You can enable logging on the Security Management Server (enabled by default), or deploy a dedicated Log Server. After you deploy the Log Server, you must configure the Security Gateways for logging.
You must execute the Install Database function on the remote Log Server when you:
In This Section |