Archive

Posts Tagged ‘log’

#Citrix #ShareFile StorageZone Controller logs – #BYOD

January 23, 2014 Leave a comment

This is great blog post by Dan about where to find that little extra info when you’re having issues with StorageZone controllers!

Citrix ShareFile StorageZone Controller logs

When troubleshooting issues with the Citrix ShareFile StorageZone Controller the first place to look will be on the Monitoring page of the StorageZone Controller configuration page. If there are items in red on that page I’d next recommend looking in the logs for more details information.

StorageZone Controller Monitoring page

The logs for the StorageZone Controller are located by default at c:\inetpub\wwwroot\Citrix\StorageCenter\SC\logs.

Within this directory multiple logfiles exist. The main ones you should check are:

  • cfgsrv_%date%.txt – StorageZone configuration logs
  • sc_%date%.txt – ShareFile StorageZone “ShareFile Data” logs
  • CIFS_%date%.txt – ShareFile StorageZone Connectors for Network File Shares logs
  • sharepoint_%date%.txt – ShareFile StorageZone Connectors for SharePoint logs

You can enable extended logging for…

Continue reading here!

//Richard

Five enterprise-ready antivirus systems – #Webroot, @Webroot

This is an interesting article! And I’m happy to see the only cloud-based product on the list!

5: Webroot SecureAnywhere Business – Endpoint Protection

Webroot SecureAnywhere Business – Endpoint Protection is the only solution on this list that is cloud-based only. Some of the others offer a cloud-based service option, but Webroot is the only one that does not offer an on-premise system. However, Webroot is still one of the most impressive applications in the list. The dashboard gives admins a quick overview of their enterprise, endpoint details can be quickly checked, and policies, reports, and logs can be easily viewed. On top of that, though, is the client: it installs in seconds (literally about 6-8 seconds for me) and scans in less than two minutes (1 minute, 42 seconds for my test system). Also, Webroot claims that their client software will run alongside any other security software without conflict. The main disadvantage of this system is its cloud-based nature – company’s deploying Webroot may have limited Internet bandwidth or security concerns with cloud software.

Read the whole article and the other 4 products listed here!

And you can also read my previous blog post about my little review of Webroot here.

//Richard

%d bloggers like this: