Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Web Protection Reporting FAQ : How does the logging process work?
How does the logging process work?
Reporting FAQ | Web Protection Solutions | v8.4.x, v8.5.x | 29-Apr-2022
When users browse the Web, their activity as recorded as log data:
1.
2.
3.
The transaction goes through Multiplexer to reach Log Server and (if configured) the integrated SIEM tool.
See the Security Information Event Management (SIEM) (or this v8.4 version) paper for more information.
1.
2.
*
*
Information about Log Server preprocessing options can be found in the Administering Databases paper.
3.
4.
Data in the partition databases can be used in dashboard, investigative, and presentation reports (see Use Reports to Evaluate Internet Activity for v8.5 or this version for v8.4).
ODBC and BCP
Log Server can forward log records to the Log Database using either of 2 formats:
*
With ODBC (Open Database Connectivity), Log Server inserts records into the database individually. The data stored in Log Server cache files is moved directly to the database.
*
With BCP (Bulk Copy Program), Log Server inserts the data in batches. To do this, Log Server starts by moving the data from the cache files into a new set of storage files. From there, the data is moved to the database.
Configure data insertion options in the Web Security module of the Forcepoint Security Manager on the Settings > Reporting > Log Server page.
For more information about ODBC and BCP, see Specify how log records are processed into the database.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Web Protection Reporting FAQ : How does the logging process work?
Copyright 2022 Forcepoint. All rights reserved.