Top menu

Topic: «Managing DeviceLock via Group Policy Manager»

« Previous topic | Next topic »

Al Rins

User profile

Posts: 1
Joined: 05/21/2008

As an IT overall manager, I am a bit concerned (or paranoid!) regarding logs tampering. Can the logs be tampered with? For example, System Administrator himself enabling a device or favoring his/her friend and then deleting the entry from the logs. Is there a way where I can be assured that no one including authorized System Administrators are modifying the logs.

Lastly, can the logs be directly routed (or emailed in realtime) to me as and when it generates.

Posted: 05/21/2008 09:25:31


Ekaterina Vavilova
Technical Support Engineer

User profile

Posts: 799
Joined: 06/27/2007
You can turn on DeviceLock Security and define the list of user accounts with administrative access rights to DeviceLock Service, so that no one (even local administrators) except authorized users can connect to DeviceLock Service,modify permissions, view/delete logs.

You can instruct DeviceLock to send logs to DL Enterprise Server (installed as a separate component for centralized logs/shadow data collection).

Posted: 05/21/2008 14:33:02