HP XP20000/XP24000 HP StorageWorks XP24000/XP20000 Audit Log Reference Guide ( - Page 254

Audit Log Information about the Key Used for the Encryption License Key

Page 254 highlights

45 Audit Log Information about the Key Used for the Encryption License Key This chapter provides audit log information about the key used for data encryption. • "Encryption (ENC) Function - Create Enc. Key Operation" (page 254) • "Encryption (ENC) Function - Enc. Key Backup Operation" (page 254) • "Encryption (ENC) Function - Enc. Key Restore Operation" (page 254) • "Encryption (ENC) Function - PG Enc. Set Operation" (page 255) • "Install Function - Set Encryption Key Operation" (page 255) Encryption (ENC) Function - Create Enc. Key Operation ,xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,[ENC],Create Enc. Key,,Normal end,,,Seq.=xxxxx [ENC] ENC function Create Enc. Key Create Encryption Key operation Normal end The operation has ended normally. Seq.=xxxxxx Log information serial number (0000000000 to 4294967295) Encryption (ENC) Function - Enc. Key Backup Operation user-name,xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,[ENC],Enc. Key Backup,,Normal end,,,Seq.=xxxxx [ENC] ENC function Enc. Key Backup Encryption Key Backup operation Normal end The operation has ended normally. Seq.=xxxxxx Log information serial number (0000000000 to 4294967295) Encryption (ENC) Function - Enc. Key Restore Operation user-name,xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,[ENC],Enc. Key Restore,,Normal end,,,Seq.=xxxxx [ENC] ENC function Enc. Key Restore Encryption Key Restore operation Normal end The operation has ended normally. Seq.=xxxxxx Log information serial number (0000000000 to 4294967295) 254 Audit Log Information about the Key Used for the Encryption License Key

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279

45 Audit Log Information about the Key Used for the
Encryption License Key
This chapter provides audit log information about the key used for data encryption.
“Encryption (ENC) Function — Create Enc. Key Operation” (page 254)
“Encryption (ENC) Function — Enc. Key Backup Operation” (page 254)
“Encryption (ENC) Function — Enc. Key Restore Operation” (page 254)
“Encryption (ENC) Function — PG Enc. Set Operation” (page 255)
“Install Function — Set Encryption Key Operation” (page 255)
Encryption (ENC) Function — Create Enc. Key Operation
<system>,xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,[ENC],Create Enc. Key,,Normal end,,,Seq.=xxxxx
[ENC]
ENC function
Create Enc. Key
Create Encryption Key operation
Normal end
The operation has ended normally.
Seq.=xxxxxx
Log information serial number (0000000000 to 4294967295)
Encryption (ENC) Function — Enc. Key Backup Operation
user-name,xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,[ENC],Enc. Key Backup,,Normal end,,,Seq.=xxxxx
[ENC]
ENC function
Enc. Key Backup
Encryption Key Backup operation
Normal end
The operation has ended normally.
Seq.=xxxxxx
Log information serial number (0000000000 to 4294967295)
Encryption (ENC) Function — Enc. Key Restore Operation
user-name,xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,[ENC],Enc. Key Restore,,Normal end,,,Seq.=xxxxx
[ENC]
ENC function
Enc. Key Restore
Encryption Key Restore operation
Normal end
The operation has ended normally.
Seq.=xxxxxx
Log information serial number (0000000000 to 4294967295)
254
Audit Log Information about the Key Used for the Encryption License Key