3. Click [Login].
The machine administrator can log in using the appropriate login user name and login password.
4. Click [Configuration], and then click [Logs] under "Device Settings".
5. Select "Collect Job Logs" to specify Job Log settings, or select "Collect Access Logs" to specify
Access Log settings, and then select [Active].
6. Specify the recording levels for either "Job Log Collect Level" or "Access Log Collect Level".
The settings shown for "Job Log Collect Settings Listed by Function Type" or "Access Log Collect Settings
Listed by Function Type" vary depending on the collection level selected.
If you change the setting in the list, the setting for "Job Log Collect Level" or" Access Log Collect Level"
automatically changes to [User Settings].
7. Click [OK] twice.
Changes are also reflected in related log settings.
8. Click [Logout].
• The greater the Access Log Collect setting value, the more logs are collected.
Disabling log transfer to Remote Communication Gate S
Use the following procedure to disable log transfer to Remote Communication Gate S. Note
that you can
change the log transfer setting to [Inactive] only if it is already set to [Active].
1. Open a Web browser.
2. Enter " http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
3. Click [Login].
The machine administrator can log on using the appropriate login user name and login password.
4. Click [Configuration], and then click [Logs] under "Device Settings".
5. Select [Inactive] under "Transfer Logs".
6. Click [OK].
7. Click [Logout].
Specifying log encryption
Use the following procedure to enable/disable log encryption.
6. Managing Access to the Machine
148