
Thermal & Optical Bi-spectrum Network Camera User Manual
66
Note
You should keep the parameters of the device and the computer or terminal all the same.
3. Click Save.
10.12 Security
You can improve system security by setting security parameters.
10.12.1 Authentication
You can improve network access security by setting RTSP and WEB authentication.
Go to Configuration → System → Security → Authentication to choose authentication protocol
and method according to your needs.
Note
Refer to the specific content of protocol to view authentication requirements.
10.12.2 Security Audit Log
The security audit logs refer to the security operation logs. You can search and analyze the security
log files of the device so as to find out the illegal intrusion and troubleshoot the security events.
Security audit logs can be saved on device internal storage. The log will be saved every half hour
after device booting. Due to limited storage space, you can also save the logs on a log server.
Search Security Audit Logs
You can search and analyze the security log files of the device so as to find out the illegal intrusion
and troubleshoot the security events.
Steps
Note
This function is only supported by certain camera models.
1. Go to Configuration → System → Maintenance → Security Audit Log.
2. Select log types, Start Time, and End Time.
3. Click Search.
The log files that match the search conditions will be displayed on the Log List.
4. Optional: Click Export to save the log files to your computer.