Value Content
Attack from Other than Control
Panel
Attack by means other than an unauthorized operation using
the machine's control panel
Login User Name used for Network Attack
Identifies the login user name that the network attack was performed by.
Add/Update/Delete Firmware
Indicates the method used to add, update, or delete the machine's firmware.
Value Content
Updated with SD Card An SD card was used to perform the firmware update.
Added with SD Card An SD card was used to install the firmware.
Deleted with SD Card An SD card was used to delete the firmware.
Moved to Another SD Card The firmware was moved to another SD card.
Updated via Remote The firmware was updated from a remote computer.
Updated for OtherReasons The firmware update was performed using a method other
than any of the above.
Module Name
Firmware module name.
Parts Number
Firmware module part number.
Version
Firmware version.
Machine Data Encryption Key Operation
Indicates the type of encryption key operation performed.
Value Content
Back Up Machine Data
Encryption Key
An encryption key backup was performed.
Restore Machine Data
Encryption Key
An encryption key was restored.
Using Web Image Monitor to Manage Log Files
223