Konica Minolta bizhub PRO C6500 User Manual

Page 28

Advertising
background image

3

Machine Administrator Security Functions

20

bizhub PRO C6500

Specify unauthorized actions: password authentication

If logs have NG as the result of password authentication (action: 01, 02),
items protected by passwords may have been attacked.
- Failed password authentication (NG) log entries specify who made the

operation, and show if unauthorized actions were made when password
authentication failed.

- Even if password authentication succeeded (OK), it shows whether a

legitimate user created the action. You need to check carefully when
successful authentication occurs after series of failures especially during
times other than normal operating hours.

Specify unauthorized actions: actions other than password
authentication under security

All operation results other than password authentication will be indicated as
successful (OK), so determine if there were any unauthorized actions by ID
and action.
- Check the time, and see if the user who operated the specific subject

made any unauthorized actions.

Actions to take if unauthorized operations are found

If it's found that a password has been leaked after analyzing the audit log,
change the password immediately.

Advertising