Stored action |
Operation |
Audit ID |
Result |
---|---|---|---|
1 |
Execute CE authentication |
CE ID |
OK/NG |
5 |
Change or register CE password |
CE ID |
OK |
2 |
Execute administrator authentication |
Administrator ID |
OK/NG |
6 |
Change or register administrator password |
CE ID/Administrator ID |
OK |
11 |
Execute user authentication |
User ID / Unregistered ID |
OK/NG |
Stored action |
Operation |
Audit ID |
Result |
---|---|---|---|
7 |
Create user by administrator |
User ID |
OK |
8 |
Change/Register user password by administrator |
User ID |
OK |
9 |
Delete user by administrator |
User ID |
OK |
10 |
Change user attribute by administrator |
User ID |
OK |
12 |
Change the user attributes according to the user (change the user password, etc.) |
User ID |
OK |
Stored action |
Operation |
Audit ID |
Result |
---|---|---|---|
3 |
Set/Change Enhanced Security mode |
Administrator ID | OK/NG |
19 |
Change HDD lock password |
Administrator ID | OK |
41 |
Change password rules setting |
Administrator ID | OK |
42 |
Change network setting |
Administrator ID | OK |
43 |
Change the service login allow setting |
Administrator ID | OK |
Stored action |
Operation |
Audit ID |
Result |
---|---|---|---|
4 |
Audit log output (Manual and automatic modes) |
Administrator ID | OK/err No |
44 |
Change the audit log transmission address setting |
Administrator ID | OK |
Stored action |
Operation |
Audit ID |
Result |
---|---|---|---|
45 |
Start the HDD encryption function |
CE ID / Administrator ID | OK/NG |
46 |
Change the HDD encryption setting |
Administrator ID / Unregistered ID | OK/NG |
47 |
Change the HDD encryption password |
Administrator ID / Unregistered ID | OK/NG |
Stored action |
Operation |
Audit ID |
Result |
---|---|---|---|
49 |
Execute ISW |
CE ID / Administrator ID | OK/NG |
50 |
Firmware diagnosis |
Administrator ID / Unregistered ID | OK/NG |
51 |
Device diagnosis |
Administrator ID / Unregistered ID | OK/NG |
Stored action |
Operation |
Audit ID |
Result |
---|---|---|---|
20 |
Date/time setting |
User ID | OK |
Stored action |
Operation |
Audit ID |
Result |
---|---|---|---|
52 |
Power-on (Start of audit function) |
Unregistered ID | OK |
53 |
Power-off (Exit of audit function) * Sub power |
Unregistered ID | OK |
54 |
Power-off (Exit of audit function) * Main power |
Unregistered ID | OK |
Stored action |
Operation |
Audit ID |
Result |
---|---|---|---|
16 |
Delete store job |
User ID | OK |
21 |
Print copy job |
User ID / Unregistered ID | OK/NG |
22 |
Store copy job |
User ID / Unregistered ID | OK/NG |
23 |
Print print job |
User ID / Unregistered ID | OK/NG |
24 |
Store print job |
User ID / Unregistered ID | OK/NG |
25 |
Execute scan job |
User ID / Unregistered ID | OK/NG |
26 |
Print store job |
User ID / Unregistered ID | OK/NG |
27 |
Change or restore store job (move or copy) |
User ID / Unregistered ID | OK/NG |
28 |
Recall store job |
User ID / Unregistered ID | OK/NG |
29 |
Output store job file |
User ID / Unregistered ID | OK/NG |
The purpose of analyzing the audit log is to understand the following and implement countermeasures:
Whether or not data was accessed or tampered with
Subject of attack
Details of attack
Result of attack
For specific analysis methods, refer to the following description.