“KONICA MINOLTA Log Management Utility”, as plug-in of Device Set-Up,
accesses MFP products on the network, and displays log files (operations
and processing records that include monitoring logs and communications
history) stored on these devices. These can be used in management of device usage status, and in troubleshooting.
Trademarks and registered trademarks
Trademark acknowledgements
KONICA MINOLTA and the KONICA MINOLTA logo are either registered
trademarks or trademarks of KONICA MINOLTA HOLDINGS, INC.
PageScope is a registered trademark or trademark of KONICA MINOLTA
BUSINESS TECHNOLOGIES, INC.
®
Microsoft
Microsoft Corporation in the United States and/or other countries.
Intel and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
All other company and product names are trademarks or registered trademarks of their respective companies.
Dialog boxes
The dialog boxes shown in this manual are those that appear in Windows XP.
and Windows® are either registered trademarks or trademarks of
2
Note
The dialog boxes that appear in this document may differ from those that
appear on your computer, depending on the installed devices and specified settings.
2
Note
Unauthorized reproduction, translation or duplication of this document
whether in its entirety or in part, is strictly prohibited.
The content of this document is subject to change without notice.
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of
the OpenSSL License and the original SSLeay license apply to the toolkit.
See below for the actual license texts. Actually both licenses are BSD-style
Open Source licenses. In case of any license issues related to OpenSSL
please contact openssl-core@openssl.org.
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must
display the following acknowledgment:
“This product includes software developed by the OpenSSL Project for
use in the OpenSSL Toolkit. (http://www.openssl.org/)”
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used
to endorse or promote products derived from this software without prior
written permission. For written permission, please contact opensslcore@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor
may “OpenSSL” appear in their names without prior written permission
of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
“This product includes software developed by the OpenSSL Project for
use in the OpenSSL Toolkit (http://www.openssl.org/)”
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS” AND
ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
Log Management Utilityiv
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com). This product includes software written by Tim Hudson
(tjh@cryptsoft.com).
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code
found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just
the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson
(tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the
code are not to be removed.
If this package is used in a product, Eric Young should be given attribution
as the author of the parts of the library used.
This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list
of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must
display the following acknowledgement:
“This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com)”
The word ‘cryptographic’ can be left out if the routines from the library
being used are not cryptographic related.
4. If you include any Windows specific code (or a derivative thereof) from
the apps directory (application code) you must include an acknowledgement:
“This product includes software written by Tim Hudson (tjh@cryptsoft.com)”
Log Management Utilityv
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public
Licence.]
Log Management Utilityvi
Introduction
1Introduction
1.1Operating Environment
The operating environment for Log Management Utility is described below.
1
Supported operating
systems
CPUAccording to the recommended system requirements of your oper-
Free hard disk space 100 MB or more
Memory According to the recommended system requirements of your oper-
File system NTFS
Web browser Microsoft Internet Explorer 6.0 (SP1) or later
Libraries Microsoft .NET Framework 2.0 (SP2 or later) <Windows XP>
NetworkComputer with properly configured TCP/IP and SNMP protocols.
Display 800 × 600 pixel or better.
Windows XP Professional (SP3 or later)
Windows XP Professional x64 Edition (SP2 or later)
Windows Vista Enterprise (SP2 or later)*
Windows Vista Business (SP2 or later)*
Windows Vista Ultimate (SP2 or later)*
Windows 7 Enterprise (SP1 or later)*
Windows 7 Professional (SP1 or later)*
Windows 7 Ultimate (SP1 or later)*
* 32-bit(x86) and 64-bit(x64) editions are supported.
ating system.
However, a separate area for saving acquired log files is also required.
ating system.
The location for saving reception logs cannot be specified on FAT or
FAT32 file systems.
Microsoft .NET Framework 3.5 (SP1 or later) <Windows Vista>
* The edition of .NET Framework required for this software is
pre-installed on Windows 7.
16 bit color or better
Refer to the Readme file for the latest information about service packs and
so on.
1.2Supported MFP Devices
2
Reminder
Please refer to the Readme to confirm if your MFP is supported by Log
Management Utility.
Log Management Utility1-1
Introduction
1.3Introduction to Functions
Overview
The main functions of Log Management Utility are described below.
- Acquisition of logs in devices
Acquire device audit logs, scan communication histories, and fax communication histories, and display these on the screen. Contents of the log
can be used to confirm the date and time of operations, operation users,
and operation results. Additionally, logs from multiple devices can be acquired.
- Management of acquired logs
The log display can be sorted by date or number, and searched using parameters such as transmission type and destination, allowing confirmation of device usage and errors status information. This is effective in
collective management of usage status information.
- Log export
Export an acquired log as a different file (log file). This enables ongoing
management through periodic saving of logs.
Log Data that can be Acquired
Log data that can be acquired by Log Management Utility is described below.
1
2
Note
Items to display, and the width of the display can be changed in [Displayed Item Settings].
Audit logs:
No.ItemNo.Item
1Result12Individual Job Number
2Result Code13Type
3Operation14Address
4Date and Time of Implementation15File Name
5IF Number16Own Box Number
6Operator Information17Box Number of Other Machine
7Settings/Status18Relay User Box Number
8User/Account Number19TSI Table Number
9Operation Box Number20Received Fax Number
10Security print ID21User/Account Name
11User Job Number22External Server Information
Log Management Utility1-2
Introduction
Communication History (Scan) logs:
Communication History (Fax) logs:
1
No.Item
1Communication Result
2Result Code
3Number
4Destination
5Time
6Type
7Number of Originals
8Remarks
No.Item
1Communication Result
2Result Code
3Log Type
4Number
5Destination
6Time
7Transmission Time
8Number of Originals
9Remarks
Log Management Utility1-3
Installation of Log Management Utility
2Installation of Log Management Utility
2.1Installation
Install Log Management Utility using the following procedure.
2
Note
When installing, login as a user that has administrator privileges.
Be sure to quit all programs (including virus check programs) that are running.
When installing the Log Management Utility, the Microsoft .NET Framework is required to have been installed in advance.
The version of Microsoft .NET Framework is based on the OS to be used.
Refer to page 1-1 for details.
When the Device Set-up is not installed, the Device Set-up installer is activated. Be sure, first of all, to install the Device Set-up.
To install
2
1Double-click [Setup.exe] to start the installation program.
The installer starts.
2Select the language, then click [OK].
3Follow the on-screen instructions to install.
Log Management Utility2-1
Installation of Log Management Utility
2
Note
If [Start this tool when the PC is started] is selected in the following
screen, then Log Management Utility will be started when the computer
starts.
2
Log Management Utility2-2
Installation of Log Management Utility
2.2Items that are Installed
When installing Log Management Utility, the following items are installed in
the Start Menu and on the Desktop.
Items registered in the Start Menu
- Program
- Online help
- Readme
Items registered on the Desktop
- Shortcut to the program
2
Note
It can also be specified that the “Readme” not be installed in the Start
Menu. When installing, select the [Custom] setup type, and specify the
items to install.
When installing, select whether or not to create registered shortcuts to
the program on the desktop.
2
Log Management Utility2-3
Installation of Log Management Utility
2.3Uninstallation
Uninstall Log Management Utility using the following procedure.
- Use [Add or Remove Programs].
- Run [setup.exe] again
2
Note
When uninstalling Log Management Utility, ensure that the program is
closed.
Please note that the use of the Log Management Utility becomes unavailable if the Device Set-Up is uninstalled with the Log Management Utility
installed. On an occasion like this, reinstall it with the installer of the Log
Management Utility to install the Device Set-Up.
2
Note
When uninstalling, a message to confirm whether or not to delete user
settings data will be displayed.
2
Log Management Utility2-4
Starting Log Management Utility
3Starting Log Management Utility
3.1To Start
Start Log Management Utility using the following procedure.
- Start from the Windows Start Menu
In Windows, click Start, then All Programs — KONICA MINOLTA —
Log Management Utility — Log Management Utility.
- Start using the shortcut on the desktop
Double click the “Log Management Utility” icon that has been created on
the desktop.
- Automatically start when the computer is started
When the software is started, the main dialog box will be displayed, and a
“Log Management Utility” icon will be displayed on the tasktray.
2
Note
During installation, you can select whether or not to create a “Log Management Utility” icon on the desktop.
Configure the program to start automatically with the computer either
during installation, or from the options dialog box. For details, please refer to “Options” on page 5-11.
3
At startup, a Protect Function dialog box will be displayed.
For details about auto protect function, refer to “Device Set-Up User’s
Guide”.
Log Management Utility3-1
Starting Log Management Utility
3.2Main Window
When the Log Management Utility is activated, the main window is displayed.
!
Detail
Refer to “Device Set-Up User’s Guide” for more information about main
window.
3
3.3To Exit
Exit Log Management Utility using the following procedure.
- On the main window, select [File], then [Exit].
- Click the [x] (Close) button at the top right of the main dialog box.
- Shut down or log off from the computer.
Log Management Utility3-2
Log Confirmation
4Log Confirmation
4.1Device Registration
When using the Log Management Utility, it is necessary to make a search for
a supported device on the network for registration.
As a method for the search/registration of a supported device, the following
are available.
- Method for searching a supported device on the network
- Method for searching a supported device with the IP address specified.
- Method for registering a supported device from the Function access re-
striction file
!
Detail
For details of the method for search/registration of the supported device,
refer to the user’s guide of the Device Set-up.
4.1.1Specify as reception target
Specify as reception target
0 The setting of [Log Management Settings] is available only for a device
supported by the log management function.
4
1Start Log Management Utility.
2Click .
Log Management Utility4-1
Loading...
+ 39 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.