Key operator security functions (continued), Table of items saved in audit log – Konica Minolta 7145 User Manual

Page 36

Advertising
background image

Key Operator Security Functions (continued)

- 30 -

Table of items saved in audit log

No.

Operation

ID

Action ID

Result

1 CE authentication

CE ID

01: CE_ID (fixed)

OK/NG

2 Key Operator authentication

Key Operator ID

02: Key Operator ID (fixed)

OK/NG

3 Set/change Enhanced Security mode

Key Operator ID

03: Set/change security mode

OK

4 Print audit log

Key Operator ID

04: Print audit log

OK

5 Change/register CE password

CE ID

05: Change/register CE password

OK

6 Change/register Key Operator password

CE ID

06: Change/register Key Operator password

OK

7 Create user box

Box No.

07: Create user box

OK

8 Change/register box password by Key Operator Box No.

08: Change/register box password by Key Operator (1) OK

9 Delete user box

Box No.

09: Delete user box

OK

10 Change attributes of user box

Box No.

10: Change attributes of user box

OK

11 Password authentication for user box

Box No.

11: Password authentication for user box

OK/NG

12 Change attributes of user box by user

Box No.

12: Change attributes of user box

OK

13 Access to document

Box No.

13: Access to document

OK

14 Delete document

Box No.

14: Delete document

OK

15 Change attribute of document

Box No.

15: Change attribute of document

OK

16 Password authentication for confidential printing Confidential user ID 16: Password authentication for confidential printingOK/NG
17 Password authentication for fax confidential printing Confidential box No. 17: Password authentication for fax confidential printingOK/NG
18 Access to confidential print document

Confidential user ID 18: Access to confidential print document

OK

19 Delete confidential print document

Confidential user ID 19: Delete confidential print document

OK

20 Create fax confidential inbox

Confidential box No. 20: Create fax confidential inbox

OK

21 Change password for fax confidential inbox Confidential box No. 21: Change password for fax confidential inbox

OK

22 Change attribute of fax confidential inbox

Confidential box No. 22: Change attribute of fax confidential inbox

OK

23 Access to document in fax confidential inbox Confidential box No. 23: Access to document in fax confidential inbox

OK

24 Delete document in fax confidential inbox

Confidential box No. 24: Delete document in fax confidential inbox

OK

The purpose of analyzing the audit log is to understand the following and implement
countermeasures:

Whether or not data was accessed or tampered with
Subject of attack
Details of attack
Results of attack

For specific analysis methods, see the next page.

Advertising