GlobalSCAPE Logs
GlobalSCAPE Logs
docx
EFT Logging
This document provides a general overview of logging available in EFT.
Incoming Log (3 forms: ex.log, in.log, or nc.log) .................................................................................................. 1
W3C Extended (default and preferred logging format—ex.log) ................................................................... 2
Microsoft IIS (in.log) ......................................................................................................................................... 3
NCSA Common Log (nc.log) .......................................................................................................................... 5
CL.log ....................................................................................................................................................................... 7
Ted6 logs ................................................................................................................................................................. 9
PGP log ................................................................................................................................................................. 10
EFT.log ................................................................................................................................................................... 17
• Log Formats: W3C Extended (default), Microsoft IIS, and NCSA common.
• For HA environments, it is NOT recommended to use a shared path. Each HA node should be writing its own
log file or access issues will occur (missing information).
1
GlobalSCAPE-Logs.docx
• What it logs: Inbound file transfer activity initiated through clients connecting to EFT via FTP/S, SFTP,
HTTP/S.
• Log format: Date, Time, Client Port (PORT command), Username, Session ID, request/command, command
parameter, Server response code, bytes transferred, Server IP (PASV command), server port#
• Activity logged:
o Standard: USER (Username), PASS (Password), Created (Client Upload Complete), Sent (file
downloaded), ABOR (Abort File Transfer) Dele (delete file), RNFO (Rename From), RNTO
(Rename To), MKD (Make Directory, RMD (Remove Directory)
• Example Output:
2016-12-01 03:12:05 127.0.0.1 - - [1]user a - 331 - - - 21
2016-12-01 03:12:05 127.0.0.1 - a [1]pass ****** - 230 - - - 21
2016-12-01 03:12:16 127.0.0.1 - a [1]sent 1.TXT - 226 - - - 21
2016-12-01 03:12:38 127.0.0.1 - a [1]created 22.TXT - 226 - - - 21
2016-12-01 03:12:45 127.0.0.1 - a [1]dele 2.TXT - 250 - - - 21
2016-12-01 03:12:58 127.0.0.1 - a [1]rnfr /1111.txt - 350 - - - 21
2016-12-01 03:12:58 127.0.0.1 - a [1]rnto /2222.txt - 250 - - - 21
2016-12-01 03:13:19 127.0.0.1 - a [1]mkd NewFolder - 257 - - - 21
2016-12-01 03:13:29 127.0.0.1 - a [1]rnfr /NewFolder - 350 - - - 21
2016-12-01 03:13:29 127.0.0.1 - a [1]rnto /RenamedFolder - 250 - - - 21
2016-12-01 03:15:11 127.0.0.1 - a [1]rmd RenamedFolder - 250 - - - 21
• Verbose:
USER (Username), PASS (Password), HELP, ALLO, APPE, REST (Resume Transfer), Stor
(begin client upload), Created (Client Upload Complete), Sent (file downloaded)
MDTM (return last modified date/time), MFMT (Modify Fact: modify date/timestamp),
Download, ABOR (Abort File Transfer), Dele (delete file), Rename From, Rename To,
MKD (Make Directory, RMD (Remove Directory), List, NLST (abbreviated List), PWD
(Print Working Directory), CWD (Change Working Directory), CLNT (Client), SYST
(System Type), FEAT (Features), OPTS (Options), Size, Type I (Binary data
transfer), Type A (ASCII data transfer), PASV (no ip/port), PORT ip/port, EPSV
(extended Passive), EPRT (Extended Port), Mode Z (compression) , Mode S (Stream),
Quit, NOOP (No Operation)
• Example Output:
2016-12-01 03:12:05 127.0.0.1 - - [1]user a - 331 - - - 21
2016-12-01 03:12:05 127.0.0.1 - a [1]pass ****** - 230 - - - 21
2016-12-01 03:12:05 127.0.0.1 - a [1]syst - - 215 - - - 21
2016-12-01 03:12:05 127.0.0.1 - a [1]feat - - 211 - - - 21
2016-12-01 03:12:05 127.0.0.1 - a [1]lang - - 200 - - - 21
2016-12-01 03:12:05 127.0.0.1 - a [1]clnt CuteFTP - 200 - - - 21
2016-12-01 03:12:05 127.0.0.1 - a [1]opts UTF8+on - 200 - - - 21
2016-12-01 03:12:05 127.0.0.1 - a [1]help - - 214 - - - 21
2016-12-01 03:12:05 127.0.0.1 - a [1]noop - - 200 - - - 21
2016-12-01 03:12:16 127.0.0.1 - a [1]retr 1.TXT - 150 - - - 21
2016-12-01 03:12:16 127.0.0.1 - a [1]sent 1.TXT - 226 - - - 21
2016-12-01 03:12:38 127.0.0.1 - a [1]size 22.TXT - 550 - - - 21
2016-12-01 03:12:38 127.0.0.1 - a [1]stor 22.TXT - 150 - - - 21
2016-12-01 03:12:38 127.0.0.1 - a [1]created 22.TXT - 226 - - - 21
2016-12-01 03:12:38 127.0.0.1 - a [1]mfmt 20161128221417.732+22.TXT - 213 - - - 21
2
GlobalSCAPE-Logs.docx
• What it logs: Inbound file transfer activity initiated through clients connecting to EFT via FTP/S, SFTP,
HTTP/S.
• Log format: Remote IP, User Name, Date, Time, Internal server identifier, Local Server name, Local Server IP,
Byte Size (in), Status code, Session ID, Command/activity, parameter
• Activity logged:
o Standard: USER (Username), PASS (Password), Created (Client Upload Complete), Sent (file
downloaded), ABOR (Abort File Transfer) Dele (delete file), Rename From, Rename To, MKD (Make
Directory, RMD (Remove Directory)
• Example Output:
172.31.4.64, -, 11/28/16, 12:49:08, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
331, 0, [152]user, a, -,
172.31.4.64, a, 11/28/16, 12:49:08, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
230, 0, [152]pass, ******, -,
172.31.4.64, a, 11/28/16, 12:49:40, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
257, 0, [152]mkd, NewDirectory, -,
172.31.4.64, a, 11/28/16, 12:49:46, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
350, 0, [152]rnfr, /NewDirectory, -,
172.31.4.64, a, 11/28/16, 12:49:46, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
250, 0, [152]rnto, /RenamedDirectory, -,
172.31.4.64, a, 11/28/16, 12:49:50, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
250, 0, [152]rmd, RenamedDirectory, -,
3
GlobalSCAPE-Logs.docx
• Verbose:
USER (Username), PASS (Password), HELP, ALLO, APPE, REST (Resume Transfer), Stor
(begin client upload), Created (Client Upload Complete), Sent (file downloaded)
MDTM (return last modified date/time), MFMT (Modify Fact: modify date/timestamp),
Download, ABOR (Abort File Transfer), Dele (delete file), Rename From, Rename To,
MKD (Make Directory, RMD (Remove Directory), List, NLST (abbreviated List), PWD
(Print Working Directory), CWD (Change Working Directory), CLNT (Client), SYST
(System Type), FEAT (Features), OPTS (Options), Size, Type I (Binary data
transfer), Type A (ASCII data transfer), PASV (no ip/port), PORT ip/port, EPSV
(extended Passive), EPRT (Extended Port), Mode Z (compression) , Mode S (Stream),
Quit, NOOP (No Operation)
• Example Output:
172.31.4.64, -, 11/28/16, 13:19:59, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
331, 0, [1]user, a, -,
172.31.4.64, a, 11/28/16, 13:19:59, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
230, 0, [1]pass, ******, -,
172.31.4.64, a, 11/28/16, 13:19:59, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
215, 0, [1]syst, -, -,
172.31.4.64, a, 11/28/16, 13:19:59, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
211, 0, [1]feat, -, -,
172.31.4.64, a, 11/28/16, 13:19:59, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
200, 0, [1]lang, -, -,
172.31.4.64, a, 11/28/16, 13:19:59, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
200, 0, [1]clnt, CuteFTP, -,
172.31.4.64, a, 11/28/16, 13:19:59, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
200, 0, [1]opts, UTF8 on, -,
172.31.4.64, a, 11/28/16, 13:19:59, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
214, 0, [1]help, -, -,
172.31.4.64, a, 11/28/16, 13:19:59, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
200, 0, [1]noop, -, -,
172.31.4.64, a, 11/28/16, 13:20:20, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
550, 0, [1]size, 1.TXT, -,
172.31.4.64, a, 11/28/16, 13:20:20, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
150, 0, [1]stor, 1.TXT, -,
172.31.4.64, a, 11/28/16, 13:20:20, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
226, 0, [1]created, 1.TXT, -,
172.31.4.64, a, 11/28/16, 13:20:20, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
213, 0, [1]mfmt, 2016112818533.772 1.TXT, -,
172.31.4.64, a, 11/28/16, 13:20:26, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
350, 0, [1]rnfr, /1.TXT, -,
172.31.4.64, a, 11/28/16, 13:20:26, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
250, 0, [1]rnto, /2.TXT, -,
172.31.4.64, a, 11/28/16, 13:20:30, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
150, 0, [1]retr, 2.TXT, -,
172.31.4.64, a, 11/28/16, 13:20:30, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
226, 0, [1]sent, 2.TXT, -,
172.31.4.64, a, 11/28/16, 13:20:37, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
250, 0, [1]dele, 2.TXT, -,
172.31.4.64, a, 11/28/16, 13:20:44, MSFTPSVC1, GS0110, 192.168.102.22, 0, 0, 0,
257, 0, [1]mkd, NewFolder, -,
4
GlobalSCAPE-Logs.docx
• What it logs: Inbound file transfer activity initiated through clients connecting to EFT via FTP/S, SFTP,
HTTP/S.
• Log format: Client IP, Username, Date dd/month/yyyy : local server time -+ GMT offset, Command,
Parameter, response code, byte size transferred
• Activity logged:
o Standard: USER (Username), PASS (Password), Created (Client Upload Complete), Sent (file
downloaded), ABOR (Abort File Transfer) Dele (delete file), Rename From, Rename To, MKD (Make
Directory, RMD (Remove Directory)
5
GlobalSCAPE-Logs.docx
• Example Output:
172.31.4.64 - -, [28/Nov/2016:16:09:19 -0600] "user a" 331 0,
172.31.4.64 - a [28/Nov/2016:16:09:19 -0600] "pass ******" 230 0,
172.31.4.64 - a [28/Nov/2016:16:09:44 -0600] "sent 222222.txt" 226 133,
172.31.4.64 - a [28/Nov/2016:16:09:54 -0600] "created 1111.txt" 226 133,
172.31.4.64 - a [28/Nov/2016:16:10:10 -0600] "rnfr /222222.txt" 350 0,
172.31.4.64 - a [28/Nov/2016:16:10:10 -0600] "rnto /3333.txt" 250 0,
172.31.4.64 - a [28/Nov/2016:16:10:16 -0600] "mkd NewFolder" 257 0,
172.31.4.64 - a [28/Nov/2016:16:10:34 -0600] "rmd RenamedFolder" 250 0,
172.31.4.64 - a [28/Nov/2016:16:13:18 -0600] "abor -, 226 0,
• Verbose:
USER (Username), PASS (Password), HELP, ALLO, APPE, REST (Resume Transfer), Stor
(begin client upload), Created (Client Upload Complete), Sent (file downloaded)
MDTM (return last modified date/time), MFMT (Modify Fact: modify date/timestamp),
Download, ABOR (Abort File Transfer), Dele (delete file), Rename From, Rename To,
MKD (Make Directory, RMD (Remove Directory), List, NLST (abbreviated List), PWD
(Print Working Directory), CWD (Change Working Directory), CLNT (Client), SYST
(System Type), FEAT (Features), OPTS (Options), Size, Type I (Binary data
transfer), Type A (ASCII data transfer), PASV (no ip/port), PORT ip/port, EPSV
(extended Passive), EPRT (Extended Port), Mode Z (compression) , Mode S (Stream),
Quit, NOOP (No Operation)
• Example Output:
172.31.4.64 - -, [28/Nov/2016:16:09:19 -0600] "user a" 331 0,
172.31.4.64 - a [28/Nov/2016:16:09:19 -0600] "pass ******" 230 0,
172.31.4.64 - a [28/Nov/2016:16:09:19 -0600] "syst -, 215 0,
172.31.4.64 - a [28/Nov/2016:16:09:19 -0600] "pwd -, 257 0,
172.31.4.64 - a [28/Nov/2016:16:09:19 -0600] "feat -, 211 0,
172.31.4.64 - a [28/Nov/2016:16:09:19 -0600] "lang -, 200 0,
172.31.4.64 - a [28/Nov/2016:16:09:19 -0600] "help -, 214 0,
172.31.4.64 - a [28/Nov/2016:16:09:19 -0600] "noop -, 200 0,
172.31.4.64 - a [28/Nov/2016:16:09:19 -0600] "clnt CuteFTP" 200 0,
172.31.4.64 - a [28/Nov/2016:16:09:19 -0600] "opts UTF8 on" 200 0,
172.31.4.64 - a [28/Nov/2016:16:09:44 -0600] "retr 222222.txt" 150 0,
172.31.4.64 - a [28/Nov/2016:16:09:44 -0600] "sent 222222.txt" 226 133,
172.31.4.64 - a [28/Nov/2016:16:09:54 -0600] "size 1111.txt" 550 0,
172.31.4.64 - a [28/Nov/2016:16:09:54 -0600] "stor 1111.txt" 150 0,
172.31.4.64 - a [28/Nov/2016:16:09:54 -0600] "created 1111.txt" 226 133,
172.31.4.64 - a [28/Nov/2016:16:09:54 -0600] "mfmt 20160519201400 1111.txt" 213 0,
172.31.4.64 - a [28/Nov/2016:16:10:10 -0600] "rnfr /222222.txt" 350 0,
172.31.4.64 - a [28/Nov/2016:16:10:10 -0600] "rnto /3333.txt" 250 0,
172.31.4.64 - a [28/Nov/2016:16:10:16 -0600] "mkd NewFolder" 257 0,
172.31.4.64 - a [28/Nov/2016:16:10:16 -0600] "cwd /NewFolder" 250 0,
172.31.4.64 - a [28/Nov/2016:16:10:30 -0600] "cwd /" 250 0,
172.31.4.64 - a [28/Nov/2016:16:10:30 -0600] "rnfr /NewFolder" 350 0,
172.31.4.64 - a [28/Nov/2016:16:10:31 -0600] "rnto /RenamedFolder" 250 0,
172.31.4.64 - a [28/Nov/2016:16:10:34 -0600] "list /RenamedFolder" 150 0,
172.31.4.64 - a [28/Nov/2016:16:10:34 -0600] "list /RenamedFolder" 226 0,
172.31.4.64 - a [28/Nov/2016:16:10:34 -0600] "rmd RenamedFolder" 250 0,
172.31.4.64 - a [28/Nov/2016:16:11:21 -0600] "mode s" 200 0,
172.31.4.64 - a [28/Nov/2016:16:11:29 -0600] "mode z" 200 0,
172.31.4.64 - a [28/Nov/2016:16:11:34 -0600] "rest 0" 350 0,
172.31.4.64 - a [28/Nov/2016:16:11:41 -0600] "allo 1" 200 0,
172.31.4.64 - a [28/Nov/2016:16:11:48 -0600] "pwd -, 257 0,
172.31.4.64 - a [28/Nov/2016:16:11:53 -0600] "type a" 200 0,
172.31.4.64 - a [28/Nov/2016:16:11:59 -0600] "type I" 200 0,
172.31.4.64 - a [28/Nov/2016:16:12:05 -0600] "nlst /" 150 0,
172.31.4.64 - a [28/Nov/2016:16:12:21 -0600] "pasv -, 227 0,
172.31.4.64 - a [28/Nov/2016:16:13:11 -0600] "epsv -, 229 0,
172.31.4.64 - a [28/Nov/2016:16:13:18 -0600] "abor -, 226 0,
6
GlobalSCAPE-Logs.docx
• Naming: clYYMMDD.log
• What it logs: Outbound file transfer activity initiated through event rules; COPY/MOVE and Download
events using FTP/S, SFTP, HTTP/S, and LAN.
• Logging format: Date, Time, Protocol, Remote Address, Port#, Username, Local path, Remote path, action,
status code.
o Status codes will be different depending on the response from the remote server and depending on
what protocol is being used. Sample log entries can be seen below (sftp, ftp/s, http/s)
• IP Banned:
2016-10-08 09:37:03; sftp; localhost; 22; a; C\temp\2filesNotRenamed.jpg;
/2filesNotRenamed.jpg; download; -1;
2016-10-08 09:37:04; ftp; localhost; 21; a; C:\temp2\numberRenamed.txt;
/numberRenamed.txt; download; 10054;
2016-10-08 09:37:04; https; localhost; 443; a; C:\Temp3\ExlogSegment.log;
/ExlogSegment.log; download; 122;
• Bad Username:
2016-10-08 09:35:38; sftp; localhost; 22; h; C\temp\2filesNotRenamed.jpg;
/2filesNotRenamed.jpg; download; -1;
7
GlobalSCAPE-Logs.docx
• Bad Password:
2016-10-08 09:37:42; sftp; localhost; 22; a; C\temp\2filesNotRenamed.jpg;
/2filesNotRenamed.jpg; download; -1;
2016-10-08 09:37:43; ftp; localhost; 21; a; C:\temp2\numberRenamed.txt;
/numberRenamed.txt; download; 530;
2016-10-08 09:37:43; https; localhost; 443; a; C:\Temp3\ExlogSegment.log;
/ExlogSegment.log; download; 552;
• Upload:
2016-10-08 09:12:16; ftp; localhost; 21; a; C:\temp\ADcantPullfromDomain.jpg;
/ADcantPullfromDomain.jpg; upload; 226;
2016-10-08 09:12:16; sftp; localhost; 22; a; C:\temp\ConnectedUserStats.vbs.txt;
/ConnectedUserStats.vbs.txt; upload; 0;
2016-10-08 09:12:17; https; localhost; 443; a;
C:\temp\UserHomeFolderandQuota.vbs.txt; /UserHomeFolderandQuota.vbs.txt; upload;
201;
8
GlobalSCAPE-Logs.docx
• Naming: [YY.MM.DD_HH.mm]-#_u.log
• What it logs: Client connection information (event rules and outbound transfers), client commands/requests,
remote server responses, status messages.
• In version 7.2.9 and later, the default location is C:\ProgramData\Globalscape\EFT Server Enterprise\Logs\
and can be configured on EFT on the Server > Logs tab.
• In versions prior to 7.2, to change the location of this log and/or to configure various aspects, you must modify
the registry keys located in the following directory:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Globalscape\TED 6\Settings\LogWindow
9
GlobalSCAPE-Logs.docx
• The key in red controls the location. The keys in green are supplemental or control whether logs are retained.
Further information on the options available can be found here:
https://kb.globalscape.com/KnowledgebaseArticle10492.aspx
PGP log
• Location: C:\ProgramData\Globalscape\EFT Server Enterprise\ (default)
• Log Rotation: “Dynamic log file name” option allows the log file to rollover on daily basis.
• The location, name, rotation setting, and logging levels are configured from within EFT administration
interface. They can be found in Site > Security > OpenPGP security configuration.
10
GlobalSCAPE-Logs.docx
o Encrypt:
2016/11/3 17:30:59 <17744> Starting to read data from "C:\temp\ADcantPull.jpg"
2016/11/3 17:30:59 <17744> Starting to write data to "C:\temp\ADcantPull.jpg.pgp"
2016/11/3 17:30:59 <17744> Starting PGP message encoding
2016/11/3 17:30:59 <17744> Automatically selected encryption algorithm: "TripleDES"
2016/11/3 17:30:59 <17744> Automatically selected compression method: "ZIP"
2016/11/3 17:30:59 <17744> Starting to encrypt, encryption algorithm is TripleDES
2016/11/3 17:30:59 <17744> Starting to compress, compression algorithm is ZIP
2016/11/3 17:30:59 <17744> Starting to write PGPLiteralDataPacket
2016/11/3 17:30:59 <17744> Finished writing PGPLiteralDataPacket
2016/11/3 17:30:59 <17744> Finished compressing data
2016/11/3 17:30:59 <17744> Finished encrypting data
2016/11/3 17:30:59 <17744> Finished PGP message encoding
2016/11/3 17:30:59 <17744> Finished reading data from file "C:\temp\ADcantPull.jpg"
2016/11/3 17:30:59 <17744> Finished writing data to file
"C:\temp\ADcantPull.jpg.pgp"
o Encrypt+Sign:
2016/11/3 17:53:57 <20092> Starting to read data from "C:\temp\TestImage.jpg"
2016/11/3 17:53:57 <20092> Starting to write data to "C:\temp\TestImage.jpg.pgp"
2016/11/3 17:53:57 <20092> Starting PGP message encoding
2016/11/3 17:53:57 <20092> Automatically selected signature hash algorithm:
"SHA512"
2016/11/3 17:53:57 <20092> Automatically selected encryption algorithm: "TripleDES"
2016/11/3 17:53:57 <20092> Automatically selected compression method: "ZIP"
2016/11/3 17:53:57 <20092> Starting to encrypt, encryption algorithm is TripleDES
2016/11/3 17:53:57 <20092> Starting to compress, compression algorithm is ZIP
2016/11/3 17:53:57 <20092> Starting one pass signature, signing algorithm is SHA512
11
GlobalSCAPE-Logs.docx
o Decrypt:
2016/11/3 18:8:49 <17556> Starting to read data from
"C:\temp\ADcantPullfromDomain.jpg.pgp"
2016/11/3 18:8:49 <17556> Starting to write data to "C:\temp\ADcantPull.jpg"
2016/11/3 18:8:49 <17556> Starting PGP message decoding
2016/11/3 18:8:49 <17556> Starting to read packets
2016/11/3 18:8:49 <17556> Found encrypted packet
2016/11/3 18:8:49 <17556> Symmetric algorithm is: TripleDES
2016/11/3 18:8:49 <17556> Found compressed packet
2016/11/3 18:8:49 <17556> Starting to decompress message
2016/11/3 18:8:49 <17556> Found literal packet
2016/11/3 18:8:49 <17556> Starting to output message
2016/11/3 18:8:49 <17556> Finished outputting message
2016/11/3 18:8:49 <17556> Finished decompressing message
2016/11/3 18:8:49 <17556> Finished reading packets
2016/11/3 18:8:49 <17556> Finished PGP message decoding
2016/11/3 18:8:49 <17556> Finished reading data from file
"C:\temp\ADcantPulln.jpg.pgp"
2016/11/3 18:8:49 <17556> Finished writing data to file "C:\temp\ADcantPull.jpg"
o Decrypt+Verify:
2016/11/3 18:6:21 <22892> Starting to read data from "C:\temp\TestImage.jpg.pgp"
2016/11/3 18:6:21 <22892> Starting to write data to "C:\temp\TestImage.jpg"
2016/11/3 18:6:21 <22892> Starting PGP message decoding
2016/11/3 18:6:21 <22892> Starting to read packets
2016/11/3 18:6:21 <22892> Found encrypted packet
2016/11/3 18:6:21 <22892> Symmetric algorithm is: TripleDES
2016/11/3 18:6:21 <22892> Found compressed packet
2016/11/3 18:6:21 <22892> Starting to decompress message
2016/11/3 18:6:21 <22892> Found signed packet
2016/11/3 18:6:21 <22892> Found One-pass signature, starting to compute hash
2016/11/3 18:6:21 <22892> Starting to output message
2016/11/3 18:6:21 <22892> Finished outputting message
2016/11/3 18:6:21 <22892> Starting to verify message
2016/11/3 18:6:21 <22892> Finished verifying message
2016/11/3 18:6:21 <22892> Finished decompressing message
2016/11/3 18:6:21 <22892> Finished reading packets
2016/11/3 18:6:21 <22892> Finished PGP message decoding
2016/11/3 18:6:21 <22892> Finished reading data from file
"C:\temp\TestImage.jpg.pgp"
2016/11/3 18:6:21 <22892> Finished writing data to file "C:\temp\TestImage.jpg"
12
GlobalSCAPE-Logs.docx
o Encrypt:
2016/11/30 20:38:25 <21040> Starting to read data from
"C:\Users\xxxxxxxx\Documents\New folder\Test1.txt"
2016/11/30 20:38:25 <21040> Starting to write data to
"C:\Users\xxxxxxxx\Documents\New folder\Test1.txt.pgp"
2016/11/30 20:38:25 <21040> Starting PGP message encoding
2016/11/30 20:38:25 <21040> Automatically selected encryption algorithm:
"TripleDES"
2016/11/30 20:38:25 <21040> Starting to encrypt, encryption algorithm is TripleDES
2016/11/30 20:38:25 <21040> packet tag: 1, Public-Key Encrypted Session Key
Packet, len: 526
2016/11/30 20:38:25 <21040> Starting to compress, compression algorithm is zlib
2016/11/30 20:38:25 <21040> packet tag: 8, Compressed Data Packet, len: 1
2016/11/30 20:38:25 <21040> Starting to write PGPLiteralDataPacket
2016/11/30 20:38:25 <21040> packet tag: 11, Literal Data Packet, len:
15
2016/11/30 20:38:25 <21040> Finished writing PGPLiteralDataPacket
2016/11/30 20:38:25 <21040> Finished compressing data
2016/11/30 20:38:25 <21040> Finished encrypting data
2016/11/30 20:38:25 <21040> Finished PGP message encoding
2016/11/30 20:38:25 <21040> Finished reading data from file
"C:\Users\xxxxxxxx\Documents\New folder\Test1.txt"
2016/11/30 20:38:25 <21040> Finished writing data to file
"C:\Users\xxxxxxxx\Documents\New folder\Test1.txt.pgp"
o Encrypt+Sign:
2016/11/30 20:38:12 <17940> Starting to read data from
"C:\Users\xxxxxxxx\Documents\New folder\Test2.txt"
2016/11/30 20:38:12 <17940> Starting to write data to
"C:\Users\xxxxxxxx\Documents\New folder\Test2.txt.pgp"
2016/11/30 20:38:12 <17940> Starting PGP message encoding
2016/11/30 20:38:12 <17940> Automatically selected signature hash algorithm:
"SHA512"
2016/11/30 20:38:12 <17940> Automatically selected encryption algorithm:
"TripleDES"
2016/11/30 20:38:12 <17940> Starting to encrypt, encryption algorithm is TripleDES
2016/11/30 20:38:12 <17940> packet tag: 1, Public-Key Encrypted Session Key
Packet, len: 526
2016/11/30 20:38:12 <17940> Starting to compress, compression algorithm is zlib
2016/11/30 20:38:12 <17940> packet tag: 8, Compressed Data Packet, len: 1
13
GlobalSCAPE-Logs.docx
o Decrypt:
2016/11/30 20:41:33 <10796> Starting to read data from
"C:\Users\xxxxxxxx\Documents\New folder\Test1.txt.pgp"
2016/11/30 20:41:33 <10796> Starting to write data to
"C:\Users\xxxxxxxx\Documents\New folder\Test1.txt"
2016/11/30 20:41:33 <10796> Starting PGP message decoding
2016/11/30 20:41:33 <10796> Starting to read packets
2016/11/30 20:41:33 <10796> Reading next packet
2016/11/30 20:41:33 <10796> packet tag: 1, Public-Key Encrypted Session Key
Packet, len: 526
2016/11/30 20:41:33 <10796> Found encrypted packet
2016/11/30 20:41:33 <10796> Found recipient info. Key id is "A334C7C89CE1D588",
public key algorithm is "ElGamal"
2016/11/30 20:41:33 <10796> Reading next packet
2016/11/30 20:41:33 <10796> packet tag: 18, Symmetrically Encrypted Integrity
Protected Data Packet, len: 1
2016/11/30 20:41:33 <10796> Trying passphrase for key(xxxxxxxx
<[email protected]>, id=D636F96A)
2016/11/30 20:41:33 <10796> Symmetric algorithm is: TripleDES
2016/11/30 20:41:33 <10796> Decrypted packets:
2016/11/30 20:41:33 <10796> Reading next packet
2016/11/30 20:41:33 <10796> packet tag: 8, Compressed Data Packet, len: 1
2016/11/30 20:41:33 <10796> Found compressed packet
2016/11/30 20:41:33 <10796> Starting to decompress message
2016/11/30 20:41:33 <10796> Reading next packet
2016/11/30 20:41:33 <10796> packet tag: 11, Literal Data Packet, len:
15
2016/11/30 20:41:33 <10796> Found literal packet
2016/11/30 20:41:33 <10796> Starting to output message
2016/11/30 20:41:33 <10796> Finished outputting message
2016/11/30 20:41:33 <10796> Reading next packet
2016/11/30 20:41:33 <10796> No more packets
2016/11/30 20:41:33 <10796> Finished decompressing message
2016/11/30 20:41:33 <10796> Reading next packet
2016/11/30 20:41:33 <10796> No more packets
2016/11/30 20:41:33 <10796> Reading next packet
2016/11/30 20:41:33 <10796> No more packets
2016/11/30 20:41:33 <10796> Finished reading packets
2016/11/30 20:41:33 <10796> Finished PGP message decoding
2016/11/30 20:41:33 <10796> Finished reading data from file
"C:\Users\xxxxxxxx\Documents\New folder\Test1.txt.pgp"
14
GlobalSCAPE-Logs.docx
o Decrypt+Verify:
2016/11/30 20:42:14 <14792> Starting to read data from
"C:\Users\xxxxxxxx\Documents\New folder\Test2.txt.pgp"
2016/11/30 20:42:14 <14792> Starting to write data to
"C:\Users\xxxxxxxx\Documents\New folder\Test2.txt"
2016/11/30 20:42:14 <14792> Starting PGP message decoding
2016/11/30 20:42:14 <14792> Starting to read packets
2016/11/30 20:42:14 <14792> Reading next packet
2016/11/30 20:42:14 <14792> packet tag: 1, Public-Key Encrypted Session Key
Packet, len: 526
2016/11/30 20:42:14 <14792> Found encrypted packet
2016/11/30 20:42:14 <14792> Found recipient info. Key id is "A334C7C89CE1D588",
public key algorithm is "ElGamal"
2016/11/30 20:42:14 <14792> Reading next packet
2016/11/30 20:42:14 <14792> packet tag: 18, Symmetrically Encrypted Integrity
Protected Data Packet, len: 1
2016/11/30 20:42:14 <14792> Trying passphrase for key(xxxxxxxx
<[email protected]>, id=D636F96A)
2016/11/30 20:42:14 <14792> Symmetric algorithm is: TripleDES
2016/11/30 20:42:14 <14792> Decrypted packets:
2016/11/30 20:42:14 <14792> Reading next packet
2016/11/30 20:42:14 <14792> packet tag: 8, Compressed Data Packet, len: 1
2016/11/30 20:42:14 <14792> Found compressed packet
2016/11/30 20:42:14 <14792> Starting to decompress message
2016/11/30 20:42:14 <14792> Reading next packet
2016/11/30 20:42:14 <14792> packet tag: 4, One-Pass Signature Packet, len:
13
2016/11/30 20:42:14 <14792> Found one-pass signature packet
2016/11/30 20:42:14 <14792> Found One-pass signature, starting to compute hash
2016/11/30 20:42:14 <14792> Reading next packet
2016/11/30 20:42:14 <14792> packet tag: 11, Literal Data Packet, len:
15
2016/11/30 20:42:14 <14792> Found literal packet
2016/11/30 20:42:14 <14792> Starting to output message
2016/11/30 20:42:14 <14792> Finished outputting message
2016/11/30 20:42:14 <14792> Reading next packet
2016/11/30 20:42:14 <14792> packet tag: 2, Signature Packet, len: 86
2016/11/30 20:42:14 <14792> Starting to verify message
2016/11/30 20:42:14 <14792> Found signature info. Key id is "A6DA4A59D636F96A",
signing algorithm is "SHA512", public key algorithm is "DSA"
2016/11/30 20:42:14 <14792> The signature of key(id=A6DA4A59D636F96A) verification
succeeded
2016/11/30 20:42:14 <14792> Finished verifying message
2016/11/30 20:42:14 <14792> Reading next packet
2016/11/30 20:42:14 <14792> No more packets
2016/11/30 20:42:14 <14792> Finished decompressing message
2016/11/30 20:42:14 <14792> Reading next packet
2016/11/30 20:42:14 <14792> No more packets
2016/11/30 20:42:14 <14792> Reading next packet
2016/11/30 20:42:14 <14792> No more packets
2016/11/30 20:42:14 <14792> Finished reading packets
2016/11/30 20:42:14 <14792> Finished PGP message decoding
2016/11/30 20:42:14 <14792> Finished reading data from file
"C:\Users\xxxxxxxx\Documents\New folder\Test2.txt.pgp"
2016/11/30 20:42:14 <14792> Finished writing data to file
"C:\Users\xxxxxxxx\Documents\New folder\Test2.txt"
15
GlobalSCAPE-Logs.docx
16
GlobalSCAPE-Logs.docx
EFT.log
• Location: C:\ProgramData\Globalscape\EFT Server Enterprise (Default)
• To increase/decrease logging or configure logging aspects, modify and save the logging.cfg file to commit
changes.
• You may encounter “access denied” when saving. Either open notepad as admin or save to alternate location
(desktop) and copy/paste back into folder.
• There are 7 log levels for each item: TRACE, DEBUG, INFO, WARN, ERROR, FATAL, and OFF
• rootLogger controls the overall default log level for all logging items
o log4cplus.rootLogger=WARN, RootFileAppender
• Individual loggers can be enabled and increased in verbosity as needed. Some loggers contain sub appenders to
log specific aspects. Enabling DEBUG/TRACE logging for the main logger will also enable all of the sub
appenders associated with it. Example: Events=TRACE will also enable Events.FolderMonitor to TRACE.
Specifying Events.FolderMonitor=TRACE separately would effectively cause Events.FolderMonitor to be
logged at TRACE level twice since Events.FolderMonitor=TRACE is already contained within Events=TRACE.
o log4cplus.appender.RootFileAppender.File=${AppDataPath}\EFT.log
o log4cplus.appender.RootFileAppender.MaxFileSize=20MB
• The number of log files created via the rollover process is controlled by the following line:
o log4cplus.appender.RootFileAppender.MaxBackupIndex=5
17
GlobalSCAPE-Logs.docx
o Login:
DEBUG Administrator <> - Logged out: "asdf": IP: 127.0.0.1
DEBUG Administrator <> - Login Successful: "test": IP: 127.0.0.1
TRACE Administrator <> - "test": [Permissions]: aManageCOM aManageReporting
aManageEventRules (MySite)
o AdminSupport
DEBUG AdminSupport <> - Saving FTP.CFG...
• ARM
Searching for SQL files to import in directory "C:\ProgramData\Globalscape\EFT Server Enterprise\" using file
pattern "EFT_ARM_11.1.0.0_*.sql"
DEBUG ARM <File Importer> - Found 0 files to import
o ARM.Queue Displays information about SQL queries that are awaiting execution.
DEBUG ARM.Queue <> - Queue stats over the last 300 seconds:
2 items enqueued
2 is the largest recorded queue size
18
GlobalSCAPE-Logs.docx
o AS2 Logs additional information for AS2 connections. Most information is stored in the ARM
database.
DEBUG AS2 <> - AS2 connection string set to
[provider=SQLNCLI10;server=192.168.102.145;database=EFTDB;UID=sa;Pwd=********;]
o AUD Information about read/write operations on the AUD file. This file is not used after 7.3.3.21
INFO AUD.Read <> - Loading LocalAuthManager settings from: MySite.aud
DEBUG AUD.Read <> - CLocalAuthManager::LoadSettings - full AUD file path is
C:\ProgramData\Globalscape\EFT Server Enterprise\MySite.aud
DEBUG AUD.Read <> - Found Groups: 2
DEBUG AUD.Read <> - Group: Administrative
DEBUG AUD.Read <> - Group: Guests
DEBUG AUD.Read <> - Found Clients: 2
DEBUG AUD.Read <> - Client: a
DEBUG AUD.Read <> - Client: NewUser
DEBUG AUD.Read <> - successfully loaded AUD file with 2 entries
o AWE Logs the queue size for pending AWE tasks as well as the start and stop times for AWE tasks.
DEBUG AWE <> - AWE task queue size = 24310
DEBUG AWE <> - AWE Task 'newblank' started. Log file:
C:\ProgramData\Globalscape\EFT Server Enterprise\AWE\Temp\AWE2016-11-12-11-07-34-
1283.csv
DEBUG AWE <> - AWE Task 'newblank' completed: success.
19
GlobalSCAPE-Logs.docx
• CmdAccess Logs information about commands that are run from event rules
TRACE CmdAccess <Run now; Event: On Scheduler (Timer) Event Rule> -
CCommandAccess::ParseCommandParams ('')
TRACE CmdAccess <Run now; Event: On Scheduler (Timer) Event Rule> -
CCommandAccess::ParseCommandParams - there are 0 params passed in.
TRACE CmdAccess <Run now; Event: On Scheduler (Timer) Event Rule> -
CCommandAccess::ParseCommandParams returns a 1
DEBUG CmdAccess <Run now; Event: On Scheduler (Timer) Event Rule> - LaunchProcess:
sProcessIn: C:\Windows\System32\NETSTAT.EXE sParamsIn: sFolderIn:
C:\Windows\System32
DEBUG CmdAccess <Run now; Event: On Scheduler (Timer) Event Rule> - LaunchProcess:
sProcess:
QwA6AFwAVwBpAG4AZABvAHcAcwBcAFMAeQBzAHQAZQBtADMAMgBcAE4ARQBUAFMAVABBAFQALgBFAFgARQA
= sParams: sFolder: QwA6AFwAVwBpAG4AZABvAHcAcwBcAFMAeQBzAHQAZQBtADMAMgA=
DEBUG CmdAccess <Run now; Event: On Scheduler (Timer) Event Rule> - LaunchProcess:
sTimeout: 1
DEBUG CmdAccess <Run now; Event: On Scheduler (Timer) Event Rule> - LaunchProcess:
strPipeName: cswrp1511f436
DEBUG CmdAccess <Run now; Event: On Scheduler (Timer) Event Rule> - LaunchProcess:
Pipe ok
20
GlobalSCAPE-Logs.docx
DEBUG CmdAccess <Run now; Event: On Scheduler (Timer) Event Rule> - LaunchProcess:
args:
"QwA6AFwAUAByAG8AZwByAGEAbQBEAGEAdABhAFwARwBsAG8AYgBhAGwAcwBjAGEAcABlAFwARQBGAFQAIA
BTAGUAcgB2AGUAcgAgAEUAbgB0AGUAcgBwAHIAaQBzAGUAXAA="
"QwA6AFwAUAByAG8AZwByAGEAbQBEAGEAdABhAFwARwBsAG8AYgBhAGwAcwBjAGEAcABlAFwARQBGAFQAIA
BTAGUAcgB2AGUAcgAgAEUAbgB0AGUAcgBwAHIAaQBzAGUAXAA="
"YwBzAHcAcgBwADEANQAxADEAZgA0ADMANgA="
"QwA6AFwAVwBpAG4AZABvAHcAcwBcAFMAeQBzAHQAZQBtADMAMgBcAE4ARQBUAFMAVABBAFQALgBFAFgARQ
A=" "QwA6AFwAVwBpAG4AZABvAHcAcwBcAFMAeQBzAHQAZQBtADMAMgA=" "" "MQA="
DEBUG CmdAccess <Run now; Event: On Scheduler (Timer) Event Rule> -
WaitForClientConnection: timeout: 15000
DEBUG CmdAccess <Run now; Event: On Scheduler (Timer) Event Rule> -
WaitForClientConnection: ConnectNamedPipe: 997
o Hitting limit for max number of connections per Address (doesn’t log anything specific)(Site):
TRACE Common <> - CSite::QueryEngineInfo(FTP) ENGINE_INFO: 0B37F2D0 dwQuery: 8
Client name: pSocket: 00000000 dwAddress: 127.0.0.1 nConnectionsPerClient: 0
nConnectionsPerClientAndIp: 0 nConcurrentLogins: 0 nConnectionsPerAddress: 1
21
GlobalSCAPE-Logs.docx
• Events This logger is one of the primary loggers used for troubleshooting behavior and failures in event rule
processing. There are many sub categories within the primary Events logger. Among them;
o File Uploaded
TRACE Events.Server.MySite <Parse FTP Command> - Dispatch file system event; event
type: 20481; PPath: C:\InetPub\EFTRoot\MySite\Usr\a\EFTMigrateCSVUsers.vbs; VPath:
/Usr/a/EFTMigrateCSVUsers.vbs
TRACE Events.Server.MySite <Parse FTP Command> - Dispatch file system event; event
type: 20491; PPath: C:\InetPub\EFTRoot\MySite\Usr\a\; VPath: /Usr/a/
TRACE Events.Server.MySite <> - Dispatch file system event; event type:
file_upload; PPath: C:\InetPub\EFTRoot\MySite\Usr\a\EFTMigrateCSVUsers.vbs; VPath:
/Usr/a/EFTMigrateCSVUsers.vbs
22
GlobalSCAPE-Logs.docx
o Folder Monitor (File Added) + Email Notification (doesn’t log email action)
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ValidateAndProcessChanges()
invoked.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ProcessChanges() invoked.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ProcessChanges() finished with
notification parsing; sending changes for processing by parent.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::SendChanges() is posting change
for processing in event 'On Folder Monitor Rule' to IOCP.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ValidateAndProcessChanges()
invoked.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ProcessChanges() invoked.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ProcessChanges() finished with
notification parsing; sending changes for processing by parent.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::SendChanges() is posting change
for processing in event 'On Folder Monitor Rule' to IOCP.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ValidateAndProcessChanges()
invoked.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ProcessChanges() invoked.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ProcessChanges() finished with
notification parsing; sending changes for processing by parent.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::SendChanges() is posting change
for processing in event 'On Folder Monitor Rule' to IOCP.
TRACE Events.FolderMonitor.MySite <> -
CFolderMonitorFactory::Impl::IoCompletionProc() awakened with valid Monitor Folder
object.
TRACE Events.FolderMonitor.MySite <> - Processing this folder event.
TRACE Events.FolderMonitor.MySite.On_Folder_Monitor_Rule <> -
CFolderMonitor::ProcessFolderUpdates() for path
C:\Users\xxxxxxxx\Downloads\TestFolder\2filesNotRenamed.jpg with file system event
1
TRACE Events.FolderMonitor.MySite.On_Folder_Monitor_Rule <> -
CFolderMonitor::ProcessFolderUpdates() could obtain exclusive lock on file, so
ready to process.
DEBUG Events.FolderMonitor.MySite.On_Folder_Monitor_Rule <File:
C:\Users\xxxxxxxx\Downloads\TestFolder\2filesNotRenamed.jpg> - Processing file
found by system notifications
TRACE Events.FolderMonitor.MySite.On_Folder_Monitor_Rule <> -
CFolderMonitor::ProcessFolderUpdates() has finished processing notification
structure.
TRACE Events.FolderMonitor.MySite <> -
CFolderMonitorFactory::Impl::IoCompletionProc() awakened with valid Monitor Folder
object.
TRACE Events.FolderMonitor.MySite <> - Processing this folder event.
23
GlobalSCAPE-Logs.docx
o Folder Monitor (File Renamed) + Email Notification (doesn’t log email action)
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ValidateAndProcessChanges()
invoked.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ProcessChanges() invoked.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ProcessChanges() finished with
notification parsing; sending changes for processing by parent.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::SendChanges() is posting change
for processing in event 'On Folder Monitor Rule' to IOCP.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ValidateAndProcessChanges()
invoked.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ProcessChanges() invoked.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::ProcessChanges() finished with
notification parsing; sending changes for processing by parent.
TRACE Events.FolderMonitor <> - CDirectoryWatcher::SendChanges() is posting change
for processing in event 'On Folder Monitor Rule' to IOCP.
TRACE Events.FolderMonitor.MySite <> -
CFolderMonitorFactory::Impl::IoCompletionProc() awakened with valid Monitor Folder
object.
TRACE Events.FolderMonitor.MySite <> - Processing this folder event.
TRACE Events.FolderMonitor.MySite.On_Folder_Monitor_Rule <> -
CFolderMonitor::ProcessFolderUpdates() for path
C:\Users\xxxxxxxx\Downloads\TestFolder\2filesNotRenamed.jpg with file system event
4
24
GlobalSCAPE-Logs.docx
o Folder Monitor (File Deleted) + Email Notification (doesn’t log email action)
25
GlobalSCAPE-Logs.docx
• HTTP.SessionManager Information for HTTP/S sessions initiated by clients using the Web Transfer Client.
• IPAccess This logger logs the pre-check that is done on a user account before authentication
DEBUG IPAccess <> - Check IP address against IP Access Rules: IP: 127.0.0.1, access
allowed
DEBUG IPAccess <> - Check IP address against IP Access Rules: IP: 127.0.0.1, access
denied
• PathManager Information about mapping physical paths to virtual paths within EFT.
26
GlobalSCAPE-Logs.docx
o Encrypting a file:
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> -
NOpenPGPAdapterTS::Encrypt
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> -
EFTOpenPGP::EFTOpenPGP("C:\ProgramData\Globalscape\EFT Server
Enterprise\pubring.pgp", "C:\ProgramData\Globalscape\EFT Server
Enterprise\secring.pgp", 0, 0, 0, "")
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> -
EFTPGPKeyMgr::EFTPGPKeyMgr:("C:\ProgramData\Globalscape\EFT Server
Enterprise\pubring.pgp", "C:\ProgramData\Globalscape\EFT Server
Enterprise\secring.pgp")
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> -
EFTSDA::EFTSDA(0, 0, 0, "")
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> -
NOpenPGPAdapter::NOpenPGPAdapter(0x02C6F360)
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> -
NOpenPGPAdapter::Encrypt("C:\Users\xxxxxxxx\Desktop\test\license.txt",
"C:\Users\xxxxxxxx\Desktop\test\license.txt", 1", 0, 0, 5)
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> - Encrypt key
list: 287AB991
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> - FireStatus:
Starting to read data from "C:\Users\xxxxxxxx\Desktop\test\license.txt"
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> - FireStatus:
Starting to write data to "C:\Users\xxxxxxxx\Desktop\test\license.txt.pgp"
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> - FireStatus:
Starting PGP message encoding
27
GlobalSCAPE-Logs.docx
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> - FireStatus:
Automatically selected encryption algorithm: "TripleDES"
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> - FireStatus:
Starting to encrypt, encryption algorithm is TripleDES
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> - FireStatus:
Starting to write PGPLiteralDataPacket
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> - FireStatus:
Finished writing PGPLiteralDataPacket
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> - FireStatus:
Finished encrypting data
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> - FireStatus:
Finished PGP message encoding
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> - FireStatus:
Finished reading data from file "C:\Users\username\Desktop\test\license.txt"
TRACE PGP.Adapter <Run now; Event: On Scheduler (Timer) Event Rule> - FireStatus:
Finished writing data to file "C:\Users\username\Desktop\test\license.txt.pgp"
• Reporting Some information about reports which are generated with the ARM module.
DEBUG Reporting <> - Report Manager connection string set to
[provider=SQLNCLI10;server=192.168.102.145;database=EFTDB;UID=sa;Pwd=********;]
• Reports Some information which is generated by the PCI DSS Compliance report.
TRACE Reports <> - bufReportPDF.GetSize() 18445
TRACE Reports <> - bufReportHTML.GetSize() 16727
o On Stop:
TRACE Server.Stop <> - Posting CLOSE event...
o On startup:
DEBUG Server.Startup <> - Server Run
DEBUG Server.Startup <> - Starting server
DEBUG Server.Startup <> - Initializing HTTP Message Provider
DEBUG Server.Startup <> - Resetting PGP Store
DEBUG Server.Startup <> - Initializing SSL
And so on…
o On Server Stop:
TRACE Service <> - [EFT Server Enterprise](4460): CNTService::SetStatus(13849680,
1)
TRACE Service <> - [EFT Server Enterprise](4460): CNTService::SetStatus -
m_Status.dwWin32ExitCode = 0
TRACE Service <> - [EFT Server Enterprise](4460): CNTService::SetStatus
SetServiceStatus call succeeded
TRACE Service <> - [EFT Server Enterprise](4460): Leaving CNTService::ServiceMain()
o KEX, hex encoded. This can be decoded with a hex to ascii converter – this will be changed in
later versions:
TRACE SFTP <> - [08F4F568] msg: 2024502473 Sending version (hex):
5353482D322E302D312E38325F7373686C696220476C6F62616C73636170650D0A
28
GlobalSCAPE-Logs.docx
1139361 [2088] TRACE SFTP <> - [08F4F568] msg: 2024502473 Sending SSH_MSG_KEXINIT
(488 bytes, seq nr 0) Data (hex):
144B9BE2593F7173D89E131E9172E97FB0000000596469666669652D68656C6C6D616E2D67726F75703
1342D736861312C6469666669652D68656C6C6D616E2D67726F75702D65786368616E67652D73686131
2C6469666669652D68656C6C6D616E2D67726F7570312D73686131000000077373682D7273610000007
774776F666973683235362D6362632C6165733235362D6362632C6165733235362D6374722C74776F66
6973682D6362632C336465732D6362632C74776F666973683132382D6362632C6165733132382D63626
32C6165733132382D6374722C636173743132382D6362632C626C6F77666973682D6362630000007774
776F666973683235362D6362632C6165733235362D6362632C6165733235362D6374722C74776F66697
3682D6362632C336465732D6362632C74776F666973683132382D6362632C6165733132382D6362632C
6165733132382D6374722C636173743132382D6362632C626C6F77666973682D63626300000025686D6
1632D736861322D3531322C686D61632D736861322D3235362C686D61632D7368613100000025686D61
632D736861322D3531322C686D61632D736861322D3235362C686D61632D73686131000000097A6C696
22C6E6F6E65000000097A6C69622C6E6F6E6500000000000000000000000000
1139361 [2088] TRACE SFTP <> - [08F4F568] msg: 2024502476 Received SSH_MSG_KEXINIT
(1187 bytes, seq nr 0) Data (hex):
1472DC0911995802614692E9AEF3B8BD86000000F0637572766532353531392D736861323536406C696
27373682E6F72672C656364682D736861322D6E697374703235362C656364682D736861322D6E697374
703338342C656364682D736861322D6E697374703532312C6469666669652D68656C6C6D616E2D67726
F75702D65786368616E67652D7368613235362C6469666669652D68656C6C6D616E2D67726F75702D65
786368616E67652D736861312C6469666669652D68656C6C6D616E2D67726F757031342D736861312C7
27361323034382D7368613235362C727361313032342D736861312C6469666669652D68656C6C6D616E
2D67726F7570312D73686131000000577373682D7273612C7373682D656432353531392C65636473612
D736861322D6E697374703235362C65636473612D736861322D6E697374703338342C65636473612D73
6861322D6E697374703532312C7373682D647373000000EB6165733235362D67636D406F70656E73736
82E636F6D2C6165733235362D6374722C6165733235362D6362632C72696A6E6461656C2D636263406C
797361746F722E6C69752E73652C6165733139322D6374722C6165733139322D6362632C61657331323
82D67636D406F70656E7373682E636F6D2C6165733132382D6374722C6165733132382D6362632C6368
6163686132302D706F6C7931333035406F70656E7373682E636F6D2C626C6F77666973682D6374722C6
26C6F77666973682D6362632C336465732D6374722C336465732D6362632C617263666F75723235362C
617263666F7572313238000000EB6165733235362D67636D406F70656E7373682E636F6D2C616573323
5362D6374722C6165733235362D6362632C72696A6E6461656C2D636263406C797361746F722E6C6975
2E73652C6165733139322D6374722C6165733139322D6362632C6165733132382D67636D406F70656E7
373682E636F6D2C6165733132382D6374722C6165733132382D6362632C63686163686132302D706F6C
7931333035406F70656E7373682E636F6D2C626C6F77666973682D6374722C626C6F77666973682D636
2632C336465732D6374722C336465732D6362632C617263666F75723235362C617263666F7572313238
0000009B686D61632D736861322D3235362C686D61632D736861312C686D61632D736861312D39362C6
86D61632D6D64352C686D61632D736861322D3235362D65746D406F70656E7373682E636F6D2C686D61
632D736861312D65746D406F70656E7373682E636F6D2C686D61632D736861312D39362D65746D406F7
0656E7373682E636F6D2C686D61632D6D64352D65746D406F70656E7373682E636F6D0000009B686D61
632D736861322D3235362C686D61632D736861312C686D61632D736861312D39362C686D61632D6D643
52C686D61632D736861322D3235362D65746D406F70656E7373682E636F6D2C686D61632D736861312D
65746D406F70656E7373682E636F6D2C686D61632D736861312D39362D65746D406F70656E7373682E6
36F6D2C686D61632D6D64352D65746D406F70656E7373682E636F6D000000096E6F6E652C7A6C696200
0000096E6F6E652C7A6C696200000000000000000000000000
TRACE SFTP <> - [08F4F568] msg: 2024502480 Will act on first key exchange method
packet
TRACE SFTP <> - [08F4F568] msg: 2024502476 Received SSH_MSG_KEX_34 (13 bytes, seq
nr 1)
o Failed authentication:
TRACE SFTP <> - [08F4F568] msg: 2024502473 Sending SSH_MSG_USERAUTH_FAILURE (35
bytes, seq nr 6)
• SMTP Logs all SMTP messages which are sent from EFT.
TRACE SMTP <> - SmtpError:
TRACE SMTP <> - 220 mail8.globalscape.com ESMTP (c3d348d27d9f3d352b30a9ae72064b47)
TRACE SMTP <> - EHLO GS0110.forest.intranet.gs
29
GlobalSCAPE-Logs.docx
o X-MSMail-Priority: Normal
o To: <[email protected]>
o MIME-Version: 1.0
o Importance: Normal
o Cc:
o Content-Type: text/plain;
charset="iso-8859-1"
o Content-Transfer-Encoding: 8bit
o This message was sent to you automatically by Globalscape EFT Server on the following event: Folder
Monitor.
TRACE SMTP <> - 250 Ok: queued as 3189F1B80E15
• SSL Information about the ciphers used for connecting clients when using SSL.
DEBUG SSL <> - SSL connection accepted; protocol version = TLSv1.2, cipher = ECDHE-
RSA-AES128-GCM-SHA256, key length = 128
• Timer Log for scheduled timer rules and the deferred file checker timer.
TRACE Timer <> - OnTimer for timer: Timer for rule: On Scheduler (Timer) Event Rule
TRACE Timer <> - Executing timer handler
TRACE Timer <> - Resetting timer: Timer for rule: On Scheduler (Timer) Event Rule
• Cluster.SharedFiles Logs movement of files from the shared config to local store at service start.
TRACE Cluster.SharedFiles <> - ReadChanges[PGP] Lock file on read is success
30
GlobalSCAPE-Logs.docx
• Workspaces.Invite Shows registration emails that are sent out for Workspaces invites.
TRACE Workspaces.Invite <HTTP.ProcessRequest> - ResendInvitations for wid be71e221-
1ff1-4628-9aaf-2179584f854c
TRACE Workspaces.Invite <HTTP.ProcessRequest> - SendRegistrationEmail:
[email protected]
o What it logs: DateStamp Timestamp, Machine Name, AWE task, Status, Step #, Status, Process
GUID, ???, Result Code
o Can be used to track AWE task failures, timeout occurrences, successes, etc.
o Since the data is comma separated, can be opened in Excel and separated by delimiter and
sorted/graphed as needed to extract and map data.
o Task Success:
2016-11-12 16-03-54,GS0110,Anything,TASKSTART, ,Task started,,{AEA76099-2F05-4940-
8B29-5EDFFE1AC6EC},436,0
31
GlobalSCAPE-Logs.docx
32