Collecting the logs stored in this machine allows you to track detailed access data to the machine, user identities, usage of the machine's various functions, and error histories.
The logs can be deleted periodically to make hard disk space available, and they can be encrypted to prevent information leakage.
The logs can be viewed using Web Image Monitor or using the log collection server. Collected logs can be converted to CSV files and downloaded all at once. They cannot be read directly from the hard disk.
Log types
3 types of logs are stored in this machine: job log, access log, and eco-friendly log.
Job Log
Stores details of user file-related operations such as copying, printing, and saving in Document Server, and control panel operations such as sending and receiving faxes, sending scan files and printing reports (the configuration list, for example).
Access Log
Stores details of login and logout activities, stored file operations such as creating, editing, and deleting, customer engineer operations such as hard disk formatting, system operations such as viewing log transfer results, and security operations such as specifying settings for encryption, unprivileged access detection, user lockout, and firmware authentication.
Eco-friendly Log
Stores details of main power ON, OFF, transitions in power status, job run times or time interval between jobs, paper consumption per hour, power consumption.
For details about the log collection server, see the user's manual of the log collection server.
When using the log collection server, you must configure the log transfer settings on the log collection server.