Use the Log Configuration screen to configure user encryption policy, specify your
master key, and set the notification contact properties and threshold severities of
audit, system, VPN and quarantine logs.
Views:
