30.01.2015 Views

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Logs<br />

Note: With the above three examples, the relevant records will also appear in the Security<br />

log.<br />

22.14 Web Log<br />

This log contains all HTTP requests that were processed by the HTTP inspection module (see<br />

section 15.3) or by the built-in proxy server (see section 9.4). Unlike in the HTTP log, the Web<br />

log displays only the title of a page and the WinRoute user or the IP host viewing the page. In<br />

addition to each URL, name of the page is provided for better reference.<br />

For administrators, the Web log is easy to read and it provides the possibility to monitor which<br />

Websites were opened by each user.<br />

How to read the Web Log<br />

[24/Apr/2008 10:29:51] 192.168.44.128 james<br />

"<strong>Kerio</strong> Technologies" http://www.kerio.com/<br />

• [24/Apr/2008 10:29:51] — date and time when the event was logged<br />

• 192.168.44.128 — IP address of the client host<br />

• james — name of authenticated user (if no user is authenticated through the client<br />

host, the name is substituted by a dash)<br />

• "<strong>Kerio</strong> Technologies" — page title<br />

(content of the HTML element)<br />

Note: If the page title cannot be identified (i.e.<br />

"Encoded content" will be reported.<br />

for its content is compressed), the<br />

• http://www.kerio.com/ — URL pages<br />

306

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!