Regular Review By Audit Log; Import The Audit Log File - Xerox VersaLink C405 Supplementary Manual

Hide thumbs Also See for VersaLink C405:
Table of Contents

Advertisement

Regular Review by Audit Log

This section describes the importing method of the Audit Log feature using the System
Administrator client via Embedded Web Server.
The Audit Log is regularly reviewed by the Security Administrator, often with the aid of third party
analyzing tools. The audit log helps to assess attempted security breaches, identify actual
breaches, and prevent future breaches.
The important events of the machine such as device failure, configuration change, and user
operation are traced and recorded based on when and who operated what function.
Auditable events are stored with time stamps into the internal storage device. Up to 15,000 events
can be stored. When the number of recorded events exceeds 15,000, the oldest audit log file is
overwritten and a new audit event is stored.
There is no deletion function.

Import the Audit Log File

The following describes methods for importing the Audit Log. The audit logs are only available to
System Administrators and can be downloaded via Embedded Web Server for viewing and
analyzing them.
The logged data cannot be viewed from the local UI.
In addition, TLS communication must be enabled in order to access the logged data.
1.
Open your Web browser, enter the TCP/IP address of the machine in the Address or Location field,
and press the <Enter> key.
2.
Select Log In on the Internet Service.
3.
Select admin .
4.
Enter the password from keyboard.
5.
Select Log In .
Select System .
6.
7.
Select Logs .
8.
Select Audit Log .
9.
Select Export .
Xerox
®
VersaLink
®
C405/B405 Multifunction Printer
Security Function Supplementary Guide
25

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Versalink b405

Table of Contents