236
Audit Log
Overview
With TCP/IP and HTTP-based processes running on the device, exposure to access attacks,
eavesdropping, file tampering, service disruption, and identity (password) theft is significantly increased.
The Audit Log, regularly reviewed by the Security Administrator, often with the aid of third party analyzing
tools, helps to assess attempted security breaches, identify actual breaches, and prevent future
breaches.
The Audit Log is enabled or disabled from the
Audit Log
hot link on the
Support tab
of Internet Services,
accessed from a networked workstation running a web browser. To enable Internet Services, if
necessary, refer to the
Enable Internet Services
topic in the
Network Connectivity
section of this
guide.
Access to logged data is also accomplished from the
Audit Log
hot link on the
Support
tab of Internet
Services, but additionally requires the enabling of SSL/TLS encryption. To enable this encryption, refer to
the
Security – SSL/TLS Encryption
topic in the
Options
section of this guide.
Events tracked in the Audit Log, include: Starting and Stopping of the device, Login/Logout events,
Changes to system settings, and job completions.
Accessing the Audit Log feature
The Audit Log feature is accessed through Internet Services as follows:
1. On a networked workstation, open your Web browser and enter the TCP/IP address of the machine in
the Address or Location field. Press
Enter
.
2. Click
the
Support
tab.
3. Click
the
Audit Log
hot link.
4. Supply the Administrator
User Name
and
Password
(defaults of 11111 and x-admin), when
prompted.
5. Select the On-Line Help for additional help, as required.
Summary of Contents for WorkCentre 7228
Page 1: ...System Administrator s Guide WorkCentre 7228 7235 7245...
Page 300: ...701P46436...