6. Managing the Machine
This chapter describes the functions for enhancing the security of the machine and operating the machine
effectively.
Managing Log Files
Collecting the logs stored in this machine allows you to track detailed access data to the machine, user
identities, usage of the machine's various functions, and error histories.
The logs can be deleted periodically to make hard disk space available.
The logs can be viewed using Web Image Monitor or using the log collection server. Collected logs can
be converted to CSV files and downloaded all at once. They cannot be read directly from the hard disk.
Log types
3 types of logs are stored in this machine: job log, access log, and eco-friendly log.
• Job Log
Stores details of control panel operations such as printing reports (the configuration list, for
example).
• Access Log
Stores details of login and logout activities, customer engineer operations such as hard disk
formatting, system operations such as viewing log transfer results, and security operations
such as specifying settings for encryption, unprivileged access detection, user lockout, and
firmware authentication.
• Eco-friendly Log
Stores details of main power ON, OFF, transitions in power status, job run times or time
interval between jobs, paper consumption per hour, power consumption.
• For details about the log collection server, see the user's manual of the log collection server.
• When using the log collection server, you must configure the log transfer settings on the log
collection server.
115
Содержание PRO C9100
Страница 2: ......
Страница 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Страница 24: ...1 Getting Started 22...
Страница 72: ...4 Preventing Leakage of Information from Machines 70...
Страница 116: ...5 Enhanced Network Security 114...
Страница 176: ...6 Managing the Machine 174...
Страница 188: ...7 Troubleshooting 186...
Страница 218: ...System Log Settings User Mach N W File Unset Set System Log R R R R R 8 List of Operation Privileges for Settings 216...
Страница 220: ...Settings User Mach N W File Unset Set Device Access Violation R W 8 List of Operation Privileges for Settings 218...
Страница 235: ......
Страница 236: ...EN GB EN US EN AU M238 1022 2014...