Logging Connections with Access Control Rules
Depending on your choices for the rule action and deep inspection options, your logging options differ; see How Rules and Policy Actions Affect Logging.
Procedure
Step 1 | In the access control policy editor, click Edit () next to the rule where you want to configure logging. If View () appears instead, the configuration is inherited from an ancestor policy, belongs to an ancestor domain, or you do not have permission to modify the configuration. |
Step 2 | Click Logging. |
Step 3 | Specify whether you want to Log at Beginning of Connection or Log at End of Connection. To optimize performance, log either the beginning or the end of any connection, but not both. |
Step 4 | (Optional) Check the Log Files check box to log file and malware events associated with the connection. It is recommended to leave this option enabled. |
Step 5 | Specify where to send the connection events:
|
Step 6 | Click Confirm. |
Step 7 | Click Apply to save the rule. |
What to do next
-
Deploy configuration changes.