To monitor system security violations, one can:
View and set up system logs. Log with system logs identifying events, time and result of working with a mobile platform server.
View background tasks. Log of active background tasks and scheduled tasks.
Collect and classify server errors. Automatic collection of mobile platform server errors using Sentry.
NOTE. Check if the system time is correct before installing Foresight Mobile Platform. If the user changes the system time after the installation, logging correctness and execution of scheduled tasks are not guaranteed.
To view system logs, use the System Logs section:
The working area displays logs that enable the user to identify events, time, and result.
IMPORTANT. When project name is changed, the previous system logs generated before name change become unavailable. New system logs are generated for the project with changed name.
Clicking the event opens its full description:
To set up logging parameters, use the System Logs Settings subsection. The parameters are used to set up logging on mobile platform server and on a mobile device.
To set up log storage settings on mobile platform server, use the Settings tab in the System Logs Settings subsection:
Set the parameter:
Time of Logs Storage on Server (days). Set the number of days of logs storage on mobile platform server. Logs are stored 10 days by default.
After executing the operations logs are stored on server during the specified number of days. When the time expires, logs are deleted from server to improve performance.
To set up device logging policy parameters, use the Device Logging Policy tab in the System Logs Settings subsection :
Set up schedule of sending logging policy to mobile device
Set up schedule for sending logs from mobile device to server
See also:
Administration and Access Control | Viewing Background Tasks | Collecting and Classifying Server Errors