From the Foglight® Administration Console, users can select security and change audit logs for a specific time period and display those logs in the Audit Viewer.
The following information appears in each log entry in the table:
Audit log entries are stored in the Foglight database.
A subset of the Foglight methods that are audited includes:
The following information is recorded in the Foglight® log files on the Management Server:
Foglight® masks password entries with asterisks to prevent them from being displayed. Foglight also masks agent properties that are marked as sensitive.
Uninstalling Foglight® leaves certain files in the Foglight folder, and database content (schema) is not deleted. Only the internally embedded database is erased on uninstall. If required, the customer must delete the Foglight files from the file system manually.
© ALL RIGHTS RESERVED. 使用条款 隐私 Cookie Preference Center