
Access Log
Overview of Access Log
Access logs are records of device access for devices registered in the Remote Communication Gate S
server. Activities such as logging in to or out of devices, or configuring settings on devices are recorded in
this type of log.
The following access logs are constantly retrieved.
Authentication
Logs for device authentication operations: Login, Logout, Lockout, Session Logout
File
Logs for file operations: Stored file, Stored file deletion, All stored files deletion, Access Control List
(ACL) management
Unauthorized copy control
Logs for unauthorized copy operations
Administrator operation
Logs for administrator operations: HDD format, All logs deletion, Log setting change, Edit settings per
log type, Date/Time Change
Transfer Log
Logs for transfer log results
Capture
Logs for capture results, which are access logs taken when the ScanRouter delivery server Capture
function is used.
Network Attack Detection/Encrypted Communication
Logs for Communication log, Access violation
Validity Check
Logs for validity check results: Firmware update, Detect module structure change, Module structure,
Encryption key, Validity Verification
Address Book
Logs for address book operations: Authentication password policy check, Change allocation of
administrator privileges, User Information database management
Layout of access log list
The operation screen of Log Data is divided into four areas.
5. Log Management
206
Comentarios a estos manuales