Security Log - Siemens SIPROTEC 5 Operation Manual

V7.30 and higher
Hide thumbs Also See for SIPROTEC 5:
Table of Contents

Advertisement

Operation in the Operating State
8.4 Indications
[scuserlg-090413-01.tif, 1, en_US]
Figure 8-18
Deletability
The user-defined log of your SIPROTEC 5 device can be deleted. Read about it in chapter
Deleting the
Logs.
Configuration of a User-Defined Log
The indication capacity of a created user-defined log can be configured freely in the associated column of the
information routing (matrix) of DIGSI 5:
Target → Log → U1 or U2
[scdiu1u2-280415-01, 1, en_US]
Figure 8-19
8.4.5.7

Security Log

Access to areas of the device with restricted access right is recorded in the security log. Unsuccessful and
unauthorized access attempts are also recorded. Up to 500 indications can be stored in the security log.
128
Reading the User-Defined Log on the On-Site Operation Panel of the Device
Indication Configuration in DIGSI 5 (Example: User-Defined Log U1/2)
8.4.6 Saving and
SIPROTEC 5, Operation, Manual
C53000-G5040-C003-7, Edition 06.2016

Advertisement

Table of Contents
loading

Table of Contents