Before encrypting the security audit logs, you will first need to enable the security audit logs. Encypting the security log files prevents unauthorized read access. Signing the security audit logs prevents unauthorized write access.
Before you can encrypt the security audit logs, you will first need a keystore that will be used to encrypt the security log.
Note: If you do not know the path, select Security > SSL certificate and key management > Key stores and certificates.
Note: If you do not know the password for the keystore, you can change the keystore password.
In this example, a security audit keystore named testKey was created.
Now, the security log can be encrypted.
In this example, the audit logs will be encrypted using testKey.