e-ManualTopSite mapHelpGlossary

Category Top

Preventing Unauthorized Access

Increasing Security

Restricting Access by Authentication

Administrator Settings

Specifying the System Manager Settings

Department ID Management

Specifying Department ID Management

Checking/Printing/Clearing Page Totals

Accepting Jobs with Unknown Department IDs

Accepting B&W Copy and Print Jobs without Entering a Department ID

User Setting Information Management (User Setting Information Management Service)

Logging In to the User Setting Information Management Service Page

Deleting the User Setting Information

User Access Control for Advanced Box

Logging In to the User Management Page

Registering/Editing the User Information of User Access Control for Advanced Box

Editing User Information by General Users

Authentication Log Management for the Advanced Box

Authentication Method Settings for Sending Operations

Specifying Personal Folders

Registering Personal Folders for Each User

Setting Up the Home Folder and Personal Folders

Registering Folders Designated by Login Service as Personal Folders

Specifying Authentication Method for LDAP Server

Specifying Authentication Method for Rights Management Server

Specifying Authentication Method for SMTP Server

Specifying Authentication Method for File Server

Specifying Authentication Method for Advanced Box

Simple Authentication Settings for Secure Print

Setting to Disable Integrated Authentication

Network Security

Key Pair and Server Certificate Settings for Encrypted SSL Communication

Generating a Key Pair and Server Certificate

Registering a Key Pair File and Server Certificate File Installed from a Computer

Editing Key Pairs and Server Certificates

Registering/Editing a CA Certificate File

Verifying Certificate Validity Using Certificate Revocation List

Using an Encryption Method That Complies with FIPS 140-2

Advanced Box Settings

Specifying the Advanced Box Settings

Setting the Network

MEAP Settings

Using the SSL

Printing Installed Application Information

Preventing Information Leakage

Digital Signatures

Setting/Confirming a Key Pair and Device Certificate

Confirming a Key Pair and User Certificate

Checking a Device Signature/User Signature Certificate

Setting a Rights Management Server

Forced Secure Watermark/Document Scan Lock

Secure Watermark (Forced Secure Watermark/Printer Driver Secure Watermark)

Adjusting the Secure Watermark Contrast

Selecting the Code for Document Scan Lock (TL Code/QR Code)

Document Scan Lock Settings (TL Code)

Specifying the Document Scan Lock Operational Settings
Setting the Document Scan Lock Mode (TL Code)
Adjusting the TL Code

Document Scan Lock Settings (QR Code)

Specifying the Document Scan Lock Operational Settings (QR Code)
Setting the Document Scan Lock Mode (QR Code)
Setting the Document Scan Lock Mode and Secure Watermark (QR Code)
Adjusting the QR Code Print Position

Copy Set Numbering Options

Accepting Only Encrypted Secure Printing

Restricting the Send Function

Setting the Address Book

Mail Box Settings

Specifying Settings for All Mail Boxes

Specifying the Mail Box Security Settings

Setting the Control Panel Display

Specifying Management Settings for the Hard Disk

Completely Erasing Unnecessary Data from the Hard Disk

Initializing All Data/Settings

TPM Settings

Device Management

Using the USB Port

Device Information Settings

Specifying Device Information Delivery Settings

Registering/Deleting/Printing Delivery Destinations

Setting Automatic Delivery

Setting Manual Delivery

Setting the Receiving Machine

Checking/Printing the Communication Log

Limiting Functions

Limiting Functions When the Security Key Is Turned OFF

Remote UI

Clearing the Message Board

ACCESS MANAGEMENT SYSTEM

Retrieving Audit Logs

Available Administrator Settings Table (Touch Panel Display)

IEEE 2600 Security Standard

Top » Security » User Access Control for Advanced Box » Authentication Log Management for the Advanced Box
Authentication Log Management for the Advanced Box
08JK-26K
This function enables you to collect/manage the logs stored in the machine from the [User Access Control for Advanced Box] page with the Remote UI. The administrator can check the collected logs to survey how the Advanced Box is being used.
Types of Logs
This function can manage the following logs:
Access Log for the Advanced Box
This log contains information related to the access status of the Advanced Box.
When logging in to (success/failure) or logging out from the Advanced Box using the touch panel display
When logging in to (success/failure) or logging out from the Advanced Box automatically when Integrated Authentication is valid
When logging in to (success/failure) or logging out from the Advanced Box from another imageRUNNER ADVANCE or computer
User Management Log for the Advanced Box
This log contains information related to the operations performed on the user management page.
When logging in to (success/failure) or logging out from the user management page of the Advanced Box
When registering/changing/deleting user information
When importing/exporting user information
Log for Authentication Log Management
This log contains information related to the exporting/deleting of authentication logs.
When exporting authentication logs is started
When exporting authentication logs is complete (success/failure)
When deleting authentication logs (success/failure)
IMPORTANT
Please note that Canon will not be held responsible for any damages caused by the use of Authentication Log Management or the inability to use Authentication Log Management.
The maximum number of logs that can be managed with this function is 8,000, regardless of the type of log. When this maximum number is reached, the oldest logs are erased and overwritten with the new logs.
NOTE
The collected logs and exported logs include items for the Date and Time, User Name, Operation Type, and Result (OK/NG).

1.
Start your Web browser → enter the following URL in the address bar.
http://<IP address of the machine or host name>
NOTE
You can also log in by entering the URL of [User Access Control for Advanced Box] in the address bar, as indicated below. (Case sensitive.)
http://<IP address or host name of the machine>:8000/uactrl/
2.
Select [System Manager Mode] → enter <System Manager ID:> and <System Manager PIN:> → click [Log In].
If the Department ID Management or authentication for SSO-H is set, enter the necessary items for each log in.
3.
Click [User Access Control for Advanced Box] from the Basic Tools.
4.
Click [Authentication Method and Log Management].
5.
Specifying each item for [Authentication/Operation Log Management].
Stopping Log Collection:
Restarting Log Collection:
Exporting Collected Logs:
Deleting Collected Logs:
Stopping Log Collection:
Clear the check mark from [Store authentication/operation log] → click [Update].
NOTE
If you start or stop log collection, this setting is retained until it is changed. The setting does not change when the machine is restarted.
If you stop log collection while logs are being collected, the logs for the period that log collection was stopped are not collected when log collection is next started.
Restarting Log Collection:
Set the check mark for [Store authentication/operation log] → click [Update].
NOTE
The saved logs may not be displayed in the order that they are collected.
Log collection is started by default.
Exporting Collected Logs:
NOTE
To export the various logs collected from the machine, use SSL or IPSec. To use SSL, set [Use SSL] to 'On' in [Remote UI] in [Management Settings] (Settings/Registration). If you want to use IPSec, see "IPSec Settings."
Click [Export].
Follow the instructions on the screen to specify the location where you want to save the file.
NOTE
Log collection is stopped while the export process is being performed.
If the display language setting of the machine is different from when the logs were collected, the file may contain garbled characters when the logs are exported.
Deleting Collected Logs:
Click [Delete] →[Yes].