x RSView32 User’s Guide
Using the Activity Log Viewer ............................................................... 8-17
Selecting a record....................................................................................................... 8-18
Understanding records.............................................................................................. 8-19
Tracking system usage .............................................................................................. 8-19
Starting and stopping activity logging............................................. 8-20
Ways to start activity logging ................................................................................... 8-20
Ways to stop activity logging ................................................................................... 8-20
Chapter 9
Configuring events
How to use multiple event files ...............................................................9-1
Summary of steps ..............................................................................................9-2
The Events editor...............................................................................................9-2
Using the Accept and Discard buttons .....................................................................9-3
Setting up the evaluation interval..........................................................9-3
Creating events ...................................................................................................9-4
Editing events.......................................................................................................9-6
Starting and stopping event processing............................................9-6
Ways to start event processing ...................................................................................9-6
Ways to stop event processing ...................................................................................9-7
Chapter 10
Adding security
About security ................................................................................................... 10-1
Users and security codes........................................................................................... 10-1
Security function........................................................................................................ 10-2
Electronic signatures ................................................................................................. 10-2
Security Monitor utility ............................................................................................. 10-2
Summary of steps for setting up security codes...................... 10-3
Before you begin.............................................................................................. 10-4
Comentários a estes Manuais