Agent Reference Guide
Agent Logs
6 min
authentication logs successful and unsuccessful authentication and mfa requests made to the agent installed target servers are recorded indisputably by kron pam to access windows and linux agent logs navigate to logging > auth logs fill in the fields to filter and click the search button session logs authorized users can see the text logs of the target system connection sessions session records consume a small amount of space in storage to access session logs navigate to logigng > session logs fill in the fields to filter and click the search button to view the logs in text format click the options menu and select show details logs can be seen in text format to filter linux agent logs click the protocol button select the agent option command logs the command logs functionality allows kron pam to search for the commands executed in linux agent sessions, as well as the keystrokes, file uploads, file downloads, and texts captured during the sessions the difference between the command logs tab and the session logs tab is the listing method session logs are listed by sessions each line represents a session in the command logs tab, users can search by a command, and all the sessions that include this command will be listed if a command is run during the session twice, two different lines will be listed in the command logs to search the command logs navigate to logging > session logs open the command logs tab enter the criteria in the search filter and click the search button