Xerox
® 
VersaLink
® 
B7025/B7030/B7035 Multifunction Printer 
Security Function Supplementary Guide 
 
25
 
 
Regular Review by Audit Log 
 
This section describes the importing method of the Audit Log feature using the System 
Administrator client via Embedded Web Server. 
The Audit Log is regularly reviewed by the Security Administrator, often with the aid of third party 
analyzing tools. The audit log helps to assess attempted security breaches, identify actual 
breaches, and prevent future breaches. 
The important events of the machine such as device failure, configuration change, and user 
operation are traced and recorded based on when and who operated what function. 
Auditable events are stored with time stamps into the internal storage device. Up to 15,000 events 
can be stored. When the number of recorded events exceeds 15,000, the oldest audit log file is 
overwritten and a new audit event is stored. 
There is no deletion function. 
 
Import the Audit Log File 
 
The following describes methods for importing the Audit Log. The audit logs are only available to 
System Administrators and can be downloaded via Embedded Web Server for viewing and 
analyzing them. 
The logged data cannot be viewed from the local UI. 
In addition, TLS communication must be enabled in order to access the logged data. 
 
1.
 
Open your Web browser, enter the TCP/IP address of the machine in the Address or Location field, 
and press the <Enter> key. 
2.
 
Select 
Log In
 on the Internet Service. 
3.
 
Select 
admin
. 
4.
 
Enter the password from keyboard. 
5.
 
Select
 Log In
.  
6.
 
Select 
System
. 
7.
 
Select 
Logs
. 
8.
 
Select 
Audit Log
. 
9.
 
Select 
Export
.