If "Eco-friendly Log Collect Level" is set to [Level 2], all eco-friendly logs are collected.
1.
Log in as the machine administrator from Web Image Monitor.
2.
Point to [Device Management], and then click [Configuration].
3.
Click [Logs] under "Device Settings".
4.
Select [Active] for each function: "Collect Job Logs", "Collect Access Logs" and "Collect
Eco-friendly Logs".
5.
Specify the collection level for each function, "Job Log Collect Level", "Access Log Collect
Level", and "Eco-friendly Log Collect Level".
When a level is changed, the selection status of log details changes according to the level.
To change individual items of the log details, configure the setting for each item. Even if the
collection level is set to [Level 1] or [Level 2], once each item of the log details is changed, the level
changes to [User Settings].
6.
Click [OK].
7.
"Updating..." appears. Wait for about 1 or 2 minutes, and then click [OK].
If the previous screen does not appear again after you click [OK], wait for a while, and then click
the web browser's refresh button.
8.
Log out.
• The greater "Access Log Collect Level" setting value, the more logs are collected.
Downloading Logs
Use the following procedure to convert the logs stored in the machine into a CSV file for simultaneous
batch download.
To collect logs, configure the collection setting for job log, access log and eco-friendly log to [Active].
This setting can be specified in [Logs] under [Configuration] in Web Image Monitor.
1.
Log in as the machine administrator from Web Image Monitor.
2.
Point to [Device Management], and then click [Configuration].
3.
Click [Download Logs] under "Device Settings".
4.
Select the type of log to download from the drop-down box in "Logs to Download".
The security log includes 2 kinds of logs: job log and access log.
5.
Click [Download].
6.
Specify the folder in which you want to save the file.
7.
Click [Back].
Using Web Image Monitor to Manage Log Files
139
Summary of Contents for PRO C9100
Page 2: ......
Page 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Page 24: ...1 Getting Started 22...
Page 72: ...4 Preventing Leakage of Information from Machines 70...
Page 116: ...5 Enhanced Network Security 114...
Page 176: ...6 Managing the Machine 174...
Page 188: ...7 Troubleshooting 186...
Page 235: ......
Page 236: ...EN GB EN US EN AU M238 1022 2014...