Fiery Command WorkStation

Configure 4

Hide or show navigationPrevious topicNext topicSharePrintPDF

Collect security events

To help you with compliance requirements at your organization, the Fiery server collects security-related events, which are saved to the Security Audit Log.

Logs are in a format supported by common SIEM log collection and analysis solutions.

The events are in JSON format. You can read events without Fiery, LLC intervention.

  1. From Configure, choose Security > Security Audit Log.
  2. Select Enable Security Audit Log.
  3. To view the events that have been collected, click Download. The log is provided as a ZIP file.
  4. Extract fieryauditlog.evtx and open it in Windows Event Viewer
  5. For a Linux-based Fiery server, extract fieryauditlog.log and open it in a text editor.
  6. For a Linux-based Fiery server, you can forward logs to a central log collection system (SysLog). Enter the appropriate information.
Security events are retained based on allocated disk storage capacity. When the log size reaches the maximum storage limit (400MB), older events are removed automatically.