Remedy for unauthorized operations – Konica Minolta bizhub PRESS C70hc User Manual

Page 38

Advertising
background image

bizhub PRESS C70hc

2-32

2.4

Administrator Security Functions

2

Specifying unauthorized actions: password authentication

If logs have NG as the result of password authentication (action: 01, 02, 11), items protected by passwords
may have been attacked.

-

Failed password authentication (NG) log entries specify who made the operation, and show if unauthor-
ized actions were made when password authentication failed.

-

Even if password authentication succeeded (OK), you may need to check whether a legitimate user cre-
ated the action. Careful check is recommended especially when successful authentication occurs after
series of failures, or for those made during times other than normal operating hours.

Specifying unauthorized actions: actions other than password authentica-
tion

Since all operation results other than password authentication are indicated as successful (OK), use ID and
action to determine if any unauthorized actions were made.

Check the time of operation, and see if the user who operated the specific subject made any unauthorized
actions.

Remedy for unauthorized operations

If you find that a password has leaked out after analyzing the audit log, change the password immediately.

Possible troubles in outputting all audit log data to USB flash drive

If the machine cannot recognize the USB flash drive, the message [Connection of a USB memory has not be
recognized] will be displayed to show unavailability of the batch output.

If you receive errors such as write failure or capacity shortage of the USB flash drive during the output job,
the message [Download error occurred] will be displayed and the batch output will be suspended.

Advertising
This manual is related to the following products: