Konica Minolta magicolor 8650 User Manual

Log Management Utility
User’s Guide

Contents

About this Product ..........................................................................................iii
Trademarks and registered trademarks .......................................................iii
1 Introduction
1.1 Operating Environment .................................................................... 1-1
1.2 Supported MFP Devices .................................................................. 1-1
1.3 Introduction to Functions ................................................................ 1-2
Overview ........................................................................................ 1-2
Log Data that can be Acquired ...................................................... 1-2
2 Installation of Log Management Utility
2.1 Installation ......................................................................................... 2-1
To install ......................................................................................... 2-1
2.2 Items that are Installed .................................................................... 2-3
2.3 Uninstallation .................................................................................... 2-4
3 Starting Log Management Utility
3.1 To Start .............................................................................................. 3-1
3.2 Main Window ..................................................................................... 3-2
3.3 To Exit ................................................................................................ 3-2
4 Log Confirmation
4.1 Device Registration .......................................................................... 4-1
4.1.1 Specify as reception target ............................................................ 4-1
Specify as reception target ............................................................ 4-1
4.2 Receive Log from Device ................................................................. 4-4
4.2.1 Receive .......................................................................................... 4-4
4.2.2 Receive From Specified Devices ................................................... 4-7
4.2.3 Receive Log Periodically From Specified Devices ......................... 4-8
4.3 Confirm Logs ..................................................................................... 4-9
4.3.1 Select the Target History ............................................................... 4-9
4.3.2 Details of Log Display .................................................................. 4-10
Log Management Utility i
Audit logs: .................................................................................... 4-10
Communication History (Scan): ................................................... 4-11
Communication History (Fax): ...................................................... 4-11
4.4 Log Operations ............................................................................... 4-13
4.4.1 Sorting .......................................................................................... 4-13
4.4.2 Filter ............................................................................................. 4-15
Specifying a Filter ......................................................................... 4-16
Deleting a Filter ............................................................................ 4-17
4.4.3 Log Search ................................................................................... 4-18
Searching ..................................................................................... 4-18
4.4.4 Detailed Information ..................................................................... 4-21
4.4.5 Log Deletion ................................................................................. 4-23
5 Log Management Utility Settings
5.1 File Menu ........................................................................................... 5-1
5.1.1 Open/Close Log File ...................................................................... 5-1
5.1.2 Export ............................................................................................. 5-2
5.1.3 Properties ....................................................................................... 5-6
5.2 Edit Menu .......................................................................................... 5-7
5.2.1 Copy ............................................................................................... 5-7
5.2.2 Search ............................................................................................ 5-7
5.2.3 Log Deletion ................................................................................... 5-7
5.2.4 Detailed Log Information ................................................................ 5-7
5.3 Display Menu ..................................................................................... 5-8
5.3.1 Toolbar Display ON/OFF ................................................................ 5-8
5.3.2 Separation ...................................................................................... 5-8
5.3.3 Record Display (Filter) .................................................................... 5-8
5.3.4 Sorting ............................................................................................ 5-8
5.3.5 Moving ........................................................................................... 5-9
5.3.6 Displayed Item Settings ................................................................. 5-9
5.3.7 General Settings ........................................................................... 5-10
5.4 Options ............................................................................................ 5-11
Reception Log: ............................................................................. 5-11
Auto export: ................................................................................. 5-12
Periodic Reception: ...................................................................... 5-14
6 Error message list
Log Management Utility ii

About this Product

“KONICA MINOLTA Log Management Utility”, as plug-in of Device Set-Up, accesses MFP products on the network, and displays log files (operations and processing records that include monitoring logs and communications history) stored on these devices. These can be used in management of de­vice usage status, and in troubleshooting.

Trademarks and registered trademarks

Trademark acknowledgements

KONICA MINOLTA and the KONICA MINOLTA logo are either registered trademarks or trademarks of KONICA MINOLTA HOLDINGS, INC.
PageScope is a registered trademark or trademark of KONICA MINOLTA BUSINESS TECHNOLOGIES, INC.
®
Microsoft Microsoft Corporation in the United States and/or other countries.
Intel and Pentium are trademarks or registered trademarks of Intel Corpora­tion or its subsidiaries in the United States and other countries.
All other company and product names are trademarks or registered trade­marks of their respective companies.

Dialog boxes

The dialog boxes shown in this manual are those that appear in Windows XP.
and Windows® are either registered trademarks or trademarks of
2
Note
The dialog boxes that appear in this document may differ from those that appear on your computer, depending on the installed devices and spec­ified settings.
2
Note
Unauthorized reproduction, translation or duplication of this document whether in its entirety or in part, is strictly prohibited.
The content of this document is subject to change without notice.
Copyright © 2007 KONICA MINOLTA BUSINESS TECHNOLOGIES, INC. All rights reserved.
Log Management Utility iii

LICENSE ISSUES

The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
OpenSSL License
Copyright © 1998-2004 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modifica­tion, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright no­tice, this list of conditions and the following disclaimer in the documen­tation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)”
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl­core@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following ac­knowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)”
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS” AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIM­ITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT­NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CON­SEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE­MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
Log Management Utility iv
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Original SSLeay License
Copyright © 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@crypt­soft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the fol­lowing conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is cov­ered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in docu­mentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modifica­tion, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright no­tice, this list of conditions and the following disclaimer in the documen­tation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)” The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledge­ment: “This product includes software written by Tim Hudson (tjh@crypt­soft.com)”
Log Management Utility v
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EX­PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AU­THOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCI­DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILI­TY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or de­rivative of this code cannot be changed. i.e. this code cannot simply be cop­ied and put under another distribution licence [including the GNU Public Licence.]
Log Management Utility vi
Introduction

1 Introduction

1.1 Operating Environment

The operating environment for Log Management Utility is described below.
1
Supported operating systems
CPU According to the recommended system requirements of your oper-
Free hard disk space 100 MB or more
Memory According to the recommended system requirements of your oper-
File system NTFS
Web browser Microsoft Internet Explorer 6.0 (SP1) or later
Libraries Microsoft .NET Framework 2.0 (SP2 or later) <Windows XP>
Network Computer with properly configured TCP/IP and SNMP protocols.
Display 800 × 600 pixel or better.
Windows XP Professional (SP3 or later) Windows XP Professional x64 Edition (SP2 or later) Windows Vista Enterprise (SP2 or later)* Windows Vista Business (SP2 or later)* Windows Vista Ultimate (SP2 or later)* Windows 7 Enterprise (SP1 or later)* Windows 7 Professional (SP1 or later)* Windows 7 Ultimate (SP1 or later)* * 32-bit(x86) and 64-bit(x64) editions are supported.
ating system.
However, a separate area for saving acquired log files is also re­quired.
ating system.
The location for saving reception logs cannot be specified on FAT or FAT32 file systems.
Microsoft .NET Framework 3.5 (SP1 or later) <Windows Vista> * The edition of .NET Framework required for this software is pre-installed on Windows 7.
16 bit color or better
Refer to the Readme file for the latest information about service packs and so on.

1.2 Supported MFP Devices

2
Reminder
Please refer to the Readme to confirm if your MFP is supported by Log Management Utility.
Log Management Utility 1-1
Introduction

1.3 Introduction to Functions

Overview

The main functions of Log Management Utility are described below.
- Acquisition of logs in devices Acquire device audit logs, scan communication histories, and fax com­munication histories, and display these on the screen. Contents of the log can be used to confirm the date and time of operations, operation users, and operation results. Additionally, logs from multiple devices can be ac­quired.
- Management of acquired logs The log display can be sorted by date or number, and searched using pa­rameters such as transmission type and destination, allowing confirma­tion of device usage and errors status information. This is effective in collective management of usage status information.
- Log export Export an acquired log as a different file (log file). This enables ongoing management through periodic saving of logs.

Log Data that can be Acquired

Log data that can be acquired by Log Management Utility is described be­low.
1
2
Note
Items to display, and the width of the display can be changed in [Dis­played Item Settings].
Audit logs:
No. Item No. Item
1 Result 12 Individual Job Number
2 Result Code 13 Type
3 Operation 14 Address
4 Date and Time of Implementation 15 File Name
5 IF Number 16 Own Box Number
6 Operator Information 17 Box Number of Other Machine
7 Settings/Status 18 Relay User Box Number
8 User/Account Number 19 TSI Table Number
9 Operation Box Number 20 Received Fax Number
10 Security print ID 21 User/Account Name
11 User Job Number 22 External Server Information
Log Management Utility 1-2
Introduction
Communication History (Scan) logs:
Communication History (Fax) logs:
1
No. Item
1 Communication Result
2Result Code
3Number
4Destination
5Time
6 Type
7Number of Originals
8Remarks
No. Item
1 Communication Result
2Result Code
3Log Type
4Number
5Destination
6Time
7 Transmission Time
8Number of Originals
9Remarks
Log Management Utility 1-3
Installation of Log Management Utility

2 Installation of Log Management Utility

2.1 Installation

Install Log Management Utility using the following procedure.
2
Note
When installing, login as a user that has administrator privileges.
Be sure to quit all programs (including virus check programs) that are run­ning.
When installing the Log Management Utility, the Microsoft .NET Frame­work is required to have been installed in advance. The version of Microsoft .NET Framework is based on the OS to be used. Refer to page 1-1 for details.
When the Device Set-up is not installed, the Device Set-up installer is ac­tivated. Be sure, first of all, to install the Device Set-up.

To install

2
1 Double-click [Setup.exe] to start the installation program.
The installer starts.
2 Select the language, then click [OK].
3 Follow the on-screen instructions to install.
Log Management Utility 2-1
Installation of Log Management Utility
2
Note
If [Start this tool when the PC is started] is selected in the following screen, then Log Management Utility will be started when the computer starts.
2
Log Management Utility 2-2
Installation of Log Management Utility

2.2 Items that are Installed

When installing Log Management Utility, the following items are installed in the Start Menu and on the Desktop.
Items registered in the Start Menu
- Program
- Online help
- Readme
Items registered on the Desktop
- Shortcut to the program
2
Note
It can also be specified that the “Readme” not be installed in the Start Menu. When installing, select the [Custom] setup type, and specify the items to install.
When installing, select whether or not to create registered shortcuts to the program on the desktop.
2
Log Management Utility 2-3
Installation of Log Management Utility

2.3 Uninstallation

Uninstall Log Management Utility using the following procedure.
- Use [Add or Remove Programs].
- Run [setup.exe] again
2
Note
When uninstalling Log Management Utility, ensure that the program is closed.
Please note that the use of the Log Management Utility becomes unavail­able if the Device Set-Up is uninstalled with the Log Management Utility installed. On an occasion like this, reinstall it with the installer of the Log Management Utility to install the Device Set-Up.
2
Note
When uninstalling, a message to confirm whether or not to delete user settings data will be displayed.
2
Log Management Utility 2-4
Starting Log Management Utility

3 Starting Log Management Utility

3.1 To Start

Start Log Management Utility using the following procedure.
- Start from the Windows Start Menu In Windows, click Start, then All ProgramsKONICA MINOLTA
Log Management UtilityLog Management Utility.
- Start using the shortcut on the desktop Double click the “Log Management Utility” icon that has been created on the desktop.
- Automatically start when the computer is started
When the software is started, the main dialog box will be displayed, and a “Log Management Utility” icon will be displayed on the tasktray.
2
Note
During installation, you can select whether or not to create a “Log Man­agement Utility” icon on the desktop.
Configure the program to start automatically with the computer either during installation, or from the options dialog box. For details, please re­fer to “Options” on page 5-11.
3
At startup, a Protect Function dialog box will be displayed.
For details about auto protect function, refer to “Device Set-Up User’s Guide”.
Log Management Utility 3-1
Starting Log Management Utility

3.2 Main Window

When the Log Management Utility is activated, the main window is dis­played.
!
Detail
Refer to “Device Set-Up User’s Guide” for more information about main window.
3

3.3 To Exit

Exit Log Management Utility using the following procedure.
- On the main window, select [File], then [Exit].
- Click the [x] (Close) button at the top right of the main dialog box.
- Shut down or log off from the computer.
Log Management Utility 3-2
Log Confirmation

4 Log Confirmation

4.1 Device Registration

When using the Log Management Utility, it is necessary to make a search for a supported device on the network for registration.
As a method for the search/registration of a supported device, the following are available.
- Method for searching a supported device on the network
- Method for searching a supported device with the IP address specified.
- Method for registering a supported device from the Function access re-
striction file
!
Detail
For details of the method for search/registration of the supported device, refer to the user’s guide of the Device Set-up.

4.1.1 Specify as reception target

Specify as reception target
0 The setting of [Log Management Settings] is available only for a device
supported by the log management function.
4
1 Start Log Management Utility.
2 Click .
Log Management Utility 4-1
Loading...
+ 39 hidden pages