THE INFORMATION IN THIS ARTICLE APPLIES TO:
- EFT Enterprise version 6 and later
- EFT Enterprise version 7 and later (64-bit OS only)
EFT Server can be instructed to log specific or all HTTP request headers. When this following registry value is set to 1, all HTTP request headers will be logged:
[HKEY_LOCAL_MACHINE\SOFTWARE\GlobalSCAPE Inc.\EFT Server 4.0\EFTClient]
[HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlobalSCAPE Inc.\EFT Server 4.0\EFTClient]
1 = enable "all request header" logging
0 = disable "all request header" logging [default]
For this registry key to work, a file called logging.cfg in the EFT Server installation folder (e.g., (C:\Documents and Settings\All Users\Application Data\GlobalSCAPE\EFT Server Enterprise\logging.cfg), must be configured to log at the DEBUG level. With this logging file, EFT Server logs requests that require authentication and those that cause session-checking failures. The information is logged to a file named EFT.log in the EFT Server installation folder (e.g., C:\Documents and Settings\All Users\Application Data\GlobalSCAPE\EFT Server Enterprise\). If you want to save EFT.log to a different location, change the reference at the bottom of the logging.cfg file from the following location to the location you prefer:
(Note: On Windows 2008 and later, Application Data files for all users are in a hidden folder named %systemroot%\ProgramData instead of under Documents and Settings\All Users\Application Data.)
For information regarding error codes in the EFT.log, please refer to the MSDN article at http://msdn.microsoft.com/en-us/library/windows/desktop/ms681381(v%3dvs.85).aspx.
For example, error code "5 (0x5)" indicates that access is denied.
For the latest information about Logger Hierarchy, Log Levels, and Appenders, refer to the help for your version of EFT.
Optionally provide private feedback to help us improve this article...
Thank you for your feedback!