Managing Audit Log Files

Audit logs provide a way to monitor the system for security and system access activity.

The following table identifies the RealPresence Resource Manager system audit log files.

Log Name



Log file that shows every web request that was made from client systems. The system may have more than one such log.


Log file that captures security-related authentication issues.


Logs are useful not only for understanding the internal operation of a system but also the timing and relationships of activities within the system through the time-ordered messages within a time-stamped log.


Log file that captures intrusion detection alerts.