Cybersentry Security Event Files - GE C30 Instruction Manual

Controller system
Hide thumbs Also See for C30:
Table of Contents

Advertisement

RETRIEVE FILES
5.
Click the Read File button. The file is saved to the destination folder. The EnerVista window remains open to download
additional files.

8.3.1 CyberSentry security event files

CyberSentry security events are available in the following two files: SECURITY_EVENTS.CSV and SETTING_CHANGES.LOG.
8.3.1.1 Security events file
The figure shows the content for the SECURITY_EVENTS.CSV file.
— Local time.
Time
— The actual security event.
Activity
1 = Authentication Failed
2 = User Lockout
3 = FW Upgrade
4 = FW Lock
5 = Settings Lock
6 = Settings Change, this can fill the entire event log. Hence it is supported by the already existing
SETTINGS_CHANGE.LOG file. This event is not required.
7 = Clear Oscillography command
8 = Clear Data Logger command
9 = Clear Demand Records command
10 = Clear Energy command
11 = Reset Unauthorized Access
12 = Clear Teleprotection Counters
13 = Clear All Records
14 = Role Log out
15 = Role Log in
8
8.3.1.2 Setting changes file
The SETTING_CHANGES.LOG file stores all the setting changes. A total of 1024 events are stored in a circular buffer in non-
volatile memory.
8-4
Figure 8-3: Security events file
CHAPTER 8: MAINTENANCE
C30 CONTROLLER SYSTEM – INSTRUCTION MANUAL

Advertisement

Table of Contents
loading

Table of Contents