Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Administration Guide


10.4 Viewing suspicious operation logs

If you select one or more of the following items for Suspicious Operations To Be Reported for the operation log policy, when suspicious operations are detected, operation logs for suspicious file transfer operations are displayed in the Security module.

To view operation logs for suspicious operations:

  1. Display the Security module.

  2. In the menu area, select Operation Logs and then Operation Log List.

  3. Use the filter to display operation logs for which Suspicious Operations is marked with the warning icon ([Figure]).

Operation logs for suspicious operations are displayed. Check the details of the operation logs, and take action if necessary.

Related Topics: