- Table of Contents
-
- 07-System
- 01-Hot backup
- 02-VRRP
- 03-Track
- 04-BFD
- 05-NQA
- 06-Basic log settings
- 07-Email server
- 08-Session log settings
- 09-NAT log settings
- 10-AFT log settings
- 11-Sandbox log settings
- 12-Threat log settings
- 13-Application audit log settings
- 14-NetShare log settings
- 15-URL filtering log settings
- 16-Data filtering log settings
- 17-Attack defense log settings
- 18-Reputation log settings
- 19-Bandwidth alarm logs
- 20-Configuration log settings
- 21-Security policy log
- 22-File filtering log settings
- 23-Terminal identification logging
- 24-Heartbeat log settings
- 25-WAF log settings
- 26-IP access logs
- 27-MAC access log
- 28-Load balancing logging
- 29-Bandwidth management logs
- 30-Context rate limit logging
- 31-Zero trust logs
- 32-Report settings
- 33-Session settings
- 34-Signature upgrade
- 35-Software upgrade
- 36-License management
- 37-IRF
- 38-IRF advanced settings
- 39-Contexts
- 40-vSystems
- 41-Administrators
- 42-Date and time
- 43-MAC address learning through a Layer 3 device
- 44-SNMP
- 45-Configuration management
- 46-Reboot
- 47-About
- 48-Fast Internet Access
- 49-Content moderation log settings
- 50-Drop statistics
- 51-License server
- Related Documents
-
22-File filtering log settings
Title | Size | Download |
---|---|---|
22-File filtering log settings | 12.65 KB |
File filtering log settings
Introduction
File filtering logs record the file information filtered by the device. You can use the information to adjust policies accordingly to reduce the risks of confidential information disclosure and virus infection.
File filtering logs can be output as system logs or fast logs. By default, file filtering logs are output as system logs.