EasyManua.ls Logo

HIKVISION F Series

HIKVISION F Series
100 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Result
The device will install the self-signed cercate by default.
Install Authorized Cercate
If the demand for external access security is high, you can create and install authorized cercate
via HTTPS protocol to ensure the data transmission security.
Steps
1. Select Create cercate request rst and connue the installaon.
2. Click Create.
3. Follow the prompt to input Country, Hostname/IP, Validity and other parameters.
4. Click Download to download the
cercate request and submit it to the trusted authority for
signature.
5. Import
cercate to the device.
-
Select Signed
cercate is available, start the installaon directly. Click Browse and Install
to import the
cercate to the device.
-
Select Create the
cercate request rst and connue the installaon. Click Browse and
Install to import the cercate to the device.
6. Click Save.
12.12.4 Security Audit Log
The security audit logs refer to the security operaon logs. You can search and analyze the security
log
les of the device so as to nd out the illegal intrusion and troubleshoot the security events.
Security audit logs can be saved on device internal storage. The log will be saved every half hour
aer device boong. Due to limited storage space, you can also save the logs on a log server.
Search Security Audit Logs
You can search and analyze the security log les of the device so as to nd out the illegal intrusion
and troubleshoot the security events.
Steps
Note
This funcon is only supported by certain camera models.
1. Go to Conguraon → System → Maintenance → Security Audit Log .
2. Select log types, Start Time, and End Time.
3. Click Search.
The log
les that match the search condions will be displayed on the Log List.
F Series Network Speed Dome User Manual
84

Table of Contents

Related product manuals