![Xerox D95 Supplementary Manual Download Page 33](http://html2.mh-extra.com/html/xerox/d95/d95_supplementary-manual_3579741033.webp)
Xerox
®
D95/D110/D125 Copier/Printer Security Function Supplementary Guide
25
Regular Review by
Audit Log
This section describes the setting procedure and the importing method of the Audit Log
feature using the System Administrator client via Xerox
®
CentreWare
®
Internet Services.
The Audit Log is regularly reviewed by the Security Administrator, often with the aid of third
party analyzing tools. The audit log helps to assess attempted security breaches, identify
actual breaches, and prevent future breaches.
The important events of the machine such as device failure, configuration change, and user
operation are traced and recorded based on when and who operated what function.
Auditable events are stored with time stamps into NVRAM. When the number of stored events
reaches 50, the 50 logs on NVRAM are stored into one file ("audit log file") within the internal
HDD. Up to 15,000 events can be stored. When the number of recorded events exceeds
15,000, the oldest audit log file is overwritten and a new audit event is stored.
There is no deletion function.
Set Audit Log
1.
Open your Web browser, enter the TCP/IP address of the machine in the Address or
Location field, and press the <Enter> key.
2.
Enter the Administrator ID and the password, when prompted.
3.
Click the [Properties] tab.
4.
Click [Security].
5.
Click [Audit Log].
6.
Check the [Enabled] box for [Audit Log].
7.
Click [Apply].
4