Value
Attack from Other than Control
Panel
Login User Name used for Network Attack
Identifies the login user name that the network attack was performed by.
Add/Update/Delete Firmware
Indicates the method used to add, update, or delete the machine's firmware.
Value
Updated with SD Card
Added with SD Card
Deleted with SD Card
Moved to Another SD Card
Updated via Remote
Updated for OtherReasons
Module Name
Firmware module name.
Parts Number
Firmware module part number.
Version
Firmware version.
Machine Data Encryption Key Operation
Indicates the type of encryption key operation performed.
Value
Back Up Machine Data
Encryption Key
Restore Machine Data
Encryption Key
Attack by means other than an unauthorized operation using
the machine's control panel
An SD card was used to perform the firmware update.
An SD card was used to install the firmware.
An SD card was used to delete the firmware.
The firmware was moved to another SD card.
The firmware was updated from a remote computer.
The firmware update was performed using a method other
than any of the above.
An encryption key backup was performed.
An encryption key was restored.
Using Web Image Monitor to Manage Log Files
Content
Content
Content
223