Access log information items
Access Log Type
Indicates the type of access.
Value | Content |
---|---|
Authentication | User authentication access |
Stored File | Stored file access |
System | System access |
Network Attack Detection/Encrypted Communication | Network attack or encrypted communication access |
Firmware | Firmware verification access |
Address Book | Address book access |
Device Settings | Changes made to a setting in the User Tools menu. |
Authentication Server Name
Indicates the name of the server where authentication was last attempted.
No. of Authentication Server Switches
Indicates the number of times server switching occurred when the authentication server was unavailable.
You can check whether or not the authentication server is available.
The number of server switches is indicated as 0 to 4.
"0" indicates the authentication server is available.
Logout Mode
Mode of logout.
Value | Content |
---|---|
by User's Operation | Manual logout by the user |
by Auto Logout Timer | Automatic logout following a timeout |
Login Method
Indicates the route by which the authentication request is received.
Value | Content |
---|---|
Control Panel | The login was performed using the control panel. |
via Network | The login was performed remotely using a network computer. |
Others | The login was performed using another method. |
Login User Type
Indicates the type of login user.
Value | Content |
---|---|
User | General user |
Guest | Guest user |
User Administrator | User administrator |
Machine Administrator | Machine administrator |
Network Administrator | Network administrator |
File Administrator | File administrator |
Supervisor | Supervisor |
Customer Engineer (Service Mode) | Customer engineer |
Others | Login requests from users other than those specified above |
Target User Entry ID
Indicates the entry ID of the target user.
This is a hexadecimal ID that indicates users to whom the following settings are applied:
Lockout
Password Change
Target User Code/User Name
User code or name of the user whose data was accessed.
If the administrator's data was accessed, the administrator's user name is logged.
Address Book Registration No.
Indicates the registration number of the user performing the operation.
Address Book Operation Mode
Indicates the method applied for changing the data registered in the Address Book.
Address Book Change Item
Indicates which item in the Address Book was changed.
Address Book Change Request IP Address
Indicates the IP address type (IPv4/IPv6) of the user using the Address Book.
Lockout/Release
Indicates the lockout status.
Value | Content |
---|---|
Lockout | Activation of password lockout |
Release | Deactivation of password lockout |
Lockout/Release Method
Indicates the method applied for releasing the lockout.
Value | Content |
---|---|
Manual | The machine is unlocked manually. |
Auto | The machine is unlocked by the lockout release timer. |
Lockout Release Target Administrator
Indicates which administrator(s) is (are) released when a lockout release occurs.
Counter to Clear
Indicates which counter is reset for each user.
Export Target
Indicates the settings to be included in the device setting file to be exported.
Value | Content |
---|---|
System Settings | System Settings |
Copier Features | Copier Features |
Fax Features | Fax Features |
Printer Features | Printer Features |
Scanner Features | Scanner Features |
Program (Copier) | Program (Copier) |
Program (Scanner) | Program (Scanner) |
Program (Document Server) | Program (Document Server) |
Browser Features | Browser Features of the Control Panel |
Web Image Monitor Setting | Web Image Monitor Setting (Setting of a management tool installed on this machine to monitor this machine or configure settings for this machine by using a web browser) |
Web Service Settings | Web Service Settings |
System/Copier SP | System/Copier SP |
Scanner SP | Scanner SP |
Printer SP | Printer SP |
Fax SP | Fax SP |
Target File Name
Indicates the name of the device information file to be imported or exported.
Stored File ID
Identifies a created or deleted file.
This is a hexadecimal ID that indicates created or deleted stored files.
Stored File Name
Indicates the name of a created or deleted file.
Delete File Type
Indicates the type of file deletion.
Value | Content |
---|---|
Delete Normal File | Normal file deletion |
Delete Editing File | Deletion during editing |
Auto Delete | Automatic file deletion |
Others | File deletion for other reason |
Folder Number
Indicates the folder number.
Folder Name
Indicates the folder name.
Creating/Deleting Folders
Indicates the operations performed on folders.
Value | Content |
---|---|
Delete Folder | Folder deleted |
New Folder | Folder created |
File Location
Indicates where all deleted files are from. "Document Server" indicates a deletion of all files from the machine's hard disk.
Collect Job Logs
Indicates the status of the job log collection setting.
Value | Content |
---|---|
Active | Job log collection setting is enabled. |
Inactive | Job log collection setting is disabled. |
Not Changed | No changes have been made to the job log collection setting. |
Collect Access Logs
Indicates the status of the access log collection setting.
Value | Content |
---|---|
Active | Access log collection setting is enabled. |
Inactive | Access log collection setting is disabled. |
Not Changed | No changes have been made to the access log collection setting. |
Collect Eco-friendly Logs
Indicates the status of the eco-friendly log collection setting.
Value | Content |
---|---|
Active | Eco-friendly log collection setting is enabled. |
Inactive | Eco-friendly log collection setting is disabled. |
Not Changed | No changes have been made to the eco-friendly log collection setting. |
Transfer Logs
Indicates the status of the log transfer setting.
Value | Content |
---|---|
Active | Log transfer setting is enabled. |
Inactive | Log transfer setting is disabled. |
Not Changed | No changes have been made to the log transfer setting. |
Log Type
If a log's collection level setting has been changed, this function indicates details of the change.
Value | Content |
---|---|
Job Log | Job log |
Access Log | Access log |
Eco-friendly Log | Eco-friendly log |
Log Collect Level
Indicates the level of log collection.
Value | Content |
---|---|
Level 1 | Level 1 |
Level 2 | Level 2 |
User Settings | User settings |
Encryption/Cleartext
Indicates whether communication encryption is enabled or disabled.
Value | Content |
---|---|
Encryption Communication | Encryption is enabled. |
Cleartext Communication | Encryption is disabled. |
Machine Port No.
Indicates the machine's port number.
Protocol
Destination protocol.
"Unknown" indicates the protocol of the destination is not identified.
IP Address
Destination IP address.
Port No.
Destination port number.
Port numbers are indicated in decimal numbers.
MAC Address
Destination MAC (physical) address.
Primary Communication Protocol
Indicates the primary communication protocol.
Secondary Communication Protocol
Indicates the secondary communication protocol.
Encryption Protocol
Indicates the protocol used to encrypt the communication.
Communication Direction
Indicates the direction of communication.
Value | Content |
---|---|
Communication Start Request Receiver (In) | The machine received a request to start communication. |
Communication Start Request Sender (Out) | The machine sent a request to start communication. |
Communication Start Log ID
Indicates the log ID for the communication start time.
This is a hexadecimal ID that indicates the time at which the communication started.
Communication Start/End
Indicates the times at which the communication started and ended.
Network Attack Status
Indicates the machine's status when network attacks occur.
Value | Content |
---|---|
Violation Detected | An attack on the network was detected. |
Recovered from Violation | The network recovered from an attack. |
Max. Host Capacity Reached | The machine became inoperable due to the volume of incoming data reaching the maximum host capacity. |
Recovered from Max. Host Capacity | The machine became operable again following reduction of the volume of incoming data. |
Network Attack Type
Identifies network attack types.
Value | Content |
---|---|
Password Entry Violation | Password cracking |
Device Access Violation | Denial-of-Service attack (DoS) |
Request Falsification Violation | Request forgery |
Network Attack Type Details
Indicates details of network attack types.
Value | Content |
---|---|
Authentication Error | Authentication error |
Encryption Error | Encryption error |
Network Attack Route
Identifies the route of the network attack.
Value | Content |
---|---|
Attack from Control Panel | Attack by an unauthorized operation using the machine's control panel |
Attack from Other than Control Panel | Attack by means other than an unauthorized operation using the machine's control panel |
Login User Name used for Network Attack
Identifies the login user name that the network attack was performed by.
Add/Update/Delete Firmware
Indicates the method used to add, update, or delete the machine's firmware.
Value | Content |
---|---|
Updated with SD Card | An SD card was used to perform the firmware update. |
Added with SD Card | An SD card was used to install the firmware. |
Deleted with SD Card | An SD card was used to delete the firmware. |
Moved to Another SD Card | The firmware was moved to another SD card. |
Updated via Remote | The firmware was updated from a remote computer. |
Updated for Other Reasons | The firmware update was performed using a method other than any of the above. |
Module Name
Firmware module name.
Parts Number
Firmware module part number.
Version
Firmware version.
Machine Data Encryption Key Operation
Indicates the type of encryption key operation performed.
Value | Content |
---|---|
Back Up Machine Data Encryption Key | An encryption key backup was performed. |
Restore Machine Data Encryption Key | An encryption key was restored. |
Clear NVRAM | The NVRAM was cleared. |
Start Updating Machine Data Encryption Key | An encryption key update was started. |
Finish Updating Machine Data Encryption Key | An encryption key update was finished. |
Machine Data Encryption Key Type
Identifies the type of the encryption key.
Value | Content |
---|---|
Encryption Key for Hard Disk | Encryption key for hard disk |
Encryption Key for NVRAM | Encryption key for NVRAM |
Device Certificate | Device certificate |
Validity Error File Name
Indicates the name of the file in which a validity error was detected.
Configuration Category
Indicates the categories with changed settings.
Value | Content |
---|---|
User Lockout Policy | User lockout policy |
Auto Logout Timer | Auto logout timer |
Device Certificate | Device certificate |
IPsec | IPsec |
Compulsory Security Stamp | Compulsory security stamp |
S/MIME | S/MIME |
WIM Auto Logout Timer | Web Image Monitor auto logout timer |
Extended Security | Extended Security |
Firmware Update Start | Firmware Update |
Prohibit printing stored files from Web Image Monitor | Prohibit printing stored files from Web Image Monitor |
Configuration Name / Configuration Value
Indicates the attributes of the categories.
Indicates the values of the attributes.
Attribute | Description |
---|---|
Lockout | Whether the lockout is active (Active) or inactive (Inactive) is recorded. |
Number of Attempts before Lockout | The number of times a user may enter a login password is recorded. |
Lockout Release Timer | Whether the lockout release timer is active (Active) or inactive (Inactive) is recorded. |
Lock Out User for | The time until lockout release is recorded. |
Auto Logout Timer | Whether Auto Logout Timer is set to (On) or (Off) is recorded. |
Auto Logout Timer (seconds) | The time until the auto logout operates is recorded. |
Operation Mode | The type of operation is recorded. |
Certificate No. | The number of the certificate to be used is recorded. |
Certificate No.: IEEE 802.1X (WPA/WPA2) | The number of the certificate for applications is recorded. When no certificate is used, "Do not Use" is recorded. |
Certificate No.: S/MIME | The number of the certificate for applications is recorded. When a certificate is not used, "Do not Use" is recorded. |
Certificate No.: IPsec | The number of the certificate for applications is recorded. When no certificate is used, "Do not Use" is recorded. |
Certificate No.: Digital Signature PDF | The number of the certificate for applications is recorded. When no certificate is used, "Do not Use" is recorded. |
Certificate No.: Digital Signature PDF/A | The number of the certificate for applications is recorded. When no certificate is used, "Do not Use" is recorded. |
IPsec | Whether IPsec is active (Active) or inactive (Inactive) is recorded. |
Encryption Key Auto Exchange: Setting1-4: Remote Address | The remote address is recorded. |
Encryption Key Auto Exchange: Setting1-4, Default Setting: Security Level | The security level is recorded. When [Authentication Only] is selected, "Authentication Only" is recorded. When [Authentication and Low Level Encryption] is selected, "Authentication and Low Level Encryption" is recorded. When [Authentication and High Level Encryption] is selected, "Authentication and High Level Encryption" is recorded. When [User Settings] is selected, "User Settings" is recorded. |
Encryption Key Auto Exchange: Setting1-4, Default Setting: Authentication Method | The authentication method used for the auto key exchange format is recorded. Either "PSK" or "Certificate" is recorded. |
Compulsory Security Stamp | Whether [Compulsory Security Stamp] is set to (On) or (Off) is recorded. |
Operation Mode | The mode of an operation is recorded. |
Scanner: Email Sending | The signature is recorded when the scanner is used for sending e-mail. |
Fax: Transferring | The signature is recorded when data transmission is performed by fax. |
Fax: Email Sending | The signature is recorded when the fax is used for sending email. |
Fax: Notification Email Sending | The signature is recorded when the fax is used for sending email notification. |
Document Server (Utility): Stored File Transferring | The signature is recorded when Document Server (utility) is used for transmitting documents stored on it. |
WIM Auto Logout Timer (minutes) | Web Image Monitor's auto logout timer log is recorded in increments of one minute. |
Update Firmware | A log entry reporting changes to the [Update Firmware] setting is recorded. "Prohibit" or "Do not Prohibit" is recorded. |
Change Firmware Structure | A log entry reporting changes to the [Change Firmware Structure] setting is recorded. "Prohibit" or "Do not Prohibit" is recorded. |
Firmware Update Start | A log entry reporting firmware update is recorded. |
Prohibit printing stored files from Web Image Monitor | A log entry reporting changes to the [Prohibit printing stored files from Web Image Monitor] setting is recorded. "Prohibit" or "Do not Prohibit" is recorded. |
Destination Server Name
Indicates the name of the destination server to which the tracking information was not sent when the log type is "Enhanced Print Volume Use Limitation: Tracking Permission Result".
Indicates the name of the server from which the data export or import request was issued when the log type is for importing or exporting preference information.
HDD Format Partition
Indicates the reason for formatting the hard disk.
Value | Content |
---|---|
HDD Exchange | The hard disk has been replaced. |
Problem with HDD Encryption Key | There is a problem with the hard disk encryption key. |
Problem with Disk Label | The disk label cannot be read. |
Problem with File System | There is a problem with the file system. |
Access Result
Indicates the results of logged operations.
Value | Content |
---|---|
Completed | An operation completed successfully. |
Failed | An operation completed unsuccessfully. |