Xerox 7675 用户手册

下载
页码 262
132
Audit Log
Audit Log is a log that tracks access and attempted access to the server. With TCP/IP and HTTP-based 
processes running on the server, exposure to access attacks, eavesdropping, file tampering, service 
disruption, and identity (password) theft is significantly increased. The Audit Log, regularly reviewed by the 
Security Administrator, often with the aid of third party analyzing tools, helps to assess attempted server 
security breaches, identify actual breaches, and prevent future breaches. Access to the log’s data is 
protected by enabling SSL (Secure Sockets Layer) protocols. The audit trail, and its associated data 
protected by strong SSL encryption, helps to meet the Controlled Access Protection (Class C2) criteria, set 
by the United States Department of Defense. To enable this feature, perform the following steps.
1.
Open your Web browser and enter the TCP/IP address of the machine in the Address or Location field. 
Press [Enter].
2.
Click the [Properties] tab.
3.
Enter the Administrator User name and password if prompted.  The default is [admin] and [1111].
4.
Click the symbol to the left of [Security].
5.
Select [Audit Log] in the directory tree. Note that you must enable SSL before enabling Audit Log.
6.
Place a check mark in the Audit Log Enabled box.
7.
Click [Apply].
8.
Click [Save as Text File] to save the log as a text file.