7.9 Security Features
355
Stored Information in the Audit Log
The following information is stored in the audit log.
Stored information
Description
Start/End of
Operating Device
Start
Information on when the device was powered on and
became printable.
End
Information on when the device was powered off.
User
Authentication
Log in/Log out
Users’ log-in/log-out Information while authentication
system is activated; For example, the smart card
authentication to perform Private Charge Print.
KO authentication
lock
Information that the system administrator user ID is
locked after the consecutive failure of attempts to
authenticate the ID up to limited times.
Detected
unauthorized
access (invasion)
to the computer
system
Information on consecutive SNMP authentication
failures
Activate/Deactivate
Audit Log
Change of activate/
deactivate settings
Configuring (enabled/disabled) the audit log function
on the CenterWare Internet Services
End Job
Information on end of print job
Report
Information that the reported is printed
Change/Reference
of Device Settings
Change of time
settings
Information that time setting has been changed within
the control panel, time setting server or MIB
User information
Information that user information is registered,
changed, or removed.
Change of user
authentication
Information on change of settings related to
authentication
Change of security
settings/Reference
Information that users access to the menus relevant
to security or change the settings using control panel
or CenterWare Internet Services.
Job
Information on change of print job settings such as
Delayed Print stored in the machine
Access to Stored
Device Data
Registering/
deleting a
certification
Information that the certification being registered or
removed
Retrieving audit
logs
Information on retrieving the audit logs
Change of Device
Configuration
Detection of hard
disk replacement
Information that the HDD Extension Kit (optional) is
installed or replaced.
Change of ROM
versions
Information on when the ROM version is modified,
including the case of upgrading software such as
firmware