User's Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration
- Chapter 7 Network Settings- 7.1 Configuring Basic Settings
- 7.2 Configure Advanced Settings- 7.2.1 Configuring SNMP Settings
- 7.2.2 Configuring FTP Settings
- 7.2.3 Configuring Email Settings
- 7.2.4 Platform Access
- 7.2.5 Wireless Dial
- 7.2.6 HTTPS Settings
- 7.2.7 Configuring QoS Settings
- 7.2.8 Configuring 802.1X Settings
- 7.2.9 Integration Protocol
- 7.2.10 Bandwidth Adaptation
- 7.2.11 Network Service
- 7.2.12 Smooth Streaming
 
 
- Chapter 8 Video/Audio Settings
- Chapter 9 Image Settings
- Chapter 10 Event Settings- 10.1 Basic Events
- 10.2 Smart Events- 10.2.1 Configuring Audio Exception Detection
- 10.2.2 Configuring Defocus Detection
- 10.2.3 Configuring Scene Change Detection
- 10.2.4 Configuring Face Detection
- 10.2.5 Configuring Intrusion Detection
- 10.2.6 Configuring Line Crossing Detection
- 10.2.7 Configuring Region Entrance Detection
- 10.2.8 Configuring Region Exiting Detection
- 10.2.9 Configuring Unattended Baggage Detection
- 10.2.10 Configuring Object Removal Detection
 
- 10.3 VCA Configuration
 
- Chapter 11 Storage Settings
- Chapter 12 Playback
- Chapter 13 Picture
- Chapter 14 Application
- Appendix
Network Camera User Manual 
57 
  Security Audit Log 
Purpose: 
The  security  audit  logs  refer  to  the  security  operation  logs.  You  can  search  and 
analyze the security log files of the camera so that to find out the illegal intrusion and 
troubleshooting the security events. Security audit logs can be saved on device flash. 
The log will be saved every half hour after device booting. 
Due to limited  saving space of the  flash,  you can also save the  logs on a  log server. 
Configure the server settings at Advanced Settings. 
  Searching Logs 
Steps: 
1.  Enter  log  searching  interface:  Configuration  >  System  >  Maintenance  > 
Security Audit Log. 
 Security Audit Log Searching Interface 
2.  Set  the  log  search  conditions  to  specify  the  search,  including  the  Major  Type, 
Minor Type, Start Time and End Time. 
3.  Click  Search  to  search  log  files.  The  matched  log files will be displayed on the 
log list interface. 










