This website uses cookies. By clicking OK, you consent to the use of cookies. Click Here to learn more about how we use cookies.
OK
  • RSA.com
  • Products
    • Archer®
      • Archer®
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Archer® Exchange
      • Training
      • Upcoming Events
      • Videos
    • RSA® Fraud & Risk Intelligence Suite
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Web Threat Detection
      • Upcoming Events
      • Videos
    • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Cloud
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Patch Content
      • Videos
    • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication Mobile SDK
      • Advisories
      • Events
      • Ideas
      • Knowledge Base
      • Request Access
      • Training
    • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication for eCommerce
      • RSA® Adaptive Authentication for eCommerce
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® FraudAction Services
      • RSA® FraudAction Services
      • Advisories
      • Discussions
      • Documentation
      • Ideas
      • Videos
    • RSA® Web Threat Detection
      • RSA® Web Threat Detection
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Videos
    • RSA NetWitness® Platform
      • RSA NetWitness® Platform
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA NetWitness® Detect AI
      • RSA NetWitness® Detect AI
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Investigator
      • RSA NetWitness® Investigator
      • Documentation
      • Download the Client
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Orchestrator
      • RSA NetWitness® Orchestrator
      • Overview
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA SecurID® Suite
      • RSA SecurID® Suite
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Knowledge Base
      • Ideas
      • Integrations
      • Training
      • Videos
    • RSA® Identity Governance & Lifecycle
      • RSA® Identity Governance & Lifecycle
      • Advisories
      • Blog
      • Community Exchange
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA SecurID® Access
      • RSA SecurID® Access
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • Other RSA® Products
      • Other RSA® Products
      • RSA® Access Manager
      • RSA® Data Loss Prevention
      • RSA® Digital Certificate Solutions
      • RSA enVision®
      • RSA® Federated Identity Manager
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
  • Resources
    • Advisories
      • Product Advisories on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Hosted
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Product Advisories
    • Blogs
      • Blogs on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Blogs on RSA Link
    • Discussion Forums
      • Discussion Forums
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Discussion Forums on RSA Link
    • Documentation
      • Product Documentation
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Downloads
      • Product Downloads
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Downloads on RSA Link
    • Ideas
      • Idea Exchange
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Knowledge Base
      • Knowledge Base
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Knowledge Base Pages on RSA Link
    • Upcoming Events on RSA Link
      • Upcoming Events
    • Videos
      • Videos on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Videos on RSA Link
  • Support
    • RSA Link Support
      • RSA Link Support
      • News & Announcements
      • Getting Started
      • Support Forum
      • Support Knowledge Base
      • Ideas & Suggestions
    • RSA Product Support
      • RSA Product Support
      • General Security Advisories and Statements
      • Product Life Cycle
      • Support Information
      •  
      •  
      •  
      •  
      •  
  • RSA Ready
  • RSA University
    • Certification Program
      • Certification Program
    • Course Catalogs
      • Course Catalogs
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • On-Demand Subscriptions
      • On-Demand Subscriptions
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • Product Training
      • Product Training
      • Archer®
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Identity Governance & Lifecycle
      • RSA NeWitness® Platform
      • RSA SecurID® Access
    • Student Resources
      • Student Resources
      • Access On-Demand Learning
      • Access Virtual Labs
      • Contact RSA University
      • Enrollments & Transcripts
      • Frequently Asked Questions
      • Getting Started
      • Learning Modalities
      • Payments & Cancellations
      • Private Training
      • Training Center Locations
      • Training Credits
      • YouTube Channel
    • Upcoming Events
      • Upcoming Events
      • Full Calendar
      • Conferences
      • Live Classroom Training
      • Live Virtual Classroom Training
      • Webinars
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

Visit the Known Issues dashboard if you are experiencing issues on RSA Link

View Dashboard

RSA® Authentication Manager Documentation

Browse the official RSA Authentication Manager documentation for helpful tutorials, step-by-step instructions, and other valuable resources.
  • RSA Link
  • :
  • Products
  • :
  • RSA SecurID Suite
  • :
  • RSA SecurID Access
  • :
  • RSA Authentication Manager
  • :
  • Documentation
  • :
  • Archive Logs Using Schedule Log Archival
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content
Versions
Collections
All Downloads

Table of Contents

  •   Getting Started
    •   How RSA Authentication Manager Protects Your Resources
  •   Administrative Accounts
    •   System Administrator Accounts
  •   General Configuration
    •   System Settings
  •   Authentication Agents
    •   RSA Authentication Agents
  •   RSA SecurID Authentication API for Authentication Agents
    •   Configure the RSA SecurID Authentication API for Authentication Agents
  •   Identity Sources
    •   RSA Authentication Manager Identity Sources
  •   Security Domains
    •   Security Domains
  •   Administrative Roles
    •   Administrative Role Overview
  •   Users
    •   RSA Authentication Manager Users
  •   User Groups
    •   RSA Authentication Manager User Groups
  •   User Dashboard
    •   User Dashboard
  •   Policies
    •   RSA Authentication Manager Policies
  •   Identity Attributes
    •   User Attributes
  •   RSA SecurID Authenticate Tokencode Integration
    •   RSA SecurID Authenticate Tokencodes
  •   RSA SecurID Tokens
    •   RSA SecurID Tokens
  •   Password-Only Authentication
    •   Password-Only Authentication
  •   On-Demand Authentication
    •   On-Demand Authentication
  •   Emergency Access
    •   Emergency Online Authentication
  •   Self-Service
    •   Self-Service Settings
  •   Licenses
    •   RSA Authentication Manager License Support
  •   Password Dictionary
    •   Password Dictionary
  •   RADIUS
    •   RSA RADIUS Overview
  •   Logging
    •   Log Messages
  •   SNMP
    •   RSA Authentication Manager SNMP
  •   Security Questions
    •   Managing Security Questions
  •   Trusted Realms
    •   Trusted Realms
  •   Trusted Users
    •   Trusted Users and Trusted User Groups
  •   Trusted User Groups
    •   Add a Trusted User Group
  •   Batch Jobs
    •   Batch Jobs
  •   Risk-Based Authentication
    •   Risk-Based Authentication
  •   Export and Import Tokens and Users Between Deployments
    •   Exporting and Importing Users and Tokens Between Deployments
  •   Reports
    •   Reports
  •   Provisioning
    •   Provisioning Overview
  •   Activity Monitor
    •   Real-time Monitoring Using Activity Monitors
  •   User Sessions
    •   Close an Active User Session
  •   Network Settings
    •   Verify an IP Address or Hostname
  •   Appliance Maintenance
    •   Appliance Logs
  •   Product Updates
    •   RSA Authentication Manager Updates
  •   Certificates
    •   Certificate Management for Secure Sockets Layer
  •   Troubleshooting
    •   Troubleshooting Common Error Messages
  •   Viewing Troubleshooting Files
    •   Download Troubleshooting Files
  •   Replication
    •   Replica Instance
  •   Promotion for Maintenance
    •   Promotion for Maintenance
  •   Disaster Recovery
    •   Disaster Recovery Situations
  •   Backup and Restore
    •   Create a Backup Using Back Up Now
  •   Web Tiers
    •   Web-Tier Deployments
  •   System Date and Time
    •   Accurate System Date and Time Settings
  •   Application Trust
    •   Setting Up an Application Trust
  •   Custom Logon Banners
    •   Custom Logon Banners
  •   Custom Self-Service Console Web Pages
    •   Customize Self-Service Console Web Pages
  •   Cache Maintenance
    •   Flush the Cache
  •   Operating System Access
    •   System Administrator Accounts
  •   RSA Authentication Manager Glossary

Product Resources

  •   Advisories
    •   Product Advisories
    •   Security Advisories
    •   Service Notifications
    •   Technical Advisories
  •   Blog
  •   Discussions
  •   Documentation
    •   Authentication Agents
      •   API / SDK
      •   Apache Web Server
      •   Citrix StoreFront
      •   IIS Web Server
      •   Microsoft AD FS
      •   Microsoft Windows
      •   PAM
    •   Authentication Engine
    •   Authentication Manager
    •   Cloud Authentication Service
    •   Hardware Appliance Component Updates
    •   Hardware Tokens
    •   MFA Agents
      •   macOS
      •   Microsoft Windows
    •   Software Tokens
      •   Android
      •   Blackberry
      •   Blackberry 10
      •   iOS
      •   macOS
      •   Token Converter
      •   Windows
      •   Windows Phone
  •   Downloads
    •   Authentication Agents
      •   API / SDK
      •   Apache Web Server
      •   Citrix StoreFront
      •   IIS Web Server
      •   Microsoft AD FS
      •   Microsoft Windows
      •   PAM
    •   Authentication Engine
    •   Authentication Manager
    •   Cloud Authentication Service
    •   MFA Agents
      •   macOS
      •   Microsoft Windows
    •   Software Tokens
      •   Android
      •   Blackberry
      •   Blackberry 10
      •   iOS
      •   macOS
      •   Token Converter
      •   Windows
      •   Windows Phone
  •   Events
  •   Ideas
  •   Integrations
  •   Knowledge Base
  •   RSA SecurID Access Prime
  •   Training
  •   Videos

You can set up a schedule that automatically archives log records on a recurring basis.

​​

You can set up a schedule that automatically archives log records on a recurring basis. During archiving, log records are either copied or deleted from the internal database and written to a flat, comma-delimited file. By archiving, you maintain a history of all tasks performed, such as logon attempts and Security Console operations. Archive jobs can run automatically on specified days, weeks, or months.

If you do not set up a batch job schedule, the default job, named Archive Audit Logs Job, runs every day at 1:00 a.m. An archive log job slows system performance, so schedule recurring jobs during off-peak hours.

The system creates one file in addition to those you define. After the system-created file fills up, the oldest file is deleted and a new file is created. This means that you always have the number of files you defined plus one.

To schedule a log archive job to run once, see Archive Logs Using Archive Now.

Before you begin 

You need to determine:

  • The directory where the archived logs are stored. You can export archived logs to any one of the following directories:

    • Local Authentication Manager Server

    • Windows Shared Folder

    • NFS (Network File System) Shared Folder

      Note:  If you are using a Windows share, RSA Authentication Manager 8.4 requires the SMBv2 or SMBv3 protocol. SMBv1 is no longer supported.

  • Credentials to access the Windows Shared Folder, or NFS Shared Folder.

  • How long you want logs to remain in the database and in the archive. Consider your organization's audit trail requirements, and disk space available for both the database and archive.

  • How often data will be archived

  • How much disk space is available

  • How much data is being archived

  • How you will access the logs if you need them

  • How large you want log files to be

You also need to have write access to the Windows Shared Folder or NFS Shared Folder.

Procedure 

  1. In the Security Console, click Administration > Archive Audit Logs > Schedule Log Archival.

  2. In the Job Starts field, enter the date when the job starts.

  3. In the Frequency field, enter how often the job will run (daily, weekly, monthly, and which months and days).

  4. In the Run Time field, enter the time when the job is scheduled to start.

  5. In the Job Expires field, enter the date when the job will stop recurring. This date cannot be earlier than the Job Starts date. If you do not want to set an expiration date, select No expiration date.

  6. Select the appropriate options for administration, runtime, and system messages. The job can handle one, two, or three types of log messages.

    • Log Archival Options. Select a task for this archive job:

      • Purge and export online log data stored for more than a specified number of days.

      • Export online log data stored for more than a specified number of days. After exporting, you can allow the logs to remain in the database or purge the logs from the database.

      • Purge online log data stored for more than a specified number of days.

      • Not purge or export online log data.

    • Export Directory. Do one of the following:

      • Select Local Authentication Manager Server. The archived log is stored on the appliance.

      • Select Windows Shared Folder to save the archived logs on a Windows shared folder. Do the following:

        In the Windows Shared Folder field, enter the path to an existing Windows shared folder, for example, \\example.com\Log_archive_folder.

        Enter the user name to the shared folder in the Folder User Name field.

        Enter the password to the shared folder in the Folder Password field.

      • Select NFS (Network File System) Shared Folder. In the NFS Shared Folder field, enter the path to an NFS server and file directory, for example, fileserver.rsa.com:/Log_archive_path.

    • Validate Log. When this option is selected, the system validates the log file and creates a *.sig file in the same folder as the log file. The *.sig file always has the same filename as the *.log file.

    • Days Kept Online. Enter the number of days that you want to keep logs in the internal database. When a log expires, the system purges the log from the database, and exports the log to the export archive if recurring log archive jobs are configured for export.

      The system subtracts the Days Kept Online value from the current time and rounds the result to the nearest 00:00:00 according to Coordinated Universal Time (UTC). Log data is kept online until that time. Therefore, depending on your time zone, log data may be kept longer than the value that you specify, or log data may be purged before this value is reached.

    • Days Stored Offline. Enter the number of days that you want to keep logs in the export archive. When a log expires, the system deletes it from the export archive.

      Logs for each day are archived to a file that is named for that day. Log entries on that day between UTC times 00:00:00 a.m. and 11:59:59 p.m. are archived to the file for that day. If the number of files exceeds the Days Kept Offline value, older files are purged.

  7. Click Save.

 

 

Related Concepts

Log Archives

Related Tasks

Archive Logs Using Archive Now

 

 

 

Previous Topic:Log Archives
Next Topic:Archive Logs Using Archive Now
You are here
Table of Contents > Logging > Archive Logs Using Schedule Log Archival
Labels (2)
Labels:
  • Administration

  • Version 8.5

Tags (17)
  • 8.2
  • 8.5
  • Administration
  • AM
  • am 8.4
  • Auth Manager
  • Authentication Manager
  • Docs
  • Documentation
  • help
  • Product Docs
  • Product Documentation
  • RSA Authentication Manager
  • RSA SecurID
  • RSA SecurID Access
  • SecurID
  • Version 8.5
0 Likes
Was this article helpful? Yes No
Share
No ratings

On this page

Powered by Khoros
  • Products
  • Resources
  • Solutions
  • RSA University
  • Support
  • RSA Labs
  • RSA Ready
  • About RSA Link
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
© 2020 RSA Security LLC or its affiliates.
All rights reserved.