Konica Minolta bizhub PRO 950 bizhub PRO 950 Security User Guide - Page 75

Analyze audit log, Audit Log Information

Page 75 highlights

Administrator Security Functions 5 5.6 Analyze audit log Audit logs need to be analyzed by the administrator regularly (once per month) or when unauthorized access and tampering of data saved in the machine in Security Strengthen mode is noticed. The machine is supposed to store up to 750 logs per month. If more than 750 logs are assumed to be stored in a month, carry out the analysis in a shorter period before the unanalyzed logs reach that number. Audit Log Information The audit log contains the following information. 1. date/time: date and time when an operation was made that results in the creation of a log entry. 2. id: the person who made the operation or who is subject to security protection can be specified. "-1": Operation by CE (service representative). "-2": Operation by the administrator. "-3": Operation by the unregistered user. Other integer: Indicates subjects for security protection, and the following action IDs narrow down the subject for protection. User ID (1 to 1000 numerical symbols) Secure User ID (1 to 99999 numerical symbols) 3. action: Used to specify the operation. Check details of operation that action indicates in the following table. 4. result: Result of an operation. For password authentication, success or failure will be indicated as OK and NG. For operations without password authentication, all log entries will be indicated as OK. bizhub PRO 950 67

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

Administrator Security Functions
5
bizhub PRO 950
67
5.6
Analyze audit log
Audit logs need to be analyzed by the administrator regularly (once per
month) or when unauthorized access and tampering of data saved in the ma-
chine in Security Strengthen mode is noticed.
The machine is supposed to store up to 750 logs per month.
If more than 750 logs are assumed to be stored in a month, carry out the
analysis in a shorter period before the unanalyzed logs reach that number.
Audit Log Information
The audit log contains the following information.
1.
date/time: date and time when an operation was made that results in the
creation of a log entry.
2.
id: the person who made the operation or who is subject to security pro-
tection can be specified.
“-1”: Operation by CE (service representative).
“-2”: Operation by the administrator.
“-3”: Operation by the unregistered user.
Other integer: Indicates subjects for security protection, and the follow-
ing action IDs narrow down the subject for protection.
User ID (1 to 1000 numerical symbols)
Secure User ID (1 to 99999 numerical symbols)
3.
action: Used to specify the operation.
Check details of operation that action indicates in the following table.
4.
result: Result of an operation.
For password authentication, success or failure will be indicated as OK
and NG.
For operations without password authentication, all log entries will be in-
dicated as OK.