Import The Documents; Import The Audit Log File - Xerox WorkCentre 5222 Supplementary Manual

Xerox workcentre security function supplementary guide
Hide thumbs Also See for WorkCentre 5222:
Table of Contents

Advertisement

5.4.4. Import the documents

The following describes methods for importing documents stored on the machine's
mailbox.
1. Select [Mailbox Number] or [Document List] on the [Mailbox] page.
2. Place a check next to each document to be imported, and click [Retrieve] or
[Print Document].
NOTE: To retrieve a color document as a JPEG, place a check next to [Retrieve
Page], and specify the page number.

5.5. Import the Audit Log File

The following describes methods for importing the Audit Log.
The Audit Log, regularly reviewed by the Security Administrator, often with the aid of
third party analyzing tools, helps to assess attempted security breaches, identify
actual breaches, and prevent future breaches.
The Audit Log is enabled from the Audit Log hot link on the Properties tab of Internet
Services, accessed from a networked workstation running a web browser (Refer to
2.19).
And additionally requires the enabling of SSL/TLS encryption for Accessing to the
logged data.
Access to the logged data is also accomplished from the Audit Log hot link on the
Properties tab of Internet Services as follows.
The logged data is not viewable from the local UI.
1. Open your Web browser and enter the TCP/IP address of the machine in the
Address or Location field. Press Enter.
2. Supply the Administrator ID and Password, when prompted.
3. Click the Properties tab.
4. Click the Audit Log hot link.
5. Select the [Save as Text File].
Events tracked in the Audit Log, include: Starting and Stopping of the machine,
Login/Logout events, Changes to system settings, and job completions.
The machine generates audit logs that track events/actions (e.g., copy/print/scan/fax
job submission) to logged in users, and each log entry contains a timestamp.
The audit logs are only available to system administrators and can be downloaded
via the web interface for viewing and analysis.
By adopting a policy of regularly downloading and saving the audit logs, users can
satisfy the tracking requirements for transmission of data outside of the local
environment.
Audit Log file is saved in the HDD maximum of 15000 affairs, and if it exceeds
15000 old data will be deleted every 50 affairs and the newest data will be
overwritten. There is no deletion function.
29

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents