Using Logs to Verify Proper Configuration
Settings |
Guidelines |
Name |
Specify a name for the configuration. |
Description |
Describe the purpose of the configuration so that other administrators are aware of it. |
Resources |
|
Resources |
Specify the resources for which this policy applies, one per line. |
Roles |
|
Roles |
Select the roles to which the policy applies. In this example, Android is selected. |
Action |
|
Action |
Select one of the following actions: Allow Access Deny Access Use Detailed Rules In this example, we deny access from Android devices. |
Using Logs to Verify Proper Configuration
During initial configuration, enable event logs for MDM API calls. You can use these logs to verify proper configuration. After you have verified proper configuration, you can disable logging for these events. Then, enable only for troubleshooting.
To enable logging for MDM API calls:
1.Select System Log/Monitoring.
2.Click the Events tab.
3.Click the Settings tab to display the configuration page.
Figure shows the configuration page for Pulse Connect Secure.
4.Enable logging for MDM API events and save the configuration.
After you have completed the MDM server configuration, you can view system event logs to verify that the polling is occurring.
To display the Events log:
1.Select System Log/Monitoring.
2.Click the Events tab.
3.Click the Log tab.
The following figure shows the Events log for Pulse Connect Secure.
Next, to verify user access, you can attempt to connect to a wireless access point with your smart phone, and then view the user access logs.
To display the User Access log:
1.Select System Log/Monitoring.
2.Click the User Access tab.
3.Click the Log tab.
The following figure shows the User Access log for Pulse Connect Secure.