Konica Minolta bizhub PRO 951 bizhub PRO 951 Security User Guide - Page 61

Analyzing Audit Log, Audit log information, Table of items saved in audit log - how to change time

Page 61 highlights

2 2.5.6 Administrator Security Functions 2.5 Analyzing Audit Log Audit log needs to be analyzed by the administrator regularly (once per month), or when the data saved in the machine are illegally accessed or even tampered. The machine is supposed to store up to 750 logs per month. If more than 750 logs are assumed to be stored in a month, carry out the analysis in a shorter period before unanalyzed logs reach that number. 2-52 Audit log information The audit log contains the following information: 1. date/time: registers date and time of the operation that resulted in the creation of a log entry. 2. id: specifies person who made the operation, or subject for security protection. - -1: operation by customer engineer (CE) - -2: operation by the administrator - -3: operation by the unregistered user - Other integer: indicates subjects for security protection, and the following action IDs narrow down the subject for protection. User ID: numbers from 1 to 1000. Secure User ID: numbers from 1 to 99999. 3. action: indicates number that specifies the operation. Refer to the following table for details. 4. result: records result of the operation. For password authentication, success/failure will be indicated as OK/NG. For operations without password authentication, all log entries will be indicated as OK. Table of items saved in audit log No. Operation Audit ID 1 CE authentication CE ID 2 Administrator authentication Administrator ID 3 Set/Change Enhanced Security mode Administrator ID 4 Print audit log CE ID 5 Change/Register CE password CE ID 6 Change/Register administrator pass- CE ID/Administrator ID word 7 Create user by administrator User ID 8 Change/Register user password by ad- User ID ministrator 9 Delete user User ID 10 Change user attribute 11 Password authentication for user User ID User ID*1/Unregistered user ID*2 12 Change attributes of user by user (user User ID password, etc.) 13 Access to file (Read document data) User ID Stored action 01 02 03 04 05 06 Result OK/NG OK/NG OK OK OK OK 07 OK 08 OK 09 OK 10 OK 11 OK/NG 12 OK 13 OK bizhub PRO 951

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74

Administrator Security Functions
2
2-52
bizhub PRO 951
2.5
2.5.6
Analyzing Audit Log
Audit log needs to be analyzed by the administrator regularly (once per month), or when the data saved in the
machine are illegally accessed or even tampered.
The machine is supposed to store up to 750 logs per month. If more than 750 logs are assumed to be stored
in a month, carry out the analysis in a shorter period before unanalyzed logs reach that number.
Audit log information
The audit log contains the following information:
1.
date/time: registers date and time of the operation that resulted in the creation of a log entry.
2.
id: specifies person who made the operation, or subject for security protection.
-1: operation by customer engineer (CE)
-2: operation by the administrator
-3: operation by the unregistered user
Other integer: indicates subjects for security protection, and the following action IDs narrow down the
subject for protection. User ID: numbers from 1 to 1000. Secure User ID: numbers from 1 to 99999.
3.
action: indicates number that specifies the operation. Refer to the following table for details.
4.
result: records result of the operation. For password authentication, success/failure will be indicated as
OK/NG. For operations without password authentication, all log entries will be indicated as OK.
Table of items saved in audit log
No.
Operation
Audit ID
Stored ac-
tion
Result
1
CE authentication
CE ID
01
OK/NG
2
Administrator authentication
Administrator ID
02
OK/NG
3
Set/Change Enhanced Security mode
Administrator ID
03
OK
4
Print audit log
CE ID
04
OK
5
Change/Register CE password
CE ID
05
OK
6
Change/Register administrator pass-
word
CE ID/Administrator ID
06
OK
7
Create user by administrator
User ID
07
OK
8
Change/Register user password by ad-
ministrator
User ID
08
OK
9
Delete user
User ID
09
OK
10
Change user attribute
User ID
10
OK
11
Password authentication for user
User ID
*1
/Unregistered
user ID
*2
11
OK/NG
12
Change attributes of user by user (user
password, etc.)
User ID
12
OK
13
Access to file
(Read document data)
User ID
13
OK