Konica Minolta BIZHUB PRO 1050 Operator's Manual page 769

Hide thumbs Also See for BIZHUB PRO 1050:
Table of Contents

Advertisement

Security
Specify unauthorized actions: actions other than password authentica-
tion under security
All operation results other than password authentication will be indicated as
successful (OK), so determine if there were any unauthorized actions by ID
and action.
- Since you cannot specify what was attacked only with an ID, you need to
see the action and the table on the previous page to determine whether
unauthorized actions were made on a personal box or confidential box.
- Check the time, and see if the user who operated the specific subject
made any unauthorized actions.
Example
If a document saved in a box was printed using fraudulent authorization, the
following audit log entry will be created.
1.
Password authentication for the box:
2.
Access to the document in the box:
Check the date and time the above operation occurred, and see if the oper-
ation on the document in the personal box or confidential box was made by
a legitimate box user.
Actions to take if unauthorized operations are found
- If it's found that a password has been leaked after analyzing the audit log,
change the password immediately.
- It's possible that a password may have been tampered with and legiti-
mate users cannot access a box. The machine manager must contact the
user to confirm the situation, and if that's the case, the machine manager
must change the password and delete the data saved in the box.
- If you cannot find documents that should be in a box or if you find a doc-
ument with changed content, unauthorized actions may have occurred.
Similar countermeasures are needed.
bizhub PRO 1050
Action = 11
ID = Box that authentication was made
Result = OK/NG
Action = 13
ID = Box that authentication was made
19
19-55

Advertisement

Table of Contents
loading

Table of Contents