Top
Systemwalker Desktop Keeper User's Guide for Administrator
FUJITSU Software

5.2.1 View Logs in the CT Operation Log Window

View logs

This department describes how to view logs in CT Operation Log.

The procedure is as follows:

  1. Start Log Viewer to display the CT Operation Log window.

  2. To change the database whose operation logs will be browsed, select the desired database.
    Refer to "Change the database to be viewed" for details.

  3. Set the following items in Select Section

    • Select the Management Server that manages the client (CT) and smart device (agent) from Target server.

    • In Range of display > Sub-level contained, select whether to display only the clients (CTs) and smart devices (agents) directly under the selected group, or all clients (CTs) and smart devices (agents).

    • In Range settings > The violation CT is displayed only, select whether to display only the clients (CTs) and smart devices (agents) for which violation logs are generated, or all clients (CTs).

  4. From the CT group tree of Select Section, select the CT group to which the client (CT) and smart device (agent) for viewing logs belong.

    Logs on the client (CT) and smart device (agent) can be searched and viewed with different ranges depending on the location selected in the group tree.

    • When selecting server name: Logs can be searched and viewed on all clients (CTs) and smart devices (agents) belonging to the Management Server. (*)

    • When selecting domain name: Logs can be searched and viewed on all clients (CTs) belonging to the domain selected during Active Directory Linkage. (*)

    • When selecting Local group: Logs can be searched and viewed on all clients (CTs) and smart devices (agents) belonging to local groups during Active Directory Linkage.

    • When selecting CT group: Logs can be searched and viewed on all clients (CTs) and smart devices (agents) belonging to the CT group during Active Directory Linkage.

    *) The Sub-level contained check box in Range of display must be selected.

    The clients (CTs) and smart devices (agents) belonging to the CT group will be displayed in List of searched CT.

    The client (CT), smart device (agent), and CT groups with violation logs will be displayed in red. Refer to "Display the group or client (CT) and smart device (agent) that have generated violation logs in red" for details.

    Note

    Update information of CT group and CT list in following cases

    When the Log Viewer performs the following operations, the information of the CT group and CT list of the Management Server displayed in the window will not be updated to the latest status.

    • When the CT group tree has been modified via the Management Console

    • When Active Directory Linkage is performed and the group tree is modified

    • When adding a new client (CT) to the CT group of the Management Console using the automatic allocation file during CT registration

    • When Log Viewer has been started one day before (violation information has been modified)

    To update to the latest information, click the Refresh button in the display area of Select Section window, and the latest information of the server selected in Target server can be displayed.

  5. Perform any of the following operations according to the purpose of viewing CT Operation Logs:

    • View logs by client (CT) and smart device (agent)
      Click Name of client (CT) and smart device (agent) for viewing logs in List of searched CT.

    • View client (CT) and smart device (agent) logs within the selected range in CT group tree
      Click the Group search button in List of searched CT.

    The CT Operation Log(Operation) - Log search window is displayed.

    Search conditions, Type of log (Multiple choices) and Detailed conditions can be opened or closed.
    After clicking Search conditions, Type of log (Multiple choices) and Detailed conditions (rightward triangle symbol), the Search conditions window will be opened.
    After clicking Search conditions, Type of log (Multiple choices) and Detailed conditions, the Search conditions window will be closed.

    Note

    In case of Microsoft(R) Internet Explorer(R) 6.0, if the scroll bar cannot be displayed for conforming log list when unfolding "Detailed conditions", check if "Log Type (Multiple choices)" and "Detailed conditions" are in folded status.

  6. Set Search conditions
    Click Detailed conditions to set detailed conditions such as drive type and log collection time, etc.

    Item Name

    Description

    Search target

    The name of the client (CT) or smart device (agent) in which the search logs are collected or the CT group name will be displayed.
    The name or group name will be followed by "(CT)" or "(Group)".

    Search range

    Search in the specified time range.

    If the start time and end time of Search range are not specified, search may be performed in all periods
    If no start month or date is specified, search will begin from the beginning of the specified year (Jan. 1).
    If no start date is specified, search will begin from the beginning of the specified month (the first day).

    • Start date
      _ Sep 2013: 1 Sep. 2013 is assumed to be specified.
      __ 2013: 1 Jan. 2013 is assumed to be specified.
      _( Day)_(Month )_(Year): Start searching from the earliest saved log.
      15_ 2013: Specification error
      15 Sep. __: Specification error

    If no end month or day is specified, search till the end of the specified year (Dec 31).
    If the end day is not specified, search till the end of the specified month (the last day).

    • End date
      _ Sep 2013: 30 Sep. 2013 is assumed to be specified.
      __ 2013: 31 Dec 2013 is assumed to be specified.
      _( Day)_(Month )_(Year): Search till the last saved log.
      _ 15, 2013: Specification error
      15 Sep _ : Specification error

    If the specified year is omitted, the specified month and day should be omitted.
    If the specified month is omitted, the specified day should be omitted.

    As initial values, the start date and end date will be displayed as the date on the CT Operation Log - Search Log window.

    When selecting the The violation CT is displayed only check box of Range settings and clicking the Group search button:
    The value set in Violation Display Range of the Violation CT Display Settings window will be displayed.

    Call search conditions

    This item can invoke the saved search conditions.

    The methods for saving/deleting search conditions are as follows:

    • Saving method
      Set the search conditions to be saved; the conditions out of Search range can be saved.
      After the setting has completed, click the Save search conditions button. The window for saving the search conditions is displayed.
      To save again, select Save as and click the Register button. Each administrator can save up to 10 conditions. If 10 search conditions have already been saved, to save another, delete the oldest and register the new search condition.
      Up to 128 halfwidth and fullwidth characters can be entered as the search condition name.
      If desired to update search conditions, select Update and click the Register button.

    • Deletion method
      To delete a search condition, select a search condition name, and click the Delete search conditions button.

    Keyword

    Keywords of logs can be used for searching. In addition, when specifying multiple keywords, the single-byte or double-byte space should be entered between keywords.

    Enter up to 128 halfwidth and fullwidth characters.
    After specifying OR condition in Search condition, the search condition will become OR Search with more than one keyword, the multiple specified ones. Alternatively, after specifying AND condition, the search condition will become And Search with all of the specified keywords.

    Select OR or AND Condition if multiple keywords are specified.

    In the information displayed in the content column and notes column of logs, the content marked with [ ] can be set as the keyword
    The contents set as keyword varies with different log types. Refer to the content column and notes column of "Display Content" of "8.2.1 Application Startup Log" and "8.2.22 Configuration Change Log" for details.

    User ID

    Search according to user name. Only one user name can be entered.

    Type of log

    Search by log type. When two or more log types are set as the search condition, select Multiple Selection. The Type of log (Multiple Selection) right under it will be opened, select the corresponding log type.

    Classification

    The operations allowed or not allowed can be selected in policy setting. Select Normal to search the operations allowed and select Violation to search the operations not allowed. After All has been selected, both Normal and Violation will be selected.

    When selecting the The violation CT is displayed only check box of Range settings and clicking the Group Search button:
    Violation is displayed.

    Device

    Search by device type.
    To search only client (CT) logs, select PC. To search only smart device (agent) logs, select Smart device. Selecting All sets PC and Smart device, and all device logs will be searched.

    Type of log (Multiple choices)

    Item Name

    Descriptions

    Type of log

    Select the type of log to be displayed in List of logs. Refer to "Types of log that can be viewed" for information about log types.

    Select All : Select all log types.
    Clear All : Cancel the selection of all log types
    Initial State: All are selected.

    Detailed Conditions

    Item Name

    Descriptions

    Type of drive

    Search according to the type of drive.
    Drive type becomes a valid condition when setting the following items in Type of log.

    • All

    • File Operation

    • File Export

    The following four types can be specified and multiple specifications at the same time are allowed:

    • Removable: The following media identified as a drive letter:

      • Floppy disk

      • External hard disk (removable hard disk connection via USB, IEEE 1394 or PCMCIA, etc.)

      • MO

      • USB memory

      • Compact flash memory

    • Remote: Network drive

    • CD/DVD: CD/DVD drive

    • Fixed: PC fixed drive.

    Relationship between settings of Type of log and Type of drive and searched log:

    • If File Operation is set in Type of log, Type of drive (removable, remote, CD/DVD and fixed) will be specified as the following logs from A) to J) and displayed as search results:

      • A) When creating a new file, file creation target

      • B) When updating, location of updated file

      • C) When viewing, location of viewed file

      • D) When deleting, location of deleted file

      • E) When renaming, location of the file before renaming

      • F) When renaming, location of the file after renaming

      • G) When copying, location of the copy source file

      • H) When copying, file copy destination

      • I) When moving, location of the move source file

      • J) When moving, file moving destination

    • If File Export is set in Type of log, Type of drive (removable, remote, CD/DVD and fixed) will be specified as the logs of file export target and displayed as search results

    Time

    • Not specified: Time is not included in search condition.

    • Specify range: The range of time for log collection is specified as search condition.

      • If "a:00~b:59" is input, search with the condition of time range from a:00:00 to b:59:59.

      • If "a:00~-:59" is input, search with the condition of time range from a:00:00 to 23:59:59.

      • If "-:00~b:59" is input, search with the condition of time range from 0:00:00 to b:59:59.

      If both a and b have been input, a must be equal to or less than b.
      When two time range are specified, It does not matter if the two ranges are duplicated.
      When the start time is specified as "-", it means "0" is specified.
      When t end time is specified as "-", it means "23" is specified.
      Initial value of all items are set to "-" (means no condition is set)

    • When log collection time is specified as the search condition by Specify time, select the correspondent time. If multiple times are selected, the search will become an "OR Search" including more than one specified time. If none are selected, it means all are selected.

    • Select all: Select all check boxes in Specify time.

    • Clear all: Cancel all selected check boxes in Specify time.

    If Day of the Week is specified at the same time, the search will become the "AND Search" including all of the multiple conditions.

    Day of the Week

    Select All: Select all check boxes in Day of a Week.

    Clear All: Cancel all selected check boxes in the Day of a Week menu.

    Day of a Week check box: When the day of the week for log collection is set as a search condition, select the correspondent day. When multiple days of the week are selected, the search will become the "OR Search" including more than one day of the week. When none are selected, it means that all are selected.

    If Time is specified at the same time, the search will become the "AND Search" including all of the multiple conditions.

  7. Click the Search button.

    Note

    If you specify a large number of CTs or a long search period in the search conditions, the following message may be displayed:

    [LWSV-SEL003] A search may not be possible due to the large amount of data targeted for search. Continue processing?

    If the conditions do not need to be reviewed, continue with processing.

    If the search takes a long time, a timeout may occur. Alternatively, if there is a large number of search results, the search may be canceled and one of the following messages may be displayed:

    [LVSY-ERR015] Processing will be canceled because the number of log items will exceed %d. Review the conditions.
    [LWSV-ERR011] Processing will be canceled because the number of log data items (%d) was exceeded. Review the conditions.

    In this case, refine the search conditions before performing the search again.

    Example of Refining Search Condition:

    • Reduce search time

    • Reduce the Number of sets as search target

    • Set to search keyword condition

    • Set to search user name

    View logs by CT or smart device (agent)
    The CT operation log corresponding to the client (CT) will be displayed in List of logs.

    View logs of client (CT) and smart device (agent) under the selected range in CT group tree
    CT operation logs of all clients (CTs) and smart devices (agents) under the CT group will be displayed in List of logs.

    1. Click the Select CT button.
      The CT list under the group is displayed in Select CT.

      The client (CT), smart device (agent), and CT group that have generated violation logs will be displayed in red. Refer to "Display the group or client (CT) and smart device (agent) that have generated violation logs in red" for details.

    2. When clicking Name of the client (CT) and smart device (agent) to view logs, only the CT operation log of the correspondent client (CT) and smart device (agent) will be displayed.
      When clicking Number of violation logs of the client (CT) and smart device (agent) to view logs, only the violation log of the correspondent client (CT) and smart device (agent) will be displayed.

      Content displayed in List of logs

      (1) The number of logs corresponding to the search condition.

      (2) Click the"<" to go to the previous page. Click ">" to go to the next page. Click "<<" to return to the home page. Click ">>" to go to the last page.

      (3) Select the number of logs to be displayed in Window 1.

      (4) Display the page of logs being viewed currently.

      (5) To view logs of other pages, enter the page number and then click the Go button.

      The information will be sorted after clicking the name of following items (Name, Occurrence Date and Time, User Name, etc.).

      Item Name

      Description

      Client (CT)

      Smart device (agent)

      Name

      This is the name that can be attached to the client (CT). Its initial value is the computer name.

      This is a name that can be given to a smart device (agent). Its initial value is a telephone number, or a model name if the telephone number cannot be obtained.

      When modifying, refer to "Modify CT Policy".

      Date and time

      This is the date and time when logs are collected in the client (CT) and smart device (agent).

      User name

      This is the user name entered when logging on the client (CT).

      If nobody logs on (when executing a program according to the task scheduler), the user name will be displayed as "System" when the following operation logs are collected:

      • File operation log

      • E-mail sending log

      • E-mail attachment prohibition log

      If a user logs on using a Microsoft account, up to 40 halfwidth characters (20 fullwidth characters) from the start of the Microsoft account information preceding @ will be displayed.
      For example, if the Microsoft account is "fujitsu.tarou@example.com", then "fujitsu.tarou" will be displayed as the user name.

      This is the telephone number of a smart device (agent), or blank if the telephone number cannot be obtained.

      Domain name

      This is the client domain name entered when logging on to a domain. It is also the computer name of the client (T) when logging on to the local computer. But it is blank when the system is Windows(R) 98 or Windows(R) ME (when connecting to the client (CT) of V12).

      If nobody logs on (when executing program according to task scheduler), the domain name will be displayed as the computer name of the client (CT) when the following operation logs are collected:

      • File operation log

      • E-mail sending log

      • E-mail attachment prohibition log

      If a user logs on using a Microsoft account, the Microsoft account information will be displayed.
      For example, if the Microsoft account is "fujitsu.tarou@example.com", then "example.com" will be displayed as the domain name.

      This is the model name of the smart device (agent).

      variety

      This is the type of the log.
      This line will be displayed in red when the following prohibition logs are collected:

      • Application startup prohibition log

      • E-mail attachment Prohibition log

      • Device configuration change log (*1)

      • Printing prohibition log

      • Logon prohibition log

      • PrintScreen Key prohibition Log

      • URL access prohibition

      • Web upload prohibition log

      • Web download prohibition log

      • FTP server connection prohibition log

      • Clipboard operation prohibition log

      • Linkage application log (*1)

      *1: When the classification is Violation

      • Wi-Fi connection prohibition log

      • Bluetooth connection prohibition log

      • Application usage prohibition log

      Classification

      According to policy settings, the operation allowed will be displayed as Normal, and the operation that is not allowed will be displayed as Violation.

      When Violation logs are collected, this line will be displayed in red (settings concerning display are not required).

      Add

      • This is displayed as 1 or 2 when the captured screen is the obtained window title log.

        • 1: when the captured screen is the obtained window 1.

        • 2: when the captured screen is the obtained window 2

      • Displayed as 1 when the policy for obtaining screen capture is set in PrintScreen key prohibition log".

      • Displayed as 1 when the policy for original backup is set in file export log, linkage application log, clipboard operation log or clipboard operation prohibition log.

      Displayed as 1 when the policy that allows viewing of E-mail content is set in E-mail sending log.

      Content

      This is the content of the log

      Perform the following operations to confirm all contents:

      Up to 519 halfwidth characters (259 fullwidth characters) can be displayed as the path length of target file of file operation log. In the path name containing Unicode characters, part of Unicode characters will be displayed in escape format.

      Unicode characters can be correctly displayed when all the following conditions are satisfied.

      • Logs are collected in the client (CT), the OS of which is Windows Vista(R), Windows Server(R) 2008, Windows(R) 7, Windows(R) 8 or Windows Server(R) 2012.

      • PC system of Log Viewer is Windows Vista(R), Windows Server(R) 2008, Windows(R) 7, Windows(R) 8 or Windows Server(R) 2012.

      If the above conditions are not satisfied, Unicode characters contained in the log will be displayed as "?" or in the escape format (e.g. In "&#xAAAA;", AAAA is a hexadecimal code with 4 or 5 digits.

      Remarks

      This is the notes of the logs.

  8. Click Date and time of the displayed log.

    The CT operation log(Operation) - Log search - Log details window is displayed.

    Item Name

    Description

    Client (CT)

    Smart device (agent)

    Name

    For the name that can be attached to the client (CT), the initial value is the computer name.

    A name that can be given to a smart device (agent). The initial value is a telephone number, or a model name if the telephone number cannot be obtained.

    When modifying, refer to "Modify CT Policy".

    Occurrence date and time

    This is the date and time when logs are collected from the client (CT) and smart device (agent).

    User name

    This is the user name entered when logging on the client (CT).

    If nobody logs on (when executing program according to task scheduler), the user name will be displayed as "System" when the following operation logs are collected:

    • File operation log

    • E-mail sending log

    • E-mail attachment prohibition log

    If a user logs on using a Microsoft account, up to 40 halfwidth characters (20 fullwidth characters) from the start of the Microsoft account information preceding @ will be displayed.
    For example, if the Microsoft account is "fujitsu.tarou@example.com", then "fujitsu.tarou" will be displayed as the user name.

    This is the telephone number of a smart device (agent), or blank if the telephone number cannot be obtained.

    Domain name

    This is the client domain name entered when logging on to a domain. It is also the computer name of client (T) when logging on to the local computer. But it is blank when the system is Windows(R) 98 or Windows(R) ME (when connecting to the client (CT) of V12).

    If nobody logs on (when executing program according to task scheduler), the domain name will be displayed as the computer name of client (CT) when the following operation logs are collected:

    • File operation log

    • E-mail sending log

    • E-mail attachment prohibition log

    If a user logs on using a Microsoft account, the Microsoft account information will be displayed.
    For example, if the Microsoft account is "fujitsu.tarou@example.com", then "example.com" will be displayed as the domain name.

    This is the model name of the smart device (agent).

    Type

    This is the type of the log.
    This line will be displayed in red when the following prohibition logs are collected:

    • Application startup prohibition log

    • E-mail attachment prohibition log

    • Device configuration change log (*1)

    • Printing prohibition log

    • Logon prohibition log

    • PrintScreen key prohibition log

    • URL access prohibition

    • Web upload prohibition log

    • Web download prohibition log

    • FTP server connection prohibition log

    • Clipboard operation prohibition log

    • Linkage application log (*1)

    *1: When the classification is Violation

    • Wi-Fi connection prohibition log

    • Bluetooth connection prohibition log

    • Application usage prohibition log

    Classification

    According to policy settings, the operation allowed will be displayed as Normal, and the operation that is not allowed will be displayed as Violation.

    Content

    This is the content of the log

    Up to 519 halfwidth characters (259 fullwidth characters) can be displayed as the path length of target file of file operation log. In the path name containing Unicode characters, part of Unicode characters will be displayed in escape format.

    Unicode characters can be correctly displayed when all the following conditions are satisfied.

    • Logs are collected in the client (CT), the OS of which is Windows Vista(R), Windows Server(R) 2008, Windows(R) 7, Windows(R) 8 or Windows Server(R) 2012.

    • PC system of Log Viewer is Windows Vista(R), Windows Server(R) 2008, Windows(R) 7, Windows(R) 8 or Windows Server(R) 2012.

    • If the above conditions are not satisfied, Unicode characters contained in the log will be displayed as "?" or in the escape format (e.g. In "&#xAAAA;", AAAA is a hexadecimal code with 4 or 5 digits).

    Note (Note 1)

    This is the notes of the logs.

    Attachment (Note 1)

    The displayed information is as follows:

    • If the captured screen is the obtained window title log

      • Picture 1

      • Picture 1, Picture 2

    • When the captured screen is the obtained PrintScreen key prohibition log

      • Picture 1

    • When the original backup policy is set in file export log

      • File name (display the backup file name)

    • When original file is backed up in linkage application log

      • Original file

    • When the policy that allows viewing of E-mail content is set in E-mail sending log

      • E-mail Content

    • In case of clipboard operation log" or clipboard operation prohibition log

      • The data copied via clipboard is text: Details

      • The data copied via clipboard is image: Picture

      • The data copied via clipboard is file: Details

    Session ID (Note 2)

    This is the ID indicating the command execute in command prompt of client (CT) and the result of command execution

    Download Content (Note 2)

    The message displayed in Content can be downloaded in text format.

    Note 1: This cannot be displayed in case of command log.
    Note 2: This will be displayed in case of command log.

View attached data

When window title logs, file export log, clipboard operation logs and clipboard operation prohibition logs are being collected, the captured screen data, original file data of exported files and text and image data via clipboard can be saved simultaneously.
In addition, when collecting E-mail sending log, E-mails and attachments can also be saved.

By viewing these data, the actual content of displayed windows, exported files, sent E-mails and attachment can be known.

If the View/save attached information check box is selected in Detail authority of the Administrator Information Settings window of Server Settings Tool, the captured screen data, original file data of exported files, text and image data via clipboard can be viewed and saved.
If the Save E-mail contents check box is selected in Detail authority of the Administrator Information Settings window of the Server Settings Tool, the content of sent E-mails and attachments can be viewed.

If the file as attached data exists, it is possible to Save original file backup

In addition, if screen capture data exists, it is possible to View/Save screen capture data.

View/Save screen capture data

When screen capture data exists in window title logs and PrintScreen key prohibition log", the captured screen can be viewed after clicking the link of the item value link of Attachment in the CT operation Log(Operation) - Log Search - Log Details window.

If two captured screens exist, there will be 2 links.

If one screen capture of window exists in the Attachment item of log list, the window title log with screen capture data existed will be displayed as 1; when screen capture of two windows exists, the window title log will be displayed as 2.
If screen capture data exists in PrintScreen key prohibition log, 1 will be displayed in the Attachment item of the log list.

  1. Click the link of item value of Attachment

    The image of screen capture is displayed.

    Note

    When screen capture data cannot be displayed

    The following message will be displayed after clicking the Display Image button.

    [LWSV-ERR007] screen data cannot be displayed because it has not been transferred to server. 

    It will be displayed when the screen capture data has not been sent from the client (CT) to the Management Server, or "Save screen capture data to CT" has been set. When screen capture data has not sent from the client (CT) to the Management Server, view later after clicking the OK button. If "Save screen capture data to CT" has been set, the saving location must be modified. The location for saving and timing of sending screen capture data can be set in Terminal Operation Settings window of the Management Console. Confirm the settings and modify them according to the execution situation. For the confirmation of Terminal Operation Settings, refer to "2.4.2 Perform Terminal Operation Settings".

  2. Click the File Saving button.
    In the Saved as window that is displayed, select the location for saving, and click the Save button. The image will be saved to the specified location in the png format with default file name.
    The file name of screen capture data: "CT name" + "-" + "Log occurrence date and time (yyymmdhhmnss)" + "-" + Page number (1or 2) + "-" + "Extension"
    Example: PC382686-20131215203412-1.png

  3. Click the Close button.

Save original file backup

When the file export log, E-mail sending log, linkage application log, clipboard operation log and clipboard operation prohibition log contain original file backup s, after clicking the link of item value of Attachment in the CT Operation Log - Log Search - Log Details window, original file backup s can be saved to any location. The file export log and linkage application log that contain original file backup will be displayed as 1 in the Add item of List of logs. Clipboard operation log and clipboard operation prohibition log will be displayed as Obtain in the Attachment item of List of logs.

  1. Click the link of item value in Attachment.

    In the Saved as window that is displayed, select the location for saving, and click the File saving button.
    The file name when backing up original files is displayed as the default value. Modify the file name and save it if necessary.

    • The original file backup name of file export log: Export source file name

    • The original file backup name of linkage application log: "CT name" + "-" + "Log occurrence date and time (yyyymmddhhmnss)" + "." + "Extension"
      Example: PC382686-20131226132137.wmf

    • The original file backup name of E-mail sending log: "CT name" + "-" + "Log occurrence date and time (yyyymmddhhmnss)" + "." + "Extension"
      Example: PC382686-20131226132137.eml

    • The original file backup name of clipboard operation log and clipboard operation prohibition log": "CT name" + "-" + "Log occurrence date and time (yyyymmddhhmnss)" + "." + "Extension"
      Example:
      In case of text or file: PC382686-20131226132137.txt
      In case of image: PC382686-20131226132137.png

    Note

    When original file backup cannot be saved

    The following message will be displayed after clicking the File saving button.

    [LWSV-ERR010] The original file backup cannot be displayed because it has not been transferred to server.

    It will be displayed when the original file backup has not been sent from the client (CT) to the Management Server, or "Save Original File Backup in CT" has been set. When the original file backup has not sent from the client (CT) to the Management Server, view later after clicking the OK button. If "Save Original File Backup to CT" has been set, the saving location must be modified. The location for saving and timing of sending original file backup can be set in Terminal Operation Settings window of the Management Console. Confirm the settings and modify them according to the execution situation. For the confirmation of Terminal Operation Settings, refer to "2.4.2 Perform Terminal Operation Settings".

Export contents displayed in [List of logs] to CSV file

After the Save CSV file check box is selected in Detailed authority in the Administrator Information Settings window of the Server Settings Tool, the content displayed in List of logs will be exported to a CSV file and saved.

  1. In the status of displaying the logs to be exported to CSV file in List of logs, click the Output in CSV format button.

  2. In the file download window that is displayed, click the Save button.

  3. After selecting the folder for saving and entering the file name, click the Save button.

When a file with same name exists in the export destination, the option window indicating whether to overwrite will be displayed. Select the desired option.

For the item name and description of an exported CSV file, refer to "Log List" of Systemwalker Desktop Keeper Reference Manual.

When file download is not successful

When the download of CSV file, original file backup and command operation file is not successful, refer to "Preparation of Using Web Browser in PC" of Systemwalker Desktop Keeper Installation Guide to modify the settings of Internet Explorer(R).

Link with Systemwalker Desktop Patrol

When linking with Systemwalker Desktop Patrol, assets management information (Systemwalker Desktop Patrol information) of the correspondent PC can be viewed.

  1. Select the client (CT) that displays Systemwalker Desktop Patrol assets management information.

  2. Select Assets Management.

  3. The asset information of Systemwalker Desktop Patrol will be displayed in other windows.