10.3 Specifying settings for detecting suspicious operations
To detect suspicious operations, specify settings for Suspicious Operations To Be Reported in the operation log policy.
To specify settings for suspicious operations:
-
Display the Security module.
-
In the menu area, select Security Policy and then Security Policy List.
-
In the information area, select the security policy that you want to edit, and then click the Edit button.
To add a security policy, click the Add button.
-
In the security configuration items, click Operation Logs.
If the view is inactive, the operation log policy is disabled. To enable the policy, click the Enabled button in the upper-left corner.
-
Specify settings for suspicious operations in Suspicious Operations To Be Reported.
-
Click OK.
If suspicious operations are detected, operation logs for suspicious file transfer operations are displayed in the Security module, and events for all suspicious operations are displayed in the Events module.
Related Topics: