EasyManua.ls Logo

HIKVISION DS-2CD3066G2-IS

HIKVISION DS-2CD3066G2-IS
116 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
9.3.6 Search Security Audit Logs
You can search and analyze the security log les of the device so as to nd out the illegal intrusion
and troubleshoot the security events.
Steps
Note
This funcon is only supported by certain camera models.
1.
Go to Maintenance and Security → Maintenance → Security Audit Log .
2.
Select log types, Start Time, and End Time.
3.
Click Search.
The log
les that match the search condions will be displayed on the Log List.
4.
Oponal: Click Export to save the log les to your computer.
9.3.7 SSH
Secure Shell (SSH) is a cryptographic network protocol for operang network services over an
unsecured network.
Go to Maintenance and Security → Maintenance → Device Debugging , and click
Sengs of SSH.
You can edit the number of the port. Click Save.
Cauon
Use the funcon with cauon. The security risk of device internal informaon leakage exists when
the funcon is enabled.
9.3.8 Export Diagnose Informaon
Diagnose informaon includes running log, system informaon, hardware informaon.
Go to Maintenance and Security → Maintenance → Device Debugging → Diagnose Informaon .
Click Export. In the pop-up window, check desired diagnose
informaon and click Export to export
corresponding diagnose informaon of the device.
9.4 Security
You can improve system security by
seng security parameters.
Network Camera User Manual
68

Table of Contents

Related product manuals