Konica Minolta bizhub PRO C6501/C6501P bizhub PRO C6501 Security User Guide - Page 28

and action.

Page 28 highlights

3 Machine Administrator Security Functions Specify unauthorized actions: password authentication If logs have NG as the result of password authentication (action: 01, 02), items protected by passwords may have been attacked. - Failed password authentication (NG) log entries specify who made the operation, and show if unauthorized actions were made when password authentication failed. - Even if password authentication succeeded (OK), it shows whether a legitimate user created the action. You need to check carefully when successful authentication occurs after series of failures especially during times other than normal operating hours. Specify unauthorized actions: actions other than password authentication under security All operation results other than password authentication will be indicated as successful (OK), so determine if there were any unauthorized actions by ID and action. - Check the time, and see if the user who operated the specific subject made any unauthorized actions. Actions to take if unauthorized operations are found If it's found that a password has been leaked after analyzing the audit log, change the password immediately. 20 bizhub PRO C6501

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32

3
Machine Administrator Security Functions
20
bizhub PRO C6501
Specify unauthorized actions: password authentication
If logs have NG as the result of password authentication (action: 01, 02),
items protected by passwords may have been attacked.
-
Failed password authentication (NG) log entries specify who made the
operation, and show if unauthorized actions were made when password
authentication failed.
-
Even if password authentication succeeded (OK), it shows whether a
legitimate user created the action. You need to check carefully when
successful authentication occurs after series of failures especially during
times other than normal operating hours.
Specify unauthorized actions: actions other than password
authentication under security
All operation results other than password authentication will be indicated as
successful (OK), so determine if there were any unauthorized actions by ID
and action.
-
Check the time, and see if the user who operated the specific subject
made any unauthorized actions.
Actions to take if unauthorized operations are found
If it's found that a password has been leaked after analyzing the audit log,
change the password immediately.