1. Access log
2. Job log
3. Download
4. Downloaded logs
5. Overwriting
6. Deleted by overwriting
Check the message in the last line of the downloaded logs to determine whether or not overwriting
occurred while the logs were downloading,
• If overwriting did not occur, the last line will contain the following message: Download
completed.
• If overwriting did occur, the last line will contain the following message: Download
completed. A part of the logs before Log ID xxxx does not exist any more.
• If overwriting occurs, part of the logs will be deleted by the overwriting, so check the log "Log ID
xxxx" and more recent logs.
Deleting All Logs
Use the following procedure to delete all logs stored on the machine.
"Delete All Logs" appears if one of the job log, access log, or eco-friendly log is set to [Active].
1.
Log in as the machine administrator from Web Image Monitor.
2.
Point to [Device Management], and then click [Configuration].
3.
Click [Logs] under "Device Settings".
4.
Click [Delete] under "Delete All Logs".
5.
Click [OK].
6.
Log out.
Disabling Log Transfer to the Log Collection Server
Use the following procedure to disable log transfer to the log collection server. Note that you can switch
the log transfer setting to [Inactive] only if it is already set to [Active].
1.
Log in as the machine administrator from Web Image Monitor.
2.
Point to [Device Management], and then click [Configuration].
3.
Click [Logs] under "Device Settings".
Using Web Image Monitor to Manage Log Files
143
Summary of Contents for PRO C9100
Page 2: ......
Page 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Page 24: ...1 Getting Started 22...
Page 72: ...4 Preventing Leakage of Information from Machines 70...
Page 116: ...5 Enhanced Network Security 114...
Page 176: ...6 Managing the Machine 174...
Page 188: ...7 Troubleshooting 186...
Page 235: ......
Page 236: ...EN GB EN US EN AU M238 1022 2014...