Konica Minolta bizhub PRO C5501 bizhub PRO C5501 Security User Guide - Page 28
and action., Check the time, and see if the user who operated the specific subject
View all Konica Minolta bizhub PRO C5501 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 28 highlights
3 Machine Administrator Security Functions Specify unauthorized actions: password authentication If logs have NG as the result of password authentication (action: 01, 02), items protected by passwords may have been attacked. - Failed password authentication (NG) log entries specify who made the operation, and show if unauthorized actions were made when password authentication failed. - Even if password authentication succeeded (OK), it shows whether a legitimate user created the action. You need to check carefully when successful authentication occurs after series of failures especially during times other than normal operating hours. Specify unauthorized actions: actions other than password authentication under security All operation results other than password authentication will be indicated as successful (OK), so determine if there were any unauthorized actions by ID and action. - Check the time, and see if the user who operated the specific subject made any unauthorized actions. Actions to take if unauthorized operations are found If it's found that a password has been leaked after analyzing the audit log, change the password immediately. 20 bizhub PRO C5501