Konica Minolta bizhub PRESS C8000 bizhub PRESS C8000 Security User Guide - Page 42

Analyzing Audit Log, Audit log information, Table of items saved in audit log

Page 42 highlights

2.4 Administrator Security Functions 2 % When the output is completed, the following screen will be displayed. Press [OK]. 2.4.4 Analyzing Audit Log Audit log needs to be analyzed by the administrator regularly (once per month), or when the data saved in the machine are illegally accessed or even tampered. The machine is supposed to store up to 750 logs per month. If more than 750 logs are assumed to be stored in a month, carry out the analysis in a shorter period before unanalyzed logs reach that number. Audit log information The audit log contains the following information: 1. date/time: registers date and time of the operation that resulted in the creation of a log entry. 2. id: specifies person who made the operation, or subject for security protection. - -1: operation by customer engineer (CE) - -2: operation by the administrator - -3: operation by the unregistered user - Other integer: signifies subject of security protection for each. 3. action: indicates number that specifies the operation. Refer to the following table for details. 4. result: records result of the operation. For password authentication, success/failure will be indicated as OK/NG. For operations without password authentication, all log entries will be indicated as OK. Table of items saved in audit log No. Operation Audit ID 1 CE authentication CE ID 2 Administrator authentication Administrator ID 3 Set/Change Enhanced Security mode Administrator ID Stored action 01 02 03 Result OK/NG OK/NG OK bizhub PRESS C8000 2-35

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48

bizhub PRESS C8000
2-35
2.4
Administrator Security Functions
2
%
When the output is completed, the following screen will be displayed. Press [OK].
2.4.4
Analyzing Audit Log
Audit log needs to be analyzed by the administrator regularly (once per month), or when the data saved in the
machine are illegally accessed or even tampered.
The machine is supposed to store up to 750 logs per month. If more than 750 logs are assumed to be stored
in a month, carry out the analysis in a shorter period before unanalyzed logs reach that number.
Audit log information
The audit log contains the following information:
1.
date/time: registers date and time of the operation that resulted in the creation of a log entry.
2.
id: specifies person who made the operation, or subject for security protection.
-1: operation by customer engineer (CE)
-2: operation by the administrator
-3: operation by the unregistered user
Other integer: signifies subject of security protection for each.
3.
action: indicates number that specifies the operation. Refer to the following table for details.
4.
result: records result of the operation. For password authentication, success/failure will be indicated as
OK/NG. For operations without password authentication, all log entries will be indicated as OK.
Table of items saved in audit log
No.
Operation
Audit ID
Stored ac-
tion
Result
1
CE authentication
CE ID
01
OK/NG
2
Administrator authentication
Administrator ID
02
OK/NG
3
Set/Change Enhanced Security mode
Administrator ID
03
OK