Table of Contents

Advertisement

Security Log

8.5.8
Access to areas of the device with restricted access rights is recorded in the security log. Unsuccessful and
unauthorized access attempts are also recorded. Up to 2048 indications can be stored in the security log.
Reading from the PC with DIGSI 5
To reach the security log of your SIPROTEC 5 device, use the project-tree window. The device must be in
Online access.
Project → Online access → Device → Device Information → Logs tab → Security logs
The state of the security log last loaded from the device is displayed.
Before this, refresh the contents by clicking the update arrows in the headline.
[sc_secmld, 2, en_US]
Figure 8-27
Reading on the Device through the On-Site Operation Panel
To reach the security log from the main menu, use the navigation keys of the on-site operation panel.
Main menu → Test & Diagnosis → Logs → Security log
You can navigate on the on-site operation panel using the navigation keys (top/bottom) inside the
displayed indication list.
[sc_seclog, 1, en_US]
Figure 8-28
SIPROTEC 5, Operation, Manual
C53000-G5040-C003-J, Edition 07.2022
Reading the Security Indications with DIGSI 5
Reading the Security Log on the On-Site Operation Panel of the Device
Operation in the Operating State
8.5 Logs
185

Advertisement

Table of Contents
loading

Table of Contents