Hitachi

Job Management Partner 1 Version 10 Job Management Partner 1/IT Desktop Management Administration Guide


10.6 Viewing suspicious operation logs

If you select one or more of the following items for Suspicious Operations to be Notified for the operation log policy, when suspicious operations are detected, operation logs for suspicious file transfer operations are displayed in the Security module.

To view operation logs for suspicious operations:

  1. Display the Security module.

  2. In the menu area, select Operation Logs and then Operation Log List. For distributed operation logs, select Operation logs (distributed operation log) and then Extraction Results.

  3. Use the filter to display operation logs for which Suspicious Operations is marked with the warning icon ([Figure]).

Operation logs for suspicious operations are displayed. Check the details of the operation logs, and take action if necessary.

Related Topics: