Hp Secure Key Manager Manuale Utente Pagina 224

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
Vedere la pagina 223
Secure logs
The SKM allows yo
u to sign your log les before moving them to another machine or downloading them,
which makes you
rlogles more secure than unsigned log les.
ALogSigningCe
rticate is created the rst time the SKM is run and when the machine is restored to the
factory defaul
ts. If the Sign Log option is selected, a log le is signed with the Log Signing Certicate
right before i
t is downloaded or moved off of the SKM. The signed log le is then sent to the specied
host in multip
art S/MIME E-mail format. The rst part of the signed log le contains the clear text
log; the seco
nd part of the signed log le contains the signature in PEM encoded PKCS7 format. The
certicate u
sed to verify the signed log le is embedded within the signature, but it is insecure to simply
rely on this
embedded certicate for verication.
Signed logs do not appear in plaintext when downloaded.
IMPORTANT:
If you decide to recreate a Log Signing Certicate, it is very important to make a backup of the existing
certicate so that old log les signed with the existing certicate can still be properly veried.
TIP:
You should store your Log Signing Certicate separately from the signed logs les.
Log Congu
ration page
The Log Con
guration page enables you to congure rotation schedules, syslog settings, create signed
logs, and s
pecify log levels. This page contains the following sections:
•RotationSchedule
Log Rotation Properties
•SyslogSe
ttings
•LogSigning
Log Signing Certicate Information
•Activit
yLogSettings
Rotation Schedule
The Rotation Schedule provides a summary view of the properties of the logs on an SKM.
Figure 135 Viewing the Rotation Schedule section
The following table describes the components of the Rotation Schedule section.
224
Using the Management Console
Vedere la pagina 223
1 2 ... 219 220 221 222 223 224 225 226 227 228 229 ... 326 327

Commenti su questo manuale

Nessun commento