Konica Minolta bizhub PRO C6501 User Manual
Page 28
3
Machine Administrator Security Functions
20
bizhub PRO C6501
Specify unauthorized actions: password authentication
If logs have NG as the result of password authentication (action: 01, 02),
items protected by passwords may have been attacked.
- Failed password authentication (NG) log entries specify who made the
operation, and show if unauthorized actions were made when password
authentication failed.
- Even if password authentication succeeded (OK), it shows whether a
legitimate user created the action. You need to check carefully when
successful authentication occurs after series of failures especially during
times other than normal operating hours.
Specify unauthorized actions: actions other than password
authentication under security
All operation results other than password authentication will be indicated as
successful (OK), so determine if there were any unauthorized actions by ID
and action.
- Check the time, and see if the user who operated the specific subject
made any unauthorized actions.
Actions to take if unauthorized operations are found
If it's found that a password has been leaked after analyzing the audit log,
change the password immediately.