Lexmark MS517 Embedded Web Server--Security: Administrator s Guide - Page 31

Configuring security audit log settings, Remote Syslog non

Page 31 highlights

Managing devices remotely 31 4 Under Trap Destination, enter the IP address of the network management server or monitoring station, and then select the conditions for which you want to generate an alert. 5 Click Submit to save the changes, or click Reset Form to clear all fields. Configuring security audit log settings Note: This setting is available only in advanced‑security devices and in simple‑security devices with color LCD control panels. The security audit log lets administrators monitor security‑related events on a device, including failed user authorization, successful administrator authentication, and Kerberos file uploads to a device. By default, security logs are stored on the device, but may also be transmitted to a network syslog server for further processing or storage. We recommend enabling audit in secure environments. 1 From the Embedded Web Server, click Settings > Security > Security Audit Log. 2 Select Enable Audit to activate security audit logging. 3 To use both remote syslog server and internal logging, type the IP address or host name of the Remote Syslog Server. Then select Enable Remote Syslog to transmit log events to a network syslog server. Note: Enable Remote Syslog is available only after an IP address or host name is entered. 4 Enter the Remote Syslog Port number used on the destination server. The default value is 514. 5 From the Remote Syslog Method menu, select one of the following: • Normal UDP-Send log messages and events using a lower‑priority transmission protocol. • Stunnel-If implemented on the destination server. 6 From the Remote Syslog Facility menu, select a facility code for events to be logged to on the destination server. All events sent from the device are tagged with the same facility code to aid in sorting and filtering by network monitoring or intrusion detection software. Note: step 3 on page 31 through step 6 and step 8 are valid only if Remote Syslog is enabled. 7 From the "Severity of events to log" menu, select the priority level cutoff (0-7) for logging messages and events. Note: The highest severity is 0, and the lowest is 7. The selected severity level and anything higher is logged. For example, if you select 4 ‑ Warning, then severity levels 0-4 are logged. 8 Select Remote Syslog non‑logged events to send all events regardless of severity to the remote server. 9 In the "Admin's e‑mail address" field, type one or more e-mail addresses (separated by commas) to automatically notify administrators of certain log events. Then select from the following options: • E‑mail log cleared alert-Indicates when the Delete Log button is clicked. • E‑mail log wrapped alert-Indicates when the log becomes full and begins to overwrite the oldest entries. • Log full behavior-Provides a drop‑down list with two options: - Wrap over oldest entries - E‑mail log then delete all entries • E‑mail % full alert-Indicates when log storage space reaches a certain percentage of capacity.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93

4
Under Trap Destination, enter the IP address of the network management server or monitoring station, and
then select the conditions for which you want to generate an alert.
5
Click
Submit
to save the changes, or click
Reset Form
to clear all fields.
Configuring security audit log settings
Note:
This setting is available only in advanced
security devices and in simple
security devices with color
LCD control panels.
The security audit log lets administrators monitor security
related events on a device, including failed user
authorization, successful administrator authentication, and Kerberos file uploads to a device. By default, security
logs are stored on the device, but may also be transmitted to a network syslog server for further processing or
storage.
We recommend enabling audit in secure environments.
1
From the Embedded Web Server, click
Settings
>
Security
>
Security Audit Log
.
2
Select
Enable Audit
to activate security audit logging.
3
To use both remote syslog server and internal logging, type the IP address or host name of the Remote
Syslog Server. Then select
Enable Remote Syslog
to transmit log events to a network syslog server.
Note:
Enable Remote Syslog is available only after an IP address or host name is entered.
4
Enter the Remote Syslog Port number used on the destination server. The default value is 514.
5
From the Remote Syslog Method menu, select one of the following:
Normal UDP
—Send log messages and events using a lower
priority transmission protocol.
Stunnel
—If implemented on the destination server.
6
From the Remote Syslog Facility menu, select a facility code for events to be logged to on the destination
server. All events sent from the device are tagged with the same facility code to aid in sorting and filtering
by network monitoring or intrusion detection software.
Note:
step 3 on page
31
through
step 6
and
step 8
are valid only if Remote Syslog is enabled.
7
From the “Severity of events to log” menu, select the priority level cutoff (0–7) for logging messages and
events.
Note:
The highest severity is 0, and the lowest is 7. The selected severity level and anything higher is
logged. For example, if you select
4
Warning
, then severity levels 0–4 are logged.
8
Select
Remote Syslog non
logged events
to send all events regardless of severity to the remote server.
9
In the “Admin's e
mail address” field, type one or more e-mail addresses (separated by commas) to
automatically notify administrators of certain log events. Then select from the following options:
E
mail log cleared alert
—Indicates when the Delete Log button is clicked.
E
mail log wrapped alert
—Indicates when the log becomes full and begins to overwrite the oldest
entries.
Log full behavior
—Provides a drop
down list with two options:
Wrap over oldest entries
E
mail log then delete all entries
E
mail % full alert
—Indicates when log storage space reaches a certain percentage of capacity.
Managing devices remotely
31