Settings for the Secure Operation 3 (Regular Review by Audit Log)
20
5
Settings for the Secure Operation 3
(Regular Review by Audit Log)
This section describes the importing method of the Audit Log feature using the System
Administrator client via CentreWare Internet Services.
The Audit Log is regularly reviewed by the Security Administrator, often with the aid of third
party analyzing tools. The audit log helps to assess attempted security breaches, identify
actual breaches, and prevent future breaches.
The important events of the machine such as device failure, configuration change, and user
operation are traced and recorded based on when and who operated what function.
Auditable events are stored with time stamps into NVRAM. When the number of stored events
reaches 50, the 50 logs on NVRAM are stored into one file ("audit log file") within the internal
HDD. Up to 15,000 events can be stored. When the number of recorded events exceeds 15,000,
the oldest audit log file is overwritten and a new audit event is stored.
There is no deletion function.
Import the Audit Log File
The following describes methods for importing the Audit Log.
The audit logs are only available to system administrators and can be downloaded via
CentreWare Internet Services for viewing and analyzing them.
The logged data cannot be viewed from the local UI.
In addition, SSL/TLS communication must be enabled in order to access the logged data.
1 Open your Web browser and enter the TCP/IP address of the machine in the Address or
Location field, press the <Enter> key.
2 Enter the system administrator's ID and Password if prompted.
3 Click the [Properties] tab.
4 Click [Security].
5 Click [Audit Log].
6 Click [Export as text file] for [Export Audit Log].
The following information is recorded in imported audit log data, check regularly whether
there are not breaches by accessing or attempt.
z
Log ID: Consecutive numbers as an audit log identifier
z
Date/Time: The date and time when an event was recorded
z
Logged Events: Various acts and processing object storing audit log
z
User Name: The user name that generated an auditable event
z
Description: Description on events
z
Status: Status or result of event processing
z
Optionally Logged Items: Additional information recorded to audit log
(except common record items)