5.6Help Menu ........................................................................................5-21
5.6.1Log Management Utility Help ....................................................... 5-21
5.6.2Version Information ......................................................................5-21
6Linkage with PageScope Data Administrator
6.1Import device information from PageScope
Data Administrator ............................................................................ 6-1
7Error message list
Log Management Utilityii
About this Product
“KONICA MINOLTA Log Management Utility” accesses MFP products on
the network, and displays log files (operations and processing records that
include monitoring logs and communications history) stored on these devices. These can be used in management of device usage status, and in troubleshooting.
Trademarks and registered trademarks
Trademark acknowledgements
KONICA MINOLTA and the KONICA MINOLTA logo are either registered
trademarks or trademarks of KONICA MINOLTA HOLDINGS, INC.
PageScope is a registered trademark or trademark of KONICA MINOLTA
BUSINESS TECHNOLOGIES, INC.
®
Microsoft
Microsoft Corporation in the United States and/or other countries.
Intel and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
All other company and product names are trademarks or registered trademarks of their respective companies.
Dialog boxes
The dialog boxes shown in this manual are those that appear in Windows XP.
and Windows® are either registered trademarks or trademarks of
2
Note
The dialog boxes that appear in this document may differ from those that
appear on your computer, depending on the installed devices and specified settings.
2
Note
Unauthorized reproduction, translation or duplication of this document
whether in its entirety or in part, is strictly prohibited.
The content of this document is subject to change without notice.
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of
the OpenSSL License and the original SSLeay license apply to the toolkit.
See below for the actual license texts. Actually both licenses are BSD-style
Open Source licenses. In case of any license issues related to OpenSSL
please contact openssl-core@openssl.org.
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must
display the following acknowledgment:
“This product includes software developed by the OpenSSL Project for
use in the OpenSSL Toolkit. (http://www.openssl.org/)”
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used
to endorse or promote products derived from this software without prior
written permission. For written permission, please contact opensslcore@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor
may “OpenSSL” appear in their names without prior written permission
of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
“This product includes software developed by the OpenSSL Project for
use in the OpenSSL Toolkit (http://www.openssl.org/)”
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS” AND
ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
Log Management Utilityiv
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com). This product includes software written by Tim Hudson
(tjh@cryptsoft.com).
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code
found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just
the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson
(tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the
code are not to be removed.
If this package is used in a product, Eric Young should be given attribution
as the author of the parts of the library used.
This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list
of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must
display the following acknowledgement:
“This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com)”
The word ‘cryptographic’ can be left out if the rouines from the library being used are not cryptographic related.
4. If you include any Windows specific code (or a derivative thereof) from
the apps directory (application code) you must include an acknowledgement:
“This product includes software written by Tim Hudson (tjh@cryptsoft.com)”
Log Management Utilityv
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public
Licence.]
Log Management Utilityvi
Introduction
1Introduction
1.1Operating Environment
The operating environment for Log Management Utility is described below.
1
Supported operating
systems
CPUAccording to the environment recommended for the operating sys-
Free hard disk space 100 MB or more
Memory According to the environment recommended for the operating sys-
File system NTFS
Web browser Microsoft Internet Explorer Ver.6.0 (Service Pack 1 or later)
Libraries Microsoft .NET Framework 1.1 (SP1)
NetworkComputer with properly configured TCP/IP and SNMP protocols.
Display 800 × 600 pixel or better.
Windows 2000 Professional (Service Pack 4 or later),
Windows XP Professional (Service Pack 2 or later),
Windows XP Professional x64 Edition, Windows Vista Business,
Windows Vista Enterprise
tem
However, a separate area for saving acquired log files is also required.
tem
The location for saving reception logs cannot be specified on FAT or
FAT32 file systems.
16 bit color or better
1.2Supported MFP Devices
2
Reminder
Please refer to the README to confirm if your MFP is supported by Log
Management Utility.
Log Management Utility1-1
Introduction
1.3Introduction to Functions
Overview
The main functions of Log Management Utility are described below.
- Acquisition of logs in devices
Acquire device audit logs, scan communication histories, and fax communication histories, and display these on the screen. Contents of the log
can be used to confirm the date and time of operations, operation users,
and operation results. Additionally, logs from multiple devices can be acquired.
- Management of acquired logs
The log display can be sorted by date or number, and searched using parameters such as transmission type and destination, allowing confirmation of device usage and errors status information. This is effective in
collective management of usage status information.
- Log export
Export an acquired log as a different file (log file). This enables ongoing
management through periodic saving of logs.
Log Data that can be Acquired
Log data that can be acquired by Log Management Utility is described below.
1
2
Note
Items to display, and the width of the display can be changed in
played Item Settings
.
Audit logs:
No.ItemNo.Item
1Result12Individual Job Number
2Result Code13Type
3Operation Character String14Address
4Date and Time of Implementation15File Name
5IF Number16Own Box Number
6Operator Information17Box Number of Other Machine
7Settings/Status18Relay User Box Number
8User/Account Number19TSI Table Number
9Operation Box Number20Received Fax Number
10Security print ID21User/Account Name
11User Job Number22External Server Information
Log Management Utility1-2
Dis-
Introduction
Communication History (Scan) logs:
Communication History (Fax) logs:
1
No.Item
1Communication Result
2Result Code
3Number
4Destination
5Time
6Type
7Number of Originals
8Remarks
No.Item
1Communication Result
2Result Code
3Log Type
4Number
5Destination
6Time
7Transmission Time
8Number of Originals
9Remarks
Log Management Utility1-3
Introduction
1
Log Management Utility1-4
Installation of Log Management Utility
2Installation of Log Management Utility
2.1Installation
Install Log Management Utility using the following procedure.
2
Note
When installing, login as a user that has administrator privileges.
Be sure to quit all programs (including virus check programs) that are running.
Before installation, make sure that “Microsoft .NET Framework 1.1 (SP1)”
is installed on your computer.
To install
1Double-click Setup.exe to start the installation program.
The installer starts.
2
2Select the language, then click OK.
3Follow the on-screen instructions to install.
Log Management Utility2-1
Installation of Log Management Utility
2
Note
If
Start this tool when the PC is started
screen, then Log Management Utility will be started when the computer
starts.
2
is selected in the following
Log Management Utility2-2
Installation of Log Management Utility
2.2Items that are Installed
When installing Log Management Utility, the following items are installed in
the Start Menu and on the Desktop.
Items registered in the Start Menu
- Program
- Online help
- Readme
- Manual
Items registered on the Desktop
- Shortcut to the program
2
Note
It can also be specified that the “Readme” and “Manual” not be installed
in the Start Menu. When installing, select the
specify the items to install.
When installing, select whether or not to create registered shortcuts to
the program on the desktop.
Custom
2
setup type, and
Log Management Utility2-3
Installation of Log Management Utility
2.3Uninstallation
Uninstall Log Management Utility using the following procedure.
- Use Add or Remove Programs (for Windows 2000, Add/Remove Pro-
grams).
- Run setup.exe again
2
Note
When uninstalling Log Management Utility, ensure that the program is
closed.
2
Note
When uninstalling, a message to confirm whether or not to delete user
settings data will be displayed.
If there are any automatically exported log files, then when uninstalling, a
message to confirm whether or not to delete these will be displayed.
2
Log Management Utility2-4
Starting Log Management Utility
3Starting Log Management Utility
3.1To Start
Start Log Management Utility using the following procedure.
- Start from the Windows Start Menu
In Windows, click Start, then Programs — KONICA MINOLTA — Log
Management Utility — Log Management Utility.
- Start using the shortcut on the desktop
Double click the “Log Management Utility” icon that has been created on
the desktop.
- Automatically start when the computer is started
When the software is started, the main dialog box will be displayed, and a
“Log Management Utility” icon will be displayed on the tasktray.
2
Note
During installation, you can select whether or not to create a “Log Management Utility” icon on the desktop.
Configure the program to start automatically with the computer either
during installation, or from the options dialog box. For details, please refer to “Options” on page 5-17.
3
At startup, a Protect Function dialog box will be displayed. To configure the
operation lock function for Log Management Utility, select Use Operation
Lock Function, and input a password in the dialog box that is displayed.
Log Management Utility3-1
Starting Log Management Utility
For details, please refer to “Protect Functions” on page 5-13.
At startup, a message prompting you to protect the folder for received logs
will be displayed. Confirm these details, and protect the folder if so required.
Select Do not show this message again in order to prevent this message
being displayed again at startup.
3
2
Note
If Log Management Utility is configured to start automatically at computer start-up, then the save folder message will not be displayed.
Display ON/OFF of this message can be configured in “Options”. For details, please refer to “Options” on page 5-17.
Log Management Utility3-2
Starting Log Management Utility
3.2Main Dialog Box
123
4
6
3
5
No.NameDescription
1Menu BarSpecify Log Management Utility functions. For details, please refer to
2ToolbarOpen Log FileOpen a saved log file.
3Page BarFirst PageDisplays the first page.
“Log Management Utility Settings” on page 5-1.
Close Log FileClose a displayed log file.
Log exportSave a list of displayed logs as a file.
ReceiveReceive logs from all registered devices.
Receive From Specified Devices
SearchSearch logs using specified conditions.
All RecordsDisplays all logs.
FilterDisplays only logs that match conditions.
Previous PageDisplays the previous page.
Next PageDisplays the next page.
Last PageDisplays the last page.
Page NumberDisplays current and total page numbers.
Receive logs from all devices specified as “Target”.
Log Management Utility3-3
Starting Log Management Utility
No.NameDescription
4Selection View TargetSelect the devices or log files for which to dis-
5Log Information
View
6Status BarDisplays current status, and hints giving overviews of functions.
3
play logs.
HistorySelect the type of logs to display.
Display the corresponding log list.
Log Management Utility3-4
Starting Log Management Utility
3.3To Exit
Exit Log Management Utility using the following procedure.
- On the main dialog box, select File, then Exit Log Management Utility.
- Click the [x] (Close) button at the top right of the main dialog box.
- From the Taskbar, right click the “Log Management Utility” icon, and se-
lect Exit Log Management Utility.
- Shut down or log off from the computer.
3
Log Management Utility3-5
Starting Log Management Utility
3
Log Management Utility3-6
Log Confirmation
4Log Confirmation
4.1Device Registration
Acquisition of device logs requires registration of target devices in Log Management Utility.
Two types of registration are possible. “Search and Register”, in which devices are searched for from within a specified network range and then these
are registered, and “Register from IP address”, in which the device IP address is specified and then the device registered.
If the target device has already been registered, then this operation is not
necessary. For details, please refer to “Receive Log from Device” on
page 4-7.
2
Note
Multiple devices can not be registered with the same address.
Log Management Utility is an application for administrators. As such, its
use requires that you know the device administrator password.
4
2
Note
Up to a maximum of 100 devices can be registered.
Specifying a device from PageScope Data Administrator and then starting Log Management Utility can register the specified device in Log Management Utility.
Log Management Utility4-1
Log Confirmation
4.1.1Search and Register
1Start Log Management Utility.
The main dialog box will be displayed.
2From the Setup menu, select Registration of Device.
The Device registration dialog box will be displayed.
3Click Search and Register.
– Click Register from IP address in order to specify the IP Address
and register the device. For details, please refer to “Register from
IP address” on page 4-4.
– Click Import from PageScope Data Administrator to import de-
vice information from PageScope Data Administrator, and to register the device. For details, please refer to “Import device
information from PageScope Data Administrator” on page 6-1.
4
Log Management Utility4-2
Loading...
+ 53 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.