To help identify any possible errors that may occur during the run of the Zero Trust Policy Builder, extended logging is made available. The log files are written to the path that is specified in the Configuration File (XML).

  1. Open the log file and scroll down to the bottom.
  2. Each Zero Trust Policy Builder run is separated, and each run starts with Starting Log File Execution.
  3. Examine the log file for any entry that does NOT equal

    ReturnCode=200; Response=Command successfully executed

  4. If a line is found that does not match the response above, there is a description of the action that attempted to take place, which can be used to troubleshoot the issue.