Access Log Type
Indicates the type of access.
Value |
Content |
---|---|
Authentication |
User authentication access |
System |
System access |
Stored File |
Stored file access |
Network Attack Detection/Encrypted Communication |
Network attack or encrypted communication access |
Firmware |
Firmware verification access |
Address Book |
Address book access |
Device Settings |
Changes made to a setting in the printer setting menu. |
Authentication Server Name
Indicates the name of the server where authentication was last attempted.
No. of Authentication Server Switches
Indicates the number of times server switching occurred when the authentication server was unavailable.
You can check whether or not the authentication server is available.
The number of server switches is indicated as 0 to 4.
"0" indicates the authentication server is available.
Logout Mode
Mode of logout.
Value |
Content |
---|---|
by User's Operation |
Manual logout by the user |
by Auto Logout Timer |
Automatic logout following a timeout |
Login Method
Indicates the route by which the authentication request is received.
Value |
Content |
---|---|
Control Panel |
The login was performed through the control panel. |
via Network |
The login was performed remotely through a network computer. |
Others |
The login was performed through another method. |
Login User Type
Indicates the type of login user:
Value |
Content |
---|---|
User |
General user |
Guest |
Guest user |
User Administrator |
User administrator |
File Administrator |
File administrator |
Machine Administrator |
Machine administrator |
Network Administrator |
Network administrator |
Supervisor |
Supervisor |
Custom Engineer (Service Mode) |
Customer engineer |
Others |
Login requests from users other than those specified above |
Target User Entry ID
Indicates the entry ID of the target user.
This is a hexadecimal ID that indicates users to whom the following settings are applied:
Lockout
Password Change
Target User Code/User Name
User code or user name of the user whose data was accessed.
If the administrator's data was accessed, the administrator's user name is logged.
Address Book Registration No.
Indicates the registration number of the user performing the operation.
Address Book Operation Mode
Indicates the method applied for changing the data registered in the Address Book.
Address Book Change Item
Indicates which item in the Address Book is changed.
Address Book Change Request IP Address
Indicates the IP address type (IPv4/IPv6) of the user using the Address Book.
Lockout/Release
Indicates the lockout status.
Value |
Content |
---|---|
Lockout |
Activation of password lockout |
Release |
Deactivation of password lockout |
Lockout Release Method
Indicates the method applied for releasing the lockout.
Value |
Content |
---|---|
Manual |
The printer is unlocked manually. |
Auto |
The printer is unlocked by the lockout release timer. |
Not Set |
The printer is not unlocked. |
Lockout Release Target Administrator
Indicates which administrator(s) is (are) released when releasing the lockout.
Counter to Clear
Indicates which counter is reset for each user.
Export Target
Indicates the settings to be included in the device setting file to be exported.
The following settings are included in the device setting file:
System Settings, Printer Features, Web Image Monitor Setting, Web Service Settings, System SP, Printer SP.
"SP" indicates the default settings configured by a service representative.
Target File Name
Indicates the name of the device information file to be imported/exported.
Stored File ID
Identifies a created or deleted file.
This is a hexadecimal ID that indicates created or deleted stored files.
Stored File Name
Indicates the name of a created or deleted file.
Collect Job Logs
Indicates the status of the job log collection setting.
Value |
Content |
---|---|
Active |
Job log collection setting is enabled. |
Inactive |
Job log collection setting is disabled. |
Not Changed |
No changes have been made to the job log collection setting. |
Collect Access Logs
Indicates the status of the access log collection setting.
Value |
Content |
---|---|
Active |
Access log collection setting is enabled. |
Inactive |
Access log collection setting is disabled. |
Not Changed |
No changes have been made to the access log collection setting. |
Collect Eco-friendly Logs
Indicates the status of the eco-friendly log collection setting.
Value |
Content |
---|---|
Active |
Eco-friendly log collection setting is enabled. |
Inactive |
Eco-friendly collection setting is disabled. |
Not Changed |
No changes have been made to the Eco-friendly collection setting. |
Transfer Logs
Indicates the status of the log transfer setting.
Value |
Content |
---|---|
Active |
Log transfer setting is enabled. |
Inactive |
Log transfer setting is disabled. |
Not Changed |
No changes have been made to the log transfer setting. |
Log Type
If a log's collection level setting has been changed, this function indicates details of the change.
Value |
Content |
---|---|
Job Log |
The job log's collection level has been changed. |
Access Log |
The access log's collection level has been changed. |
Eco-friendly Log |
The eco-friendly log's collection level has been changed. |
Level 1 |
A level 1 collection setting. |
Level 2 |
A level 2 collection setting. |
User Settings |
A user-specified collection level setting. |
Log Collect Level
Indicates the level of log collection: "Level 1", "Level 2", or "User Settings".
Encryption/Cleartext
Indicates whether communication encryption is enabled or disabled.
Value |
Content |
---|---|
Encryption Communication |
Encryption is enabled. |
Cleartext Communication |
Encryption is not disabled. |
Machine Port No.
Indicates the printer's port number.
Protocol
Destination protocol.
"Unknown" indicates the destination's protocol could not be identified.
IP Address
Destination IP address.
Port No.
Destination port number.
This is in decimal.
MAC Address
Destination MAC (physical) address.
Primary Communication Protocol
Indicates the primary communication protocol.
Secondary Communication Protocol
Indicates the secondary communication protocol.
Encryption Protocol
Indicates the protocol used to encrypt the communication.
Communication Direction
Indicates the direction of communication.
Value |
Content |
---|---|
Communication Start Request Receiver (In) |
The printer received a request to start communication. |
Communication Start Request Sender (Out) |
The printer sent a request to start communication. |
Communication Start Log ID
Indicates the log ID for the communication start time.
This is a hexadecimal ID that indicates the time at which the communication started.
Communication Start/End
Indicates the times at which the communication started and ended.
Network Attack Status
Indicates the machine's status when network attacks occur.
Value |
Content |
---|---|
Violation Detected |
An attack on the network was detected. |
Recovered from Violation |
The network recovered from an attack. |
Max. Host Capacity Reached |
The printer became inoperable due to the volume of incoming data reaching the maximum host capacity. |
Recovered from Max. Host Capacity |
The printer became operable again following reduction of the volume of incoming data. |
Network Attack Type
Identifies the type of network attack as either "Password Entry Violation" or "Device Access Violation".
Network Attack Type Details
Indicates details about the type of network attack: "Authentication Error" or "Encryption Error".
Network Attack Route
Identifies the route of the network attack as either "Attack from Control Panel" or "Attack from Other than Control Panel".
Login User Name used for Network Attack
Identifies the login user name that the network attack was performed under.
Add/Update/Delete Firmware
Indicates the method used to add, update, or delete the printer's firmware.
Value |
Content |
---|---|
Updated with SD Card |
An SD card was used to perform the firmware update. |
Added with SD Card |
An SD card was used to add the firmware update. |
Deleted with SD Card |
An SD card was used to delete the firmware update. |
Moved to Another SD Card |
The firmware update was moved to another SD card. |
Updated via Remote |
The firmware update was updated remotely from a computer. |
Updated for Other Reasons |
The firmware updated was performed using a method other than any of the above. |
Module Name
Firmware module name.
Parts Number
Firmware module part number.
Version
Firmware version.
Machine Data Encryption Key Operation
Indicates the type of encryption key operation performed.
Value |
Content |
---|---|
Back Up Machine Data Encryption Key |
An encryption key backup was performed. |
Restore Machine Data Encryption Key |
An encryption key was restored. |
Clear NVRAM |
The NVRAM was cleared. |
Start Updating Machine Data Encryption Key |
An encryption key update was started. |
Finish Updating Machine Data Encryption Key |
An encryption key update was finished. |
Machine Data Encryption Key Type
Identifies the type of the encryption key as "Encryption Key for Hard Disk", "Encryption Key for NVRAM", or "Device Certificate".
Validity Error File Name
Indicates the name of the file in which a validity error was detected.
Configuration Category
The category whose settings were changed is recorded.
For details, see Category/Attribute List.
Configuration Name
The attributes of the categories are recorded.
For details, see Category/Attribute List.
Configuration Value
The values of the attributes are recorded.
For details, see Category/Attribute List.
Destination Server Name
If the log type is "Enhanced Print Volume Use Limitation: Tracking Permission Result", the name of the destination server that tracking information failed to be sent is recorded.
If the log type is import or export of preference information, the name of the server that a data export or import request is issued from is recorded.
HDD Format Partition
Indicates the initial status of each hard disk partition.
Access Result
Indicates the results of logged operations:
"Completed" indicates an operation completed successfully; "Failed" indicates an operation completed unsuccessfully.