Audit Log - Xerox WorkCentre 5755 System Administrator Manual

Hide thumbs Also See for WorkCentre 5755:
Table of Contents

Advertisement

e.
Enter a number for the [Source IP Mask] to which this rule will apply. The allowable range of
0 to 32 corresponds to the 32 bit binary number comprising IP Addresses. A number of 8, for
example, represents a Class A address (mask of 255, 0, 0, 0). The number 16 represents a
Class B address (mask of 255, 255, 0, 0). The number 24 represents a Class C address (mask
of 255, 255, 255, 0).
3.
Click on the [Apply] button to accept the changes or on the [Cancel] button to exit the window
without saving changes.

Audit Log

Audit Log is a log that tracks access and attempted access to the server. With TCP/IP and HTTP-based
processes running on the server, exposure to access attacks, eavesdropping, file tampering, service
disruption, and identity (password) theft is significantly increased. The Audit Log, regularly reviewed by
the System Administrator, often with the aid of third party analyzing tools, helps to assess attempted
server security breaches, identify actual breaches, and prevent future breaches. Access to the log's data
is protected by enabling SSL (Secure Sockets Layer) protocols. The Audit Log, and its associated data
protected by strong SSL encryption, helps to meet the Controlled Access Protection (Class C2) criteria,
set by the United States Department of Defense. To enable this feature, perform the following steps.
IMPORTANT: Audit Log cannot be enabled until SSL (Secure Sockets Layer) is enabled on the device.
To enable SSL on a device, the device needs a Server Certificate. For instructions on how to set up a
Server Certificate, refer to
Note:
To configure this feature or these settings access the Properties tab as a System
Administrator. For details, refer to
1.
From the Properties tab, click on the [Security] link.
2.
Select [Audit Log] in the directory tree.
Note:
You must enable SSL before enabling Audit Log.
3.
In the Enabling Audit Log on machine area, check the [Enabled] checkbox for Audit Log.
4.
Click on the [Apply] button, then click on the [OK] button when you see the message "Properties
have been successfully modified".
5.
Click on the [Save] button to save the Audit Log as a text file.
6.
In the Audit Log Download Form page:
a.
Right-click on the [Download Log] link and select [Save Target As] to download file.
b.
Specify the location for the Audit Log to be saved in. The Audit Log is saved as
[Auditfile.txt.gz]. This is a text file compressed as a GZIP file. Click on [Save].
c.
Open the [Auditfile.txt.gz] compressed file.
d.
The Auditfile.text is a raw text file. To view the Audit Log as tab-delimited text, open the
Auditfile.txt document in an application that can import text as a tab-delimited document,
such as Microsoft
Machine Digital Certificate Management
Access Internet Services as System Administrator
®
Excel.
Xerox WorkCentre 5735/5740/5745/5755/5765/5775/5790
on page 167.
on page 16.
System Administrator Guide
Security
165

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents