Skip header
 

Access log information items

Access Log Type

Indicates the type of access.

Value

Content

Authentication

User authentication access

Stored File

Stored file access

System

System access

Network Attack Detection/Encrypted Communication

Network attack or encrypted communication access

Firmware

Firmware verification access

Address Book

Address book access

Device Settings

Changes made to a setting in the User Tools menu.

Authentication Server Name

Indicates the name of the server where authentication was last attempted.

No. of Authentication Server Switches

Indicates the number of times server switching occurred when the authentication server was unavailable.

You can check whether or not the authentication server is available.

The number of server switches is indicated as 0 to 4.

"0" indicates the authentication server is available.

Logout Mode

Mode of logout.

Value

Content

by User's Operation

Manual logout by the user

by Auto Logout Timer

Automatic logout following a timeout

Login Method

Indicates the route by which the authentication request is received.

Value

Content

Control Panel

The login was performed using the control panel.

via Network

The login was performed remotely using a network computer.

Others

The login was performed using another method.

Login User Type

Indicates the type of login user.

Value

Content

User

General user

Guest

Guest user

User Administrator

User administrator

Machine Administrator

Machine administrator

Network Administrator

Network administrator

File Administrator

File administrator

Supervisor

Supervisor

Customer Engineer (Service Mode)

Customer engineer

Others

Login requests from users other than those specified above

Target User Entry ID

Indicates the entry ID of the target user.

This is a hexadecimal ID that indicates users to whom the following settings are applied:

  • Lockout

  • Password Change

Target User Code/User Name

User code or name of the user whose data was accessed.

If the administrator's data was accessed, the administrator's user name is logged.

Address Book Registration No.

Indicates the registration number of the user performing the operation.

Address Book Operation Mode

Indicates the method applied for changing the data registered in the Address Book.

Address Book Change Item

Indicates which item in the Address Book was changed.

Address Book Change Request IP Address

Indicates the IP address type (IPv4/IPv6) of the user using the Address Book.

Lockout/Release

Indicates the lockout status.

Value

Content

Lockout

Activation of password lockout

Release

Deactivation of password lockout

Lockout/Release Method

Indicates the method applied for releasing the lockout.

Value

Content

Manual

The machine is unlocked manually.

Auto

The machine is unlocked by the lockout release timer.

Lockout Release Target Administrator

Indicates which administrator(s) is (are) released when a lockout release occurs.

Counter to Clear

Indicates which counter is reset for each user.

Export Target

Indicates the settings to be included in the device setting file to be exported.

Value

Content

System Settings

System Settings

Copier Features

Copier Features

Facsimile Features

Facsimile Features

Printer Features

Printer Features

Scanner Features

Scanner Features

Program (Copier)

Program (Copier)

Program (Scanner)

Program (Scanner)

Program (Document Server)

Program (Document Server)

Browser Features

Browser Features

Web Image Monitor Setting

Web Image Monitor Setting

Web Service Settings

Web Service Settings

System/Copier SP

System/Copier SP

Scanner SP

Scanner SP

Printer SP

Printer SP

Facsimile SP

Facsimile SP

Target File Name

Indicates the name of the device information file to be imported or exported.

Stored File ID

Identifies a created or deleted file.

This is a hexadecimal ID that indicates created or deleted stored files.

Stored File Name

Indicates the name of a created or deleted file.

Delete File Type

Indicates the type of file deletion.

Value

Content

Delete Normal File

Normal file deletion

Delete Editing File

Deletion during editing

Auto Delete

Automatic file deletion

Others

File deletion for other reason

Folder Number

Indicates the folder number.

Folder Name

Indicates the folder name.

Creating/Deleting Folders

Indicates the operations performed on folders.

Value

Content

Delete Folder

Folder deleted

New Folder

Folder created

File Location

Indicates where all deleted files are from. "Document Server" indicates a deletion of all files from the machine's hard disk.

Collect Job Logs

Indicates the status of the job log collection setting.

Value

Content

Active

Job log collection setting is enabled.

Inactive

Job log collection setting is disabled.

Not Changed

No changes have been made to the job log collection setting.

Collect Access Logs

Indicates the status of the access log collection setting.

Value

Content

Active

Access log collection setting is enabled.

Inactive

Access log collection setting is disabled.

Not Changed

No changes have been made to the access log collection setting.

Collect Eco-friendly Logs

Indicates the status of the eco-friendly log collection setting.

Value

Content

Active

Eco-friendly log collection setting is enabled.

Inactive

Eco-friendly log collection setting is disabled.

Not Changed

No changes have been made to the eco-friendly log collection setting.

Transfer Logs

Indicates the status of the log transfer setting.

Value

Content

Active

Log transfer setting is enabled.

Inactive

Log transfer setting is disabled.

Not Changed

No changes have been made to the log transfer setting.

Encrypt Logs

Indicates the status of the log encryption setting.

Value

Content

Active

Log encryption setting is enabled.

Inactive

Log encryption setting is disabled.

Not Changed

No changes have been made to the log transfer setting.

Log Type

If a log's collection level setting has been changed, this function indicates details of the change.

Value

Content

Job Log

Job log

Access Log

Access log

Eco-friendly Log

Eco-friendly log

Log Collect Level

Indicates the level of log collection.

Value

Content

Level 1

Level 1

Level 2

Level 2

User Settings

User settings

Encryption/Cleartext

Indicates whether communication encryption is enabled or disabled.

Value

Content

Encryption Communication

Encryption is enabled.

Cleartext Communication

Encryption is disabled.

Machine Port No.

Indicates the machine's port number.

Protocol

Destination protocol.

"Unknown" indicates the protocol of the destination is not identified.

IP Address

Destination IP address.

Port No.

Destination port number.

Port numbers are indicated in decimal numbers.

MAC Address

Destination MAC (physical) address.

Primary Communication Protocol

Indicates the primary communication protocol.

Secondary Communication Protocol

Indicates the secondary communication protocol.

Encryption Protocol

Indicates the protocol used to encrypt the communication.

Communication Direction

Indicates the direction of communication.

Value

Content

Communication Start Request Receiver (In)

The machine received a request to start communication.

Communication Start Request Sender (Out)

The machine sent a request to start communication.

Communication Start Log ID

Indicates the log ID for the communication start time.

This is a hexadecimal ID that indicates the time at which the communication started.

Communication Start/End

Indicates the times at which the communication started and ended.

Network Attack Status

Indicates the machine's status when network attacks occur.

Value

Content

Violation Detected

An attack on the network was detected.

Recovered from Violation

The network recovered from an attack.

Max. Host Capacity Reached

The machine became inoperable due to the volume of incoming data reaching the maximum host capacity.

Recovered from Max. Host Capacity

The machine became operable again following reduction of the volume of incoming data.

Network Attack Type

Identifies network attack types.

Value

Content

Password Entry Violation

Password entry violation

Device Access Violation

Device access violation

Network Attack Type Details

Indicates details of network attack types.

Value

Content

Authentication Error

Authentication error

Encryption Error

Encryption error

Network Attack Route

Identifies the route of the network attack.

Value

Content

Attack from Control Panel

Attack by an unauthorized operation using the machine's control panel

Attack from Other than Control Panel

Attack by means other than an unauthorized operation using the machine's control panel

Login User Name used for Network Attack

Identifies the login user name that the network attack was performed by.

Add/Update/Delete Firmware

Indicates the method used to add, update, or delete the machine's firmware.

Value

Content

Updated with SD Card

An SD card was used to perform the firmware update.

Added with SD Card

An SD card was used to install the firmware.

Deleted with SD Card

An SD card was used to delete the firmware.

Moved to Another SD Card

The firmware was moved to another SD card.

Updated via Remote

The firmware was updated from a remote computer.

Updated for Other Reasons

The firmware update was performed using a method other than any of the above.

Module Name

Firmware module name.

Parts Number

Firmware module part number.

Version

Firmware version.

Machine Data Encryption Key Operation

Indicates the type of encryption key operation performed.

Value

Content

Back Up Machine Data Encryption Key

An encryption key backup was performed.

Restore Machine Data Encryption Key

An encryption key was restored.

Clear NVRAM

The NVRAM was cleared.

Start Updating Machine Data Encryption Key

An encryption key update was started.

Finish Updating Machine Data Encryption Key

An encryption key update was finished.

Machine Data Encryption Key Type

Identifies the type of the encryption key.

Value

Content

Encryption Key for Hard Disk

Encryption key for hard disk

Encryption Key for NVRAM

Encryption key for NVRAM

Device Certificate

Device certificate

Validity Error File Name

Indicates the name of the file in which a validity error was detected.

Configuration Category

Indicates the categories with changed settings.

Value

Content

User Lockout Policy

User lockout policy

Auto Logout Timer

Auto logout timer

Device Certificate

Device certificate

IPsec

IPsec

Compulsory Security Stamp

Compulsory security stamp

S/MIME

S/MIME

WIM Auto Logout Timer

Web Image Monitor auto logout timer

Configuration Name / Configuration Value

Indicates the attributes of the categories.

Indicates the values of the attributes.

Attribute

Description

Lockout

Whether the lockout is active (Active) or inactive (Inactive) is recorded.

Number of Attempts before Lockout

The number of times a user may enter a login password is recorded.

Lockout Release Timer

Whether the lockout release timer is active (Active) or inactive (Inactive) is recorded.

Lock Out User for

The time until lockout release is recorded.

Auto Logout Timer

Whether Auto Logout Timer is set to (On) or (Off) is recorded.

Auto Logout Timer (seconds)

The time until the auto logout operates is recorded.

Operation Mode

The type of operation is recorded.

Certificate No.

The number of the certificate to be used is recorded.

Certificate No.: IEEE 802.1X (WPA/WPA2)

The number of the certificate for applications is recorded.

When no certificate is used, "Do not Use" is recorded.

Certificate No.: S/MIME

The number of the certificate for applications is recorded.

When a certificate is not used, "Do not Use" is recorded.

Certificate No.: IPsec

The number of the certificate for applications is recorded.

When no certificate is used, "Do not Use" is recorded.

Certificate No.: Digital Signature PDF

The number of the certificate for applications is recorded.

When no certificate is used, "Do not Use" is recorded.

Certificate No.: Digital Signature PDF/A

The number of the certificate for applications is recorded.

When no certificate is used, "Do not Use" is recorded.

IPsec

Whether IPsec is active (Active) or inactive (Inactive) is recorded.

Encryption Key Auto Exchange: Setting1-4: Remote Address

The remote address is recorded.

Encryption Key Auto Exchange: Setting1-4, Default: Security Level

The security level is recorded.

When [Authentication Only] is selected, "Authentication Only" is recorded.

When [Authentication and Low Level Encryption] is selected, "Authentication and Low Level Encryption" is recorded.

When [Authentication and High Level Encryption] is selected, "Authentication and High Level Encryption" is recorded.

When [User Settings] is selected, "User Settings" is recorded.

Encryption Key Auto Exchange: Setting1-4, Default: Authentication Method

The authentication method used for the auto key exchange format is recorded. Either "PSK" or "Certificate" is recorded.

Compulsory Security Stamp

Whether [Compulsory Security Stamp] is set to (On) or (Off) is recorded.

Operation Mode

The mode of an operation is recorded.

Scanner: Email Sending

The signature is recorded when the scanner is used for sending e-mail.

Fax: Transferring

The signature is recorded when data transmission is performed by fax.

Fax: Email Sending

The signature is recorded when the fax is used for sending email.

Fax: Notification Email Sending

The signature is recorded when the fax is used for sending email notification.

Document Server (Utility): Stored File Transferring

The signature is recorded when Document Server (utility) is used for transmitting documents stored on it.

WIM Auto Logout Timer (minutes)

Web Image Monitor's auto logout timer log is recorded in increments of one minute.

Destination Server Name

Indicates the name of the destination server to which the tracking information was not sent when the log type is "Enhanced Print Volume Use Limitation: Tracking Permission Result".

Indicates the name of the server from which the data export or import request was issued when the log type is for importing or exporting preference information.

HDD Format Partition

Indicates the initial status of each hard disk partition.

Access Result

Indicates the results of logged operations.

Value

Content

Completed

An operation completed successfully.

Failed

An operation completed unsuccessfully.