
iDS-2CD7xxG0-xxxxx Network Bullet Camera User Manual
UM iDS-2CD7xxG0-xxxxx 021021NA
80
1.
Go to
Configuration
→
System
→
Security
→
Advanced Security
to complete settings.
Search Security Audit Logs
You can search and analyze the security log files of the device so as to find out illegal intrusions and
troubleshoot security events.
Steps
This function is supported only by certain camera models.
1.
Go to
Configuration
→
System
→
Maintenance
→
Security Audit Log
.
2.
Select log types,
Start Time
, and
End Time
.
3.
Click
Search
. The log files that match the search conditions will be displayed on the Log List.
4.
Optional: Click
Export
to save the log files to your computer.
Security Reinforcement
Security reinforce enhances network security. With the function enabled, risky functions, protocols, and
ports of the device are disabled and more secured alternative functions, protocols and ports are enabled.
1.
Go to
Configuration
→
System
→
Security
→
Advanced Security
.
2.
Check
Security Reinforcement
.
3.
Click
Save
.
Certificate Management
This manages server/client certificates and CA certificate, and sends an alarm if the certificates are close
to expiration date or are expired/abnormal.
Create Self-Signed Certificate
Steps
1.
Click
Create Self-signed Certificate
.
2.
Follow the prompt to enter
Certificate ID
,
Country
,
Hostname/IP
,
Validity
,
and other parameters.
The certificate ID should be digits or letters and be no more than 64 characters.
3.
Click
OK
.
4.
Optional: Click
Export
to export the certificate, or click
Delete
to delete the certificate to recreate a
certificate, or click
Certificate Properties
to view the certificate details.