Konica Minolta bizhub PRESS C71hc bizhub PRESS C1070/C1070P/C1060/C71hc/bizhub - Page 33
Specifying unauthorized actions: password authentication
View all Konica Minolta bizhub PRESS C71hc manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 33 highlights
2.2 Administrator Security Functions 2 No. Operation Audit ID 10 Change user attribute by administrator User ID 11 Password authentication for user User ID*1/Unregistered user ID*2 12 Change attributes of user by user (user User ID password, etc.) 13 (not used) 14 (not used) 15 Access to stored job User ID (Printing hold/HDD store job, recalling HDD store job to hold job, storing hold job on HDD) 16 Delete store job User ID 17 (not used) 18 (not used) 19 Change HDD lock password Administrator ID 20 Date/Time setting User ID Stored action 10 11 Result OK OK/NG 12 OK 15 OK 16 OK 19 OK 20 OK *1: Audit log ID is saved as user ID when user authentication is successfully made, or when password inconformity occurs with a registered user name. *2: Audit log ID is saved as unregistered user ID when authentication failure occurs with an unregistered user name. The purpose of analyzing the audit log is to understand the following and implement countermeasures: - Whether or not data was accessed or tampered with - Subject of attack - Details of attack - Result of attack For specific analysis methods, refer to the following description. Specifying unauthorized actions: password authentication If logs have NG as the result of password authentication (action: 01, 02, 11), items protected by passwords may have been attacked. - Failed password authentication (NG) log entries specify who made the operation, and show if unauthor- ized actions were made when password authentication failed. - Even if password authentication succeeded (OK), you may need to check whether a legitimate user cre- ated the action. Careful check is recommended especially when successful authentication occurs after series of failures, or for those made during times other than normal operating hours. Specifying unauthorized actions: actions other than password authentication Since all operation results other than password authentication are indicated as successful (OK), use ID and action to determine if any unauthorized actions were made. - Check the time of operation, and see if the user who operated the specific subject made any unauthor- ized actions. Remedy for unauthorized operations If you find that a password has leaked out after analyzing the audit log, change the password immediately. - The legitimate user may not be able to access the box because the password has been fraudulently altered. The administrator must contact the user to confirm the situation, and if that is the case, he/she must address the problem either by changing the password or by deleting the stored data. - If a stored document cannot be found or its content is altered, unauthorized actions may have been occurred. If that is the case, similar countermeasures are needed. bizhub PRESS C1070/C1070P/C1060/C71hc, bizhub PRO C1060L 2-25