Cisco Systems CL-28826-01 Security Camera User Manual


  Open as PDF
of 2616
 
11-46
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter 11 Configuring Security Manager Administrative Settings
Policy Management Page
Field Reference
Policy Management Page
Use the Policy Management page to select the types of router and firewall policies you will manage in
Security Manager. These selections apply to routers and firewall devices, but do not apply to IPS devices.
By default, all policies are selected for management.
Unmanaged policies are removed from both Device view and Policy view. Any unmanaged policies,
local or shared, are removed from the Security Manager database. The only exception is interface
policies, which continue to appear in Security Manager but are marked as read-only policies. For firewall
devices, interface and failover settings are considered a unit and are managed or unmanaged together.
For detailed information on managing and unmanaging policy types, including what you should do
before and after changing these settings, see Customizing Policy Management for Routers and Firewall
Devices, page 5-10.
Table 11-2 6 Log s Page
Element Description
Keep Audit Log For
Purge Now button
The maximum number of days to save audit report entries before
deleting them. If the number of entries in the log exceeds the number
entered in the Purge Audit Log After field, old log entries might be
deleted before they reach this age.
If you reduce the number of days, you can click Purge Now to
immediately delete the older entries.
Note The Purge Now button only removes audit report entries from
the database. It does not remove the *.csv files from the
<install_dir>\CSCOpx\MDC\log\audit folder. These *.csv
files can be deleted directly.
Purge Audit Log After
(entries)
The maximum number of audit report entries to save. If an entry
becomes older than the number of days specified in the Keep Audit Log
For field, it is deleted even if the log has fewer than the maximum
number of entries.
Keep Operation Log For The number of days that Security Manager keeps operation logs before
deleting them. These logs are used for debugging purposes.
Log Level The level of information, according to severity, that you would like
collected in the operation logs. Each level collects different amounts of
data. For example, the Info level yields the most data, and the Severe
level collects the least.
Save button Saves your changes.
Reset button Resets changes to the previously applied values.
Restore Defaults button Resets values to Security Manager defaults.