Users Guide

Audit.handler.file.name
8.
Audit.handler.file.name=fileName
gk}
L E3/v& gkO) v$H (g p:d. ;!- (g NW DO; [:R ' b
; L'8N gkR b; DOL'; v$UOY. L E3/v!B b; DOL'8
wTOm O|Q fN L': wTOi HKOY. (g NW DOG |< L'!B D
O[: C#! XgOB *
LLL'! _!KOY.
L& %COb 'X Audit.handler.file.name *; ekm.logN 3$OB 9&& mAU
OY. L fl DOG |< L': ekm.log.2315003554M /gQ|D; gkUO
Y. _!H .Z-: (g NW DO; [:Q x-& G0OB %5rL Gb5 UO
Y. }Z! t;vO VE (g NW DO;
*8@OY.
9&
b; L'; ekm.logN 3$OB 9&BY=z0@OY.
Audit.handler.file.name=ekm.log
Audit.handler.file.multithreads
8.
Audit.handler.file.multithreads={yes|true|no|false}
gk}
trueN v$Oi 05G :9e& gkO) (g NW! L%. %LM& 9OY. {s
- (g NW! 2B [wL OaGfbY.v Jm5 vg :9e G`(6[); hS
R v V@OY. )/ 3G :9e gkL b; ?[TOY.
9&
b; L'; trueN 3$OB 9&BY=z0@OY.
Audit.handler.file.multithreads=true
Audit.handler.file.threadlifespan
8.
Audit.handler.file.threadlifespan=timeInSeconds
7-4
Dell Encryption Key Manager gkZ H;-