6. Managing the Machine
This chapter describes the functions for enhancing the security of the machine and operating the machine
effectively.
Managing Log Files
Collecting the logs stored in this machine allows you to track detailed access data to the machine, user
identities, usage of the machine's various functions, and error histories.
The logs can be deleted periodically to make hard disk space available.
The logs can be viewed using Web Image Monitor or using the log collection server. Collected logs can
be converted to CSV files and downloaded all at once. They cannot be read directly from the hard disk.
Log types
3 types of logs are stored in this machine: job log, access log, and eco-friendly log.
• Job Log
Stores details of control panel operations such as printing reports (the configuration list, for
example).
• Access Log
Stores details of login and logout activities, customer engineer operations such as hard disk
formatting, system operations such as viewing log transfer results, and security operations
such as specifying settings for encryption, unprivileged access detection, user lockout, and
firmware authentication.
• Eco-friendly Log
Stores details of main power ON, OFF, transitions in power status, job run times or time
interval between jobs, paper consumption per hour, power consumption.
• For details about the log collection server, see the user's manual of the log collection server.
• When using the log collection server, you must configure the log transfer settings on the log
collection server.
115
Summary of Contents for PRO C9100
Page 2: ......
Page 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Page 24: ...1 Getting Started 22...
Page 72: ...4 Preventing Leakage of Information from Machines 70...
Page 116: ...5 Enhanced Network Security 114...
Page 176: ...6 Managing the Machine 174...
Page 188: ...7 Troubleshooting 186...
Page 235: ......
Page 236: ...EN GB EN US EN AU M238 1022 2014...