ZoneAlarm 2019 software records various events in a log file. It also generates security alerts, which fall into one of these categories:
If you want to reduce the number of alerts, or log entries, or change which events your ZoneAlarm 2019 software records and which alerts it generates, you can:
To set the levels of alerts and logging events:
High | Shows all alerts. |
Medium | Default. Shows high-rated security alerts. Most of them indicate hacker activity. |
Off |
Shows Program alerts only. See Ensuring Application Security ("Using Application Control for Application Security" on page 44) for more information on this type of alerts.
Note - Program alerts let you decide whether to grant or to deny access to a particular program.
|
High | Default. Creates a log entry for every program alert. |
Medium | Creates log entries for high-rated program alerts only. |
Off | Does not create log entries for program alerts. |
You can further customize the list of alerts and logs you want to see.
To select the alerts and logs you want to see:
You can also clear all logs and customize these logging settings:
To set the log archive frequency:
By default, the logs are saved in:
You can change the location and the name of the log file.
To change the log archive location:
To view the log file in a text editor:
Click View Log.
To delete the log file:
To reset logging settings to default:
Click Reset to Default.
To resent all logging counters:
Click Reset Counters.
To save and exit:
Click OK.
All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html for a list of relevant copyrights and third-party licenses.