Policy Audit
Policy Audit records pattern changes in runtime configurations for network devices deployed on your network. Matches to preconfigured patterns are logged.
- . Change of state. One of the following: Unavailable, Different, Same.
- . Device hostname, IP address, or custom label.
- . Configuration archive.
- . Pattern string.
- . Pattern description.
- . Boolean. Denotes case sensitive pattern matching.
- . Boolean. Denotes Regex pattern usage.
- . Denotes policy pattern type. One of the following: Exclude, Include.
- . Comma separated list of line numbers matching the pattern.
Fetch and filter log data
. Choose one or more host devices.
Use the Select Device dialog for one of the following:
Control
|
Purpose
|
Device
|
Browse and choose a single device.
|
Device Group
|
Choose an existing group of one or more devices. You can also create custom or dynamic groups.
|
: You can organize devices into custom or dynamic groups. For more information, see Grouping Devices.
. Select rows based on specific column values, remove columns, and remove noise and chaff from the table.
Filter tables rows and hide and select columns
Click a column heading and use the following from the drop down list:
Control
|
Purpose
|
Sort.
|
Sort column in ascending or descending order.
|
Columns.
|
Pick the columns you want to view. Click a check box to display the column. Clear the check box to hide it.
|
Group by this field.
|
Group table into collapsible rows wherever the current column contains identical data ("field") values.
|
Filters.
|
Provide a keyword and use wildcards to view only rows that contain the keyword for the selected column or view.
Most column and log view filters provide the following wildcard matching:
- Match either zero characters or any one character ('?').
Example: 198.51.100.2? (Matches tokens with IP address ending with 2, or 20-29.) - Match either zero, any one, or many characters ('*').
Example: Stop* (Matches log strings containing Stop, Stopped, Stopping, and so on.)
|
Email, export, and save as PDF
Policy Audit event data can be exported, reused, and distributed. Select export () to access the following options: