Key operator security functions (continued), Table of items saved in audit log – Konica Minolta 7145 User Manual
Page 36
Key Operator Security Functions (continued)
- 30 -
Table of items saved in audit log
No.
Operation
ID
Action ID
Result
1 CE authentication
CE ID
01: CE_ID (fixed)
OK/NG
2 Key Operator authentication
Key Operator ID
02: Key Operator ID (fixed)
OK/NG
3 Set/change Enhanced Security mode
Key Operator ID
03: Set/change security mode
OK
4 Print audit log
Key Operator ID
04: Print audit log
OK
5 Change/register CE password
CE ID
05: Change/register CE password
OK
6 Change/register Key Operator password
CE ID
06: Change/register Key Operator password
OK
7 Create user box
Box No.
07: Create user box
OK
8 Change/register box password by Key Operator Box No.
08: Change/register box password by Key Operator (1) OK
9 Delete user box
Box No.
09: Delete user box
OK
10 Change attributes of user box
Box No.
10: Change attributes of user box
OK
11 Password authentication for user box
Box No.
11: Password authentication for user box
OK/NG
12 Change attributes of user box by user
Box No.
12: Change attributes of user box
OK
13 Access to document
Box No.
13: Access to document
OK
14 Delete document
Box No.
14: Delete document
OK
15 Change attribute of document
Box No.
15: Change attribute of document
OK
16 Password authentication for confidential printing Confidential user ID 16: Password authentication for confidential printingOK/NG
17 Password authentication for fax confidential printing Confidential box No. 17: Password authentication for fax confidential printingOK/NG
18 Access to confidential print document
Confidential user ID 18: Access to confidential print document
OK
19 Delete confidential print document
Confidential user ID 19: Delete confidential print document
OK
20 Create fax confidential inbox
Confidential box No. 20: Create fax confidential inbox
OK
21 Change password for fax confidential inbox Confidential box No. 21: Change password for fax confidential inbox
OK
22 Change attribute of fax confidential inbox
Confidential box No. 22: Change attribute of fax confidential inbox
OK
23 Access to document in fax confidential inbox Confidential box No. 23: Access to document in fax confidential inbox
OK
24 Delete document in fax confidential inbox
Confidential box No. 24: Delete document in fax confidential inbox
OK
The purpose of analyzing the audit log is to understand the following and implement
countermeasures:
Whether or not data was accessed or tampered with
Subject of attack
Details of attack
Results of attack
For specific analysis methods, see the next page.