331
Parent topic: Configuring Security Settings
Working with Audit Logs
You can enable the Audit Log feature or export audit log data using the Web Config interface. Audit logs
can be used to track security issues or identify improper usage.
1. Log in to the Web Config interface as an administrator.
2. Select the Product Security tab, then select the Audit Log setting.
3. Select ON to enable the audit log feature.
4. Select Export to export the audit log data to a CSV file, or select Delete to delete all audit logs.
Parent topic: Configuring Security Settings
Restricting PDL File Operations
You can protect files from unauthorized PDL operations using the Web Config interface.
1. Log in to the Web Config interface as an administrator.
2. Select the Product Security tab, then select the File Operations from PDL setting.
3. Select Allowed or Not Allowed to enable or disable PDL file operations and select OK to apply your
setting.
Parent topic: Configuring Security Settings
Enabling Program Verification on Start Up
You can check whether unauthorized third parties have tampered with the program when the product
starts up using the Web Config interface.
1. Log in to the Web Config interface as an administrator.
2. Select the Product Security tab, then select the Program Verification on Start Up setting.
3. Select ON and then select OK to apply the setting.
Parent topic: Configuring Security Settings
Restricting Domain Access
You can set up restrictions on the email domains that can be used for email notifications using the Web
Config interface.
1. Log in to the Web Config interface as an administrator.