Konica Minolta bizhub PRESS C6000 bizhub PRESS C6000/C7000 Security User Guide - Page 40

Remedy for unauthorized operations

Page 40 highlights

2.4 Administrator Security Functions 2 Specifying unauthorized actions: password authentication If logs have NG as the result of password authentication (action: 01, 02, 11), items protected by passwords may have been attacked. - Failed password authentication (NG) log entries specify who made the operation, and show if unauthor- ized actions were made when password authentication failed. - Even if password authentication succeeded (OK), you may need to check whether a legitimate user cre- ated the action. Careful check is recommended especially when successful authentication occurs after series of failures, or for those made during times other than normal operating hours. Specifying unauthorized actions: actions other than password authentication Since all operation results other than password authentication are indicated as successful (OK), use ID and action to determine if any unauthorized actions were made. Check the time of operation, and see if the user who operated the specific subject made any unauthorized actions. Remedy for unauthorized operations If you find that a password has leaked out after analyzing the audit log, change the password immediately. Possible troubles in outputting all audit log data to USB flash drive If the machine cannot recognize the USB flash drive, the message [Connection of a USB memory has not be recognized] will be displayed to show unavailability of the batch output. If you receive errors such as write failure or capacity shortage of the USB flash drive during the output job, the message [Download error occurred] will be displayed and the batch output will be suspended. bizhub PRESS C7000/C6000 2-33

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44

bizhub PRESS C7000/C6000
2-33
2.4
Administrator Security Functions
2
Specifying unauthorized actions: password authentication
If logs have NG as the result of password authentication (action: 01, 02, 11), items protected by passwords
may have been attacked.
-
Failed password authentication (NG) log entries specify who made the operation, and show if unauthor-
ized actions were made when password authentication failed.
-
Even if password authentication succeeded (OK), you may need to check whether a legitimate user cre-
ated the action. Careful check is recommended especially when successful authentication occurs after
series of failures, or for those made during times other than normal operating hours.
Specifying unauthorized actions: actions other than password authentica-
tion
Since all operation results other than password authentication are indicated as successful (OK), use ID and
action to determine if any unauthorized actions were made.
Check the time of operation, and see if the user who operated the specific subject made any unauthorized
actions.
Remedy for unauthorized operations
If you find that a password has leaked out after analyzing the audit log, change the password immediately.
Possible troubles in outputting all audit log data to USB flash drive
If the machine cannot recognize the USB flash drive, the message [Connection of a USB memory has not be
recognized] will be displayed to show unavailability of the batch output.
If you receive errors such as write failure or capacity shortage of the USB flash drive during the output job,
the message [Download error occurred] will be displayed and the batch output will be suspended.