Konica Minolta PageScope Log Management Utility User Manual

Log Management Utility
User’s Guide

Contents

1 Introduction
1.1 Operating Environment .................................................................... 1-1
1.3 Introduction to Functions .................................................................1-2
2 Installation of Log Management Utility
2.1 Installation ......................................................................................... 2-1
2.2 Items that are Installed .....................................................................2-3
2.3 Uninstallation ..................................................................................... 2-4
3 Starting Log Management Utility
3.1 To Start ............................................................................................... 3-1
3.2 Main Dialog Box ................................................................................3-3
3.3 To Exit ................................................................................................3-5
4 Log Confirmation
4.1 Device Registration ...........................................................................4-1
4.1.1 Search and Register .......................................................................4-2
4.1.2 Register from IP address ................................................................4-4
4.2 Receive Log from Device ................................................................. 4-7
4.2.1 Receive ........................................................................................... 4-7
4.2.2 Receive From Specified Devices ..................................................4-10
4.3 Confirm Logs ...................................................................................4-13
4.3.1 Select the Target History .............................................................. 4-13
4.3.2 Details of Log Display ................................................................... 4-14
4.4 Log Operations ................................................................................4-18
4.4.1 Sorting ..........................................................................................4-18
4.4.2 Filter .............................................................................................. 4-19
4.4.3 Log Search ...................................................................................4-22
4.4.4 Detailed Information ..................................................................... 4-26
4.4.5 Log Deletion ................................................................................. 4-28
Log Management Utility i
5 Log Management Utility Settings
5.1 File Menu ............................................................................................ 5-1
5.1.1 Open/Close Log File ....................................................................... 5-1
5.1.2 Export ............................................................................................. 5-2
5.1.3 Properties ....................................................................................... 5-5
5.2 Edit Menu ...........................................................................................5-6
5.2.1 Copy ............................................................................................... 5-6
5.2.2 Search ............................................................................................ 5-6
5.2.3 Log Deletion ................................................................................... 5-6
5.2.4 Log Detail Information ....................................................................5-6
5.3 Display Menu .....................................................................................5-7
5.3.1 Toolbar Display ON/OFF ................................................................5-7
5.3.2 Separation ...................................................................................... 5-7
5.3.3 Record Display (Filter) .................................................................... 5-7
5.3.4 Sorting ............................................................................................ 5-7
5.3.5 Moving ............................................................................................ 5-8
5.3.6 Displayed Item Settings ..................................................................5-8
5.3.7 General Settings .............................................................................5-9
5.4 Log Menu .........................................................................................5-10
5.4.1 Receive ......................................................................................... 5-10
5.4.2 Receive From Specified Devices ..................................................5-10
5.5 Setup Menu ......................................................................................5-11
5.5.1 Registration of Device ..................................................................5-11
5.5.2 Protect Functions ......................................................................... 5-13
5.5.3 Options .........................................................................................5-17
5.6 Help Menu ........................................................................................5-21
5.6.1 Log Management Utility Help ....................................................... 5-21
5.6.2 Version Information ......................................................................5-21
6 Linkage with PageScope Data Administrator
6.1 Import device information from PageScope
Data Administrator ............................................................................ 6-1
7 Error message list
Log Management Utility ii
About this Product
“KONICA MINOLTA Log Management Utility” accesses MFP products on the network, and displays log files (operations and processing records that include monitoring logs and communications history) stored on these devic­es. These can be used in management of device usage status, and in trou­bleshooting.
Trademarks and registered trademarks
Trademark acknowledgements
KONICA MINOLTA and the KONICA MINOLTA logo are either registered trademarks or trademarks of KONICA MINOLTA HOLDINGS, INC.
PageScope is a registered trademark or trademark of KONICA MINOLTA BUSINESS TECHNOLOGIES, INC.
®
Microsoft Microsoft Corporation in the United States and/or other countries.
Intel and Pentium are trademarks or registered trademarks of Intel Corpora­tion or its subsidiaries in the United States and other countries.
All other company and product names are trademarks or registered trade­marks of their respective companies.
Dialog boxes
The dialog boxes shown in this manual are those that appear in Windows XP.
and Windows® are either registered trademarks or trademarks of
2
Note
The dialog boxes that appear in this document may differ from those that appear on your computer, depending on the installed devices and spec­ified settings.
2
Note
Unauthorized reproduction, translation or duplication of this document whether in its entirety or in part, is strictly prohibited.
The content of this document is subject to change without notice.
Copyright © 2007 KONICA MINOLTA BUSINESS TECHNOLOGIES, INC. All rights reserved.
Log Management Utility iii
LICENSE ISSUES
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
OpenSSL License
Copyright © 1998-2004 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modifica­tion, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright no­tice, this list of conditions and the following disclaimer in the documen­tation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)”
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl­core@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following ac­knowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)”
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS” AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIM­ITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT­NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CON­SEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE­MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
Log Management Utility iv
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Original SSLeay License
Copyright © 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@crypt­soft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the fol­lowing conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is cov­ered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in docu­mentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modifica­tion, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright no­tice, this list of conditions and the following disclaimer in the documen­tation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)” The word ‘cryptographic’ can be left out if the rouines from the library be­ing used are not cryptographic related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledge­ment: “This product includes software written by Tim Hudson (tjh@crypt­soft.com)”
Log Management Utility v
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EX­PRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AU­THOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCI­DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILI­TY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or de­rivative of this code cannot be changed. i.e. this code cannot simply be cop­ied and put under another distribution licence [including the GNU Public Licence.]
Log Management Utility vi
Introduction

1 Introduction

1.1 Operating Environment

The operating environment for Log Management Utility is described below.
1
Supported operating systems
CPU According to the environment recommended for the operating sys-
Free hard disk space 100 MB or more
Memory According to the environment recommended for the operating sys-
File system NTFS
Web browser Microsoft Internet Explorer Ver.6.0 (Service Pack 1 or later)
Libraries Microsoft .NET Framework 1.1 (SP1)
Network Computer with properly configured TCP/IP and SNMP protocols.
Display 800 × 600 pixel or better.
Windows 2000 Professional (Service Pack 4 or later), Windows XP Professional (Service Pack 2 or later), Windows XP Professional x64 Edition, Windows Vista Business, Windows Vista Enterprise
tem
However, a separate area for saving acquired log files is also re­quired.
tem
The location for saving reception logs cannot be specified on FAT or FAT32 file systems.
16 bit color or better

1.2 Supported MFP Devices

2
Reminder
Please refer to the README to confirm if your MFP is supported by Log Management Utility.
Log Management Utility 1-1
Introduction

1.3 Introduction to Functions

Overview
The main functions of Log Management Utility are described below.
- Acquisition of logs in devices Acquire device audit logs, scan communication histories, and fax com­munication histories, and display these on the screen. Contents of the log can be used to confirm the date and time of operations, operation users, and operation results. Additionally, logs from multiple devices can be ac­quired.
- Management of acquired logs The log display can be sorted by date or number, and searched using pa­rameters such as transmission type and destination, allowing confirma­tion of device usage and errors status information. This is effective in collective management of usage status information.
- Log export Export an acquired log as a different file (log file). This enables ongoing management through periodic saving of logs.
Log Data that can be Acquired
Log data that can be acquired by Log Management Utility is described be­low.
1
2
Note
Items to display, and the width of the display can be changed in
played Item Settings
.
Audit logs:
No. Item No. Item
1 Result 12 Individual Job Number
2 Result Code 13 Type
3 Operation Character String 14 Address
4 Date and Time of Implementation 15 File Name
5 IF Number 16 Own Box Number
6 Operator Information 17 Box Number of Other Machine
7 Settings/Status 18 Relay User Box Number
8 User/Account Number 19 TSI Table Number
9 Operation Box Number 20 Received Fax Number
10 Security print ID 21 User/Account Name
11 User Job Number 22 External Server Information
Log Management Utility 1-2
Dis-
Introduction
Communication History (Scan) logs:
Communication History (Fax) logs:
1
No. Item
1Communication Result
2Result Code
3Number
4 Destination
5Time
6 Type
7 Number of Originals
8 Remarks
No. Item
1Communication Result
2Result Code
3 Log Type
4Number
5 Destination
6Time
7Transmission Time
8 Number of Originals
9 Remarks
Log Management Utility 1-3
Introduction
1
Log Management Utility 1-4
Installation of Log Management Utility

2 Installation of Log Management Utility

2.1 Installation

Install Log Management Utility using the following procedure.
2
Note
When installing, login as a user that has administrator privileges.
Be sure to quit all programs (including virus check programs) that are run­ning.
Before installation, make sure that “Microsoft .NET Framework 1.1 (SP1)” is installed on your computer.
To install
1 Double-click Setup.exe to start the installation program.
The installer starts.
2
2 Select the language, then click OK.
3 Follow the on-screen instructions to install.
Log Management Utility 2-1
Installation of Log Management Utility
2
Note
If
Start this tool when the PC is started
screen, then Log Management Utility will be started when the computer starts.
2
is selected in the following
Log Management Utility 2-2
Installation of Log Management Utility

2.2 Items that are Installed

When installing Log Management Utility, the following items are installed in the Start Menu and on the Desktop.
Items registered in the Start Menu
- Program
- Online help
- Readme
- Manual
Items registered on the Desktop
- Shortcut to the program
2
Note
It can also be specified that the “Readme” and “Manual” not be installed in the Start Menu. When installing, select the specify the items to install.
When installing, select whether or not to create registered shortcuts to the program on the desktop.
Custom
2
setup type, and
Log Management Utility 2-3
Installation of Log Management Utility

2.3 Uninstallation

Uninstall Log Management Utility using the following procedure.
- Use Add or Remove Programs (for Windows 2000, Add/Remove Pro-
grams).
- Run setup.exe again
2
Note
When uninstalling Log Management Utility, ensure that the program is closed.
2
Note
When uninstalling, a message to confirm whether or not to delete user settings data will be displayed.
If there are any automatically exported log files, then when uninstalling, a message to confirm whether or not to delete these will be displayed.
2
Log Management Utility 2-4
Starting Log Management Utility

3 Starting Log Management Utility

3.1 To Start

Start Log Management Utility using the following procedure.
- Start from the Windows Start Menu In Windows, click Start, then ProgramsKONICA MINOLTALog
Management UtilityLog Management Utility.
- Start using the shortcut on the desktop Double click the “Log Management Utility” icon that has been created on the desktop.
- Automatically start when the computer is started
When the software is started, the main dialog box will be displayed, and a “Log Management Utility” icon will be displayed on the tasktray.
2
Note
During installation, you can select whether or not to create a “Log Man­agement Utility” icon on the desktop.
Configure the program to start automatically with the computer either during installation, or from the options dialog box. For details, please re­fer to “Options” on page 5-17.
3
At startup, a Protect Function dialog box will be displayed. To configure the operation lock function for Log Management Utility, select Use Operation
Lock Function, and input a password in the dialog box that is displayed.
Log Management Utility 3-1
Starting Log Management Utility
For details, please refer to “Protect Functions” on page 5-13.
At startup, a message prompting you to protect the folder for received logs will be displayed. Confirm these details, and protect the folder if so required.
Select Do not show this message again in order to prevent this message being displayed again at startup.
3
2
Note
If Log Management Utility is configured to start automatically at compu­ter start-up, then the save folder message will not be displayed.
Display ON/OFF of this message can be configured in “Options”. For de­tails, please refer to “Options” on page 5-17.
Log Management Utility 3-2
Starting Log Management Utility

3.2 Main Dialog Box

123
4
6
3
5
No. Name Description
1 Menu Bar Specify Log Management Utility functions. For details, please refer to
2 Toolbar Open Log File Open a saved log file.
3 Page Bar First Page Displays the first page.
“Log Management Utility Settings” on page 5-1.
Close Log File Close a displayed log file.
Log export Save a list of displayed logs as a file.
Receive Receive logs from all registered devices.
Receive From Spec­ified Devices
Search Search logs using specified conditions.
All Records Displays all logs.
Filter Displays only logs that match conditions.
Previous Page Displays the previous page.
Next Page Displays the next page.
Last Page Displays the last page.
Page Number Displays current and total page numbers.
Receive logs from all devices specified as “Tar­get”.
Log Management Utility 3-3
Starting Log Management Utility
No. Name Description
4 Selection View Target Select the devices or log files for which to dis-
5 Log Information
View
6 Status Bar Displays current status, and hints giving overviews of functions.
3
play logs.
History Select the type of logs to display.
Display the corresponding log list.
Log Management Utility 3-4
Starting Log Management Utility

3.3 To Exit

Exit Log Management Utility using the following procedure.
- On the main dialog box, select File, then Exit Log Management Utility.
- Click the [x] (Close) button at the top right of the main dialog box.
- From the Taskbar, right click the “Log Management Utility” icon, and se-
lect Exit Log Management Utility.
- Shut down or log off from the computer.
3
Log Management Utility 3-5
Starting Log Management Utility
3
Log Management Utility 3-6
Log Confirmation

4 Log Confirmation

4.1 Device Registration

Acquisition of device logs requires registration of target devices in Log Man­agement Utility.
Two types of registration are possible. “Search and Register”, in which de­vices are searched for from within a specified network range and then these are registered, and “Register from IP address”, in which the device IP ad­dress is specified and then the device registered.
If the target device has already been registered, then this operation is not necessary. For details, please refer to “Receive Log from Device” on page 4-7.
2
Note
Multiple devices can not be registered with the same address.
Log Management Utility is an application for administrators. As such, its use requires that you know the device administrator password.
4
2
Note
Up to a maximum of 100 devices can be registered.
Specifying a device from PageScope Data Administrator and then start­ing Log Management Utility can register the specified device in Log Man­agement Utility.
Log Management Utility 4-1
Log Confirmation

4.1.1 Search and Register

1 Start Log Management Utility.
The main dialog box will be displayed.
2 From the Setup menu, select Registration of Device.
The Device registration dialog box will be displayed.
3 Click Search and Register.
– Click Register from IP address in order to specify the IP Address
and register the device. For details, please refer to “Register from IP address” on page 4-4.
– Click Import from PageScope Data Administrator to import de-
vice information from PageScope Data Administrator, and to regis­ter the device. For details, please refer to “Import device information from PageScope Data Administrator” on page 6-1.
4
Log Management Utility 4-2
Loading...
+ 53 hidden pages