection

SharePoint Hierarchy Access Logging

the amount of time it takes the SharePoint Hierarchy to load

SharePoint Hierarchy Load Time Logging

reports and actions general processing

Traverse Entry Logging

Additional Traverse Entry Logging

the interaction between ControlPoint and databases

Database Interaction Logging

the validation of SharePoint users by ControlPoint

SharePoint Access Logging

aspx page major events

aspx Page Major Event Logging

the interaction between ControlPoint and Active Directory

Active Directory Interactions Logging

operations performed by the ControlPoint Scheduler

ControlPoint Scheduler Logging

the management of linked SharePoint groups

Manage Linked SharePoint Group Logging

WCF Services calls

WCF Service Call Logging

ControlPoint Policies and Site Provisioning operations

ControlPoint Policies Logging

copy/move at set site properties operations

Copy/Move and Set Site Properties Logging

non-specific events

Non-Specific Event Logging

Audit Log archiving

Audit Log Archive Logging

Workflow reporting for the Comprehensive User Analysis

Comprehensive User Workflow Report Logging

access to the Managed Metadata Service Application database

Managed Metadata Service Application Database Access Logging

ControlPoint operations performed via PowerShell

PowerShell Processing Logging

Set List properties operations

Set List Properties Logging

Social Activity Analysis processing

Social Activity Analysis Logging

ControlPoint Statistics Lists calculations

Statistics Lists Calculation Logging

the ControlPoint Database Recovery operation

ControlPoint Database Recovery Logging

Changing Default Settings for Compliance

These configuration settings display in the ControlPoint Settings list under the category Compliance, and apply when Sensitive Content Manager is installed in your environment.

Compliance Endpoints

As an alternative to setting all Sensitive Content Manager EndPoints via the Sensitive Content Manager Configuration Maintenance dialog (the recommended method) you can set them individually.

The Value of each Compliance EndPoint must be set to point to the server(s) on which Sensitive Content Manager is configured your environment.  Use the information in the following table for guidance.

EndPoint

Sensitive Content Manager Configuration Maintenance Equivalent

Web Services Endpoint for Compliance Scan Upload
(ComplianceUploadURL)

Sensitive Content Manager Upload EndPoint

Web Services Endpoint for Compliance Scan Results
(ComplianceResultsURL)

Sensitive Content Manager Results EndPoint

Web Services Endpoint for Compliance Profile Requests
(ComplianceProfileURL)

 

Sensitive Content Manager Profile EndPoint

ComplianceSubQuestionURL

Sensitive Content Manager Search Terms

Compliance Alert Email Text

When a Compliance Action Rule specifies that an alert be sent, ControlPoint automatically sends an email for the applicable severity level to the appropriate user(s)..

ControlPoint Application Administrators can, however, modify the default text, as described in the following table.

If you want to change the text of the email that is sent to alerted user(s) when ...

Then change the Parameter of the ControlPoint Setting ....

From the default text...

the threat level is Mild

ComplianceMildLevelThreatsEmailBody

The document @@DocumentName@@ in the location @@ListUrl@@ contains content that has been identified as posing a Mild level of threat, and Metalogix ControlPoint has taken the following compliance action:  @@Action@@.

the threat level is Moderate

ComplianceModerateLevelThreatsEmailBody

The document @@DocumentName@@ in the location @@ListUrl@@ contains content that has been identified as posing a Moderate level of threat, and Metalogix ControlPoint has taken the following compliance action:  @@Action@@.

the threat level is Severe

ComplianceSevereLevelThreatsEmailBody

The docment @@DocumentName@@ in the location @@ListUrl@@ contains content that has been identified as posing a Severe level of threat, and Metalogix ControlPoint has taken the following compliance action:  @@Action@@.

No

Where the following variables are used:

·@@DocumentName@@ is the name of the item that contains the non-compliant content.

·@@ListUrl@@ is the location of the list that contains the non-compliant item

·@@Action@@ is the Compliance Action that has been carried out.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级