Log file
BestCrypt Data Shelter writes information about events happened with protected folders to the log file. To choose location of the log file and amount of information written to the file, click the Settings command from the left pane of the main window of the program. The following window will appear.
|
|
To choose location of the log file check the Write log checkbox and click the Change button. Select Important events only or All events with detailed information option to choose should the log file contain all or only important events.
To view contents of the log file, click button View log. You can also view the log file by running the command from the System Tray Icon. The following dialog window showing contents of the log file will appear.
|
|
The window above illustrates main events reported by BestCrypt Data Shelter:
- New process running on the computer and interprocess communication
- The event of granting access to the protected folder for some process
- The event of not granting access to the protected folder for some process
If you select some string and click the right mouse button, you will get context menu with commands specific for the log string selected.
If you click on the log string informing about granted or not granted access to the protected folder by right mouse button, the following context menu will appear.
|
|
If you run the Analyze access grant command for the log string, BestCrypt Data Shelter will show the dialog window that explains what protection policy caused the action and why the program was granted or not granted access to the folder. For the case when the access was granted, the following window can appear.
|
|
For the example above, both the user and the program are allowed to access the folder and the Run-time information text explains what settings in the current protection policy were applied for the program.
Since the Run-time information appears right in the same dialog where you can edit the protection policy, you can use the information to correct the policy if needed.
As you see, log viewing program in BestCrypt Data Shelter not only lists events happened with the protected folders, it also allows correcting and tuning rules for the programs and users.
See also: