As an admin, you can choose logging levels for the different Workspace ONE UEM components. Based on the selected mode, log files created with two possible levels of detail are generated for each component and saved in the corresponding Workspace ONE UEM server.
The path to Diagnostics page is Groups & Settings > All Settings > Admin > Diagnostics > Logging.
What can you do with Diagnostics Logging settings page?
With Diagnostics Logging page, you can:
- Collect and collate the logs for various logging settings targeted to the specified Device IDs.
- Save the error messages based on the component selected.
Determine your Organization group hierarchy
Before you review and modify the settings, understand the two types of inheritance/override options for the organization group hierarchy available at the top and bottom of the settings page and determine your choice. For more information about these settings, see Override Versus Inherit Setting for Organization Groups.
- Current Setting – Select whether to Inherit or Override the displayed settings. Inherit means use the settings of the current organization group's parent OG, while Override enables the settings for editing so you can modify the current OG's settings directly.
The Logging settings page allows you to change logging levels for different AirWatch components. AirWatch automatically logs and saves all the errors that occur in each component.
- Select Disabled to log and save Error level messages for each component.
- Select Enabled to log and save Verbose level messages for each component.
Error level saves only error messages generated to and from the component selected. Verbose level saves every interaction to and from the selected component.
Targeted Logging
You can enable Targeted logging on a per device basis, logging all interactions between the device and Workspace ONE UEM systems.
Setting | Description |
---|---|
Organization Group(s) | Select the organization group(s) where the device(s) reside(s). |
Device ID(s) | Enter the device ID(s) for which you want to enable targeted logging. Use commas to separate multiple device IDs. |
File Storage Impersonation Enabled | Enable if you are using a file storage server to store these targeted logs and enter the appropriate authentication credentials. |
File Path | Enter the path and filename of the LOG file where you would like the data saved. |
File Storage Impersonation User Name | This option appears only when File Storage Impersonation Enabled is checked. Enter the username of the storage server where you targeted logs are saved. |
File Storage Impersonation Password | This option appears only when File Storage Impersonation Enabled is checked. Enter the corresponding password of the username of the storage server where you targeted logs are saved. |
Test Connection (button) | Select this button to test the connection. It tests various possible scenarios which the logging process uses and makes sure it is working as expected. |