Audit log – Xerox 7675 User Manual

Page 134

Advertising
background image

132

Audit Log

Audit Log is a log that tracks access and attempted access to the server. With TCP/IP and HTTP-based
processes running on the server, exposure to access attacks, eavesdropping, file tampering, service
disruption, and identity (password) theft is significantly increased. The Audit Log, regularly reviewed by the
Security Administrator, often with the aid of third party analyzing tools, helps to assess attempted server
security breaches, identify actual breaches, and prevent future breaches. Access to the log’s data is
protected by enabling SSL (Secure Sockets Layer) protocols. The audit trail, and its associated data
protected by strong SSL encryption, helps to meet the Controlled Access Protection (Class C2) criteria, set
by the United States Department of Defense. To enable this feature, perform the following steps.

1.

Open your Web browser and enter the TCP/IP address of the machine in the Address or Location field.
Press [Enter].

2.

Click the [Properties] tab.

3.

Enter the Administrator User name and password if prompted. The default is [admin] and [1111].

4.

Click the symbol to the left of [Security].

5.

Select [Audit Log] in the directory tree. Note that you must enable SSL before enabling Audit Log.

6.

Place a check mark in the Audit Log Enabled box.

7.

Click [Apply].

8.

Click [Save as Text File] to save the log as a text file.

Advertising