9.3.6 Search Security Audit Logs
You can search and analyze the security log files of the device so as to find out the illegal intrusion
and troubleshoot the security events.
Steps
Note
This function is only supported by certain camera models.
1. Go to Maintenance and Security → Maintenance → Security Audit Log .
2. Select log types, Start Time, and End Time.
3. Click Search.
The log files that match the search conditions will be displayed on the Log List.
4. Optional: Click Export to save the log files to your computer.
9.3.7 SSH
Secure Shell (SSH) is a cryptographic network protocol for operating network services over an
unsecured network.
Go to Maintenance and Security → Maintenance → Device Debugging , and click Settings of SSH.
You can edit the number of the port. Click Save.
Caution
Use the function with caution. The security risk of device internal information leakage exists when
the function is enabled.
9.3.8 Export Diagnose Information
Diagnose information includes running log, system information, hardware information.
Go to Maintenance and Security → Maintenance → Device Debugging → Diagnose Information .
Click Export. In the pop-up window, check desired diagnose information and click Export to export
corresponding diagnose information of the device.
9.4 Security
You can improve system security by setting security parameters.
Network Camera User Manual
69