Xerox 7228 用户指南

下载
页码 300
236 
Audit Log 
Overview 
With TCP/IP and HTTP-based processes running on the device, exposure to access attacks, 
eavesdropping, file tampering, service disruption, and identity (password) theft is significantly increased.  
The Audit Log, regularly reviewed by the Security Administrator, often with the aid of third party analyzing 
tools, helps to assess attempted security breaches, identify actual breaches, and prevent future 
breaches. 
The Audit Log is enabled or disabled from the Audit Log hot link on the Support tab of Internet Services, 
accessed from a networked workstation running a web browser.  To enable Internet Services, if 
necessary, refer to the Enable Internet Services topic in the Network Connectivity section of this 
guide. 
Access to logged data is also accomplished from the Audit Log hot link on the Support tab of Internet 
Services, but additionally requires the enabling of SSL/TLS encryption.  To enable this encryption, refer to 
the Security – SSL/TLS Encryption topic in the Options section of this guide. 
Events tracked in the Audit Log, include:  Starting and Stopping of the device, Login/Logout events, 
Changes to system settings, and job completions. 
 
Accessing the Audit Log feature 
The Audit Log feature is accessed through Internet Services as follows: 
1.  On a networked workstation, open your Web browser and enter the TCP/IP address of the machine in 
the Address or Location field. Press Enter
2. Click 
the 
Support
 tab. 
3. Click 
the 
Audit Log
 hot link. 
4.  Supply the Administrator User Name and Password (defaults of 11111 and x-admin), when 
prompted. 
5.  Select the On-Line Help for additional help, as required.