|
1 | 1 | ---
|
2 | 2 | title: Troubleshoot the sensor and on-premises management console
|
3 | 3 | description: Troubleshoot your sensor and on-premises management console to eliminate any problems you might be having.
|
4 |
| -ms.date: 05/22/2022 |
| 4 | +ms.date: 06/15/2022 |
5 | 5 | ms.topic: article
|
6 | 6 | ---
|
7 | 7 | # Troubleshoot the sensor and on-premises management console
|
@@ -262,13 +262,14 @@ All allowlists, policies, and configuration settings are cleared, and the sensor
|
262 | 262 |
|
263 | 263 |
|
264 | 264 | ## Troubleshoot an on-premises management console
|
265 |
| -### Investigate a lack of expected alerts on the management console |
266 | 265 |
|
267 |
| -If an expected alert is not shown in the **Alerts** window, verify the following: |
| 266 | +### Investigate a lack of expected alerts |
| 267 | + |
| 268 | +If you don't see an expected alert on the on-premises **Alerts** page, do the following to troubleshoot: |
268 | 269 |
|
269 |
| -- Check if the same alert already appears in the **Alerts** window as a reaction to a different security instance. If yes, and this alert has not been handled yet, a new alert is not shown. |
| 270 | +- Verify whether the alert is already listed as a reaction to a different security instance. If it has, and that alert hasn't yet been handled, a new alert isn't shown elsewhere. |
270 | 271 |
|
271 |
| -- Verify that you did not exclude this alert by using the **Alert Exclusion** rules in the on-premises management console. |
| 272 | +- Verify that the alert isn't being excluded by **Alert Exclusion** rules. For more information, see [Create alert exclusion rules](how-to-work-with-alerts-on-premises-management-console.md#create-alert-exclusion-rules). |
272 | 273 |
|
273 | 274 | ### Tweak the Quality of Service (QoS)
|
274 | 275 |
|
@@ -310,39 +311,33 @@ To limit the number of alerts, use the `notifications.max_number_to_report` prop
|
310 | 311 |
|
311 | 312 | 1. Save the changes. No restart is required.
|
312 | 313 |
|
| 314 | +### Export audit logs for troubleshooting |
313 | 315 |
|
| 316 | +Audit logs record key activity data at the time of occurrence. Use audit logs generated on the on-premises management console to understand which changes were made, when, and by whom. |
314 | 317 |
|
315 |
| -### Export audit logs from the management console |
| 318 | +You may also want to export your audit logs to send them to the support team for extra troubleshooting. |
| 319 | + |
| 320 | +> [!NOTE] |
| 321 | +> New audit logs are generated at every 10 MB. One previous log is stored in addition to the current active log file. |
| 322 | +> |
316 | 323 |
|
317 |
| -Audit logs record key information at the time of occurrence. Audit logs are useful when you are trying to figure out what changes were made, and by who. Audit logs can be exported in the management console, and contain the following information: |
| 324 | +**To export audit log data**: |
318 | 325 |
|
319 |
| -| Action | Information logged | |
320 |
| -|--|--| |
321 |
| -| **Learn, and remediation of alerts** | Alert ID | |
322 |
| -| **Password changes** | User, User ID | |
323 |
| -| **Login** | User | |
324 |
| -| **User creation** | User, User role | |
325 |
| -| **Password reset** | User name | |
326 |
| -| **Exclusion rules-Creation**| Rule summary | |
327 |
| -| **Exclusion rules-Editing**| Rule ID, Rule Summary | |
328 |
| -| **Exclusion rules-Deletion** | Rule ID | |
329 |
| -| **Management Console Upgrade** | The upgrade file used | |
330 |
| -| **Sensor upgrade retry** | Sensor ID | |
331 |
| -| **Uploaded TI package** | No additional information recorded. | |
| 326 | +1. In the on-premises management console, select **System Settings > Export**. |
332 | 327 |
|
333 |
| -**To export the audit log**: |
| 328 | +1. In the **Export Troubleshooting Information** dialog: |
334 | 329 |
|
335 |
| -1. In the management console, in the left pane, select **System Settings**. |
| 330 | + 1. In the **File Name** field, enter a meaningful name for the exported log. The default filename uses the current date, such as **13:10-June-14-2022.tar.gz**. |
336 | 331 |
|
337 |
| -1. Select **Export**. |
| 332 | + 1. Select **Audit Logs**. |
338 | 333 |
|
339 |
| -1. In the File Name field, enter the file name that you want to use for the exported log. If no name is entered, the default file name will be the current date. |
| 334 | + 1. Select **Export**. |
340 | 335 |
|
341 |
| -1. Select **Audit Logs**. |
| 336 | + The file is exported and is linked from the **Archived Files** list at the bottom of the **Export Troubleshooting Information** dialog. Select the link to download the file. |
342 | 337 |
|
343 |
| -1. Select **Export**. |
| 338 | +1. Exported audit logs are encrypted for your security, and require a password to open. In the **Archived Files** list, select the :::image type="icon" source="media/how-to-troubleshoot-the-sensor-and-on-premises-management-console/eye-icon.png" border="false"::: button for your exported logs to view its password. If you're forwarding the audit logs to the support team, make sure to send the password to support separately from the exported logs. |
344 | 339 |
|
345 |
| -The exported log is added to the **Archived Logs** list. Select the :::image type="icon" source="media/how-to-troubleshoot-the-sensor-and-on-premises-management-console/eye-icon.png" border="false"::: button to view the OTP. Send the OTP string to the support team in a separate message from the exported logs. The support team will be able to extract exported logs only by using the unique OTP that's used to encrypt the logs. |
| 340 | +For more information, see [View audit log data on the on-premises management console](how-to-create-and-manage-users.md#view-audit-log-data-on-the-on-premises-management-console). |
346 | 341 |
|
347 | 342 | ## Next steps
|
348 | 343 |
|
|
0 commit comments