Konica Minolta bizhub PRESS 1250/1250P User Guide - Page 56

Remedy for unauthorized operations

Page 56 highlights

2.5 Administrator Security Functions 2 action = 13 id = Box for which the authentication was performed Check the date and time of the operation, and see if the user who operated on documents in the specific personal/secure box was a legitimate owner of the box. Remedy for unauthorized operations If you find that a password has leaked out after analyzing the audit log, change the password immediately. - The legitimate user may not be able to access the box because the password has been fraudulently altered. The administrator must contact the user to confirm the situation, and if that is the case, he/she must address the problem either by changing the password or by deleting the stored data. - If a stored document cannot be found or its content is altered, unauthorized actions may have been occurred. If that is the case, similar countermeasures are needed. bizhub PRESS 1250P 2-47

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66

bizhub PRESS 1250P
2-47
2.5
Administrator Security Functions
2
action = 13
id = Box for which the authentication was performed
Check the date and time of the operation, and see if the user who operated on documents in the specific
personal/secure box was a legitimate owner of the box.
Remedy for unauthorized operations
If you find that a password has leaked out after analyzing the audit log, change the password immediately.
-
The legitimate user may not be able to access the box because the password has been fraudulently
altered. The administrator must contact the user to confirm the situation, and if that is the case, he/she
must address the problem either by changing the password or by deleting the stored data.
-
If a stored document cannot be found or its content is altered, unauthorized actions may have been
occurred. If that is the case, similar countermeasures are needed.