Managing Log Files
The logs created by this machine allow you to track access to the machine, identities of users, and usage
of the machine's various functions. For security, you can encrypt the logs. This prevents users who do not
have the encryption key from accessing log information.
Note however that logs are data heavy and will consume hard disk space. To make hard disk space
available, you might need to periodically delete the log files.
The logs can be viewed using Web Image Monitor. Collected logs can be downloaded all at once from
Web Image Monitor as CSV files. You cannot directly read the log files on the hard disk.
Log types
This machine creates two types of log: the job log and the access log.
• Job Log
Stores details of user file-related operations such as copying, and saving in the Document Server,
and control panel operations such as sending scan files and printing reports (the configuration
list, for example).
• Access Log
Stores details of login/logout activity, stored file operations such as creating, editing, and
deleting, service engineer operations such as hard disk formatting, security operations such as
specifying settings for encryption, unauthorized access detection, user lockout, and firmware
authentication.
• The log of jobs printed by the printer function cannot be collected.
Using Web Image Monitor to Manage Log Files
This can be specified by the machine administrator.
Using Web Image Monitor, you can carry out the following log-related operations:
• Specifying the types of log to store in the machine and the log collection level
• Encrypting log files
• Batch deleting log files
• Downloading log files
Specifying log collect settings
Specify collection log settings. The Log collection levels are listed below.
6. Managing Access to the Machine
124