-
Integration of Citrix Secure Private Access with Google Chrome Enterprise Premium
-
Apps configuration and management
-
Logs and events
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Secure Private Access logs and events
The logs and events are crucial for monitoring, troubleshooting, and ensuring compliance. The Citrix Secure Private Access service-related logs and events can be accessed from the following sources:
Diagnostic dashboard
The diagnostic dashboard provides a centralized interface for viewing and analyzing logs and events. Admins can use this dashboard for monitoring and troubleshooting issues related to Secure Private Access. For details, see Secure Private Access dashboard.
List of errors
For a comprehensive list of errors that users might encounter when using the Secure Private Access service, see Diagnostic log info codes.
Audit logs
Audit logs capture detailed records of user activities and system changes. These logs are essential for compliance and security purposes, as they help track who accessed the system, what changes were made, and when these actions occurred. For details, see Audit and System Logs.
System logs
System Logs contain information about the internal operations of the Secure Private Access service. These logs are useful for diagnosing system-level issues, such as performance issues or errors in service functionality. For details, see System Log.
Device posture logs
Device posture logs provide insights into the security posture of devices accessing the Secure Private Access service. These logs help ensure that devices meet the required security standards before granting access, thus enhancing overall security. For details, see Device Posture logs.
Share
Share
In this article
This Preview product documentation is Citrix Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Citrix Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Citrix product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.