Log_Maintenance

Log Maintenance

Threat Discovery Appliance maintains the logs in the product’s hard disk and displays them on the Log Maintenance screen on the product console. Manually delete logs on a regular basis to keep the size of logs from occupying too much space on the hard disk. Deletion of logs depends on your environment and the quantity of logs that you want to retain.

Threat Discovery Appliance automatically deletes logs if 1,000,000 logs have been accumulated. One percent of the logs are automatically deleted, beginning with the oldest logs.

You can also view the status of the product database and repair corrupted database files from the Log Maintenance screen.

  1. Select the logs you want to delete. For example, you can select all logs under Known Threats/Risk Logs and System Logs, or you can Select all logs.

  2. Select an option under action. You can select to Delete all logs selected above or Delete logs selected above older than the specified number of days you chose.

  3. Click Delete Now.

  1. Click Check Database.

  2. If one or more database files are corrupted, click Repair. The product begins to repair the corrupted files and informs you of the status.

See also: