You can configure logs for various events that occur on your network. The event logs can be used for tracking potential security threats. A variety of events can be captured and logged for review. These logs can be saved to the local syslog daemon or to a specified remote syslog server, or be emailed to a specified email address.
This section describes how to view the event logs, and configure the log settings and the log facilities. Refer to the following topics: