10-4 L60 LINE PHASE COMPARISON SYSTEM – INSTRUCTION MANUALRETRIEVE FILES CHAPTER 10: MAINTENANCE105. Click the Read File button. The file is saved to the destination folder. The EnerVista window remains open to downloadadditional files.10.3.1 CyberSentry security event filesCyberSentry security events are available in the following two files: SECURITY_EVENTS.CSV and SETTING_CHANGES.LOG.10.3.1.1 Security events fileThe figure shows the content for the SECURITY_EVENTS.CSV file.Figure 10-3: Security events fileTime — Local time.Activity — The actual security event.1 = Authentication Failed2 = User Lockout3 = FW Upgrade4 = FW Lock5 = Settings Lock6 = Settings Change, this can fill the entire event log. Hence it is supported by the already existingSETTINGS_CHANGE.LOG file. This event is not required.7 = Clear Oscillography command8 = Clear Data Logger command9 = Clear Demand Records command10 = Clear Energy command11 = Reset Unauthorized Access12 = Clear Teleprotection Counters13 = Clear All Records14 = Role Log out15 = Role Log in10.3.1.2 Setting changes fileThe SETTING_CHANGES.LOG file stores all the setting changes. A total of 1024 events are stored in a circular buffer in non-volatile memory.