User Manual

Table Of Contents
3. Follow the prompt to input Country, Hostname/IP, Validity and other parameters.
4. Click Download to download the
cercate request and submit it to the trusted authority for
signature.
5. Import
cercate to the device.
-
Select Signed cercate is available, start the installaon directly. Click Browse and Install
to import the
cercate to the device.
-
Select Create the
cercate request rst and connue the installaon. Click Browse and
Install to import the cercate to the device.
6. Click Save.
11.12.4 Security Audit Log
The security audit logs refer to the security operaon logs. You can search and analyze the security
log les of the device so as to nd out the illegal intrusion and troubleshoot the security events.
Security audit logs can be saved on device internal storage. The log will be saved every half hour
aer device boong. Due to limited storage space, you can also save the logs on a log server.
Search Security Audit Logs
You can search and analyze the security log les of the device so as to nd out the illegal intrusion
and troubleshoot the security events.
Steps
Note
This funcon is only supported by certain camera models.
1. Go to Conguraon → System → Maintenance → Security Audit Log .
2. Select log types, Start Time, and End Time.
3. Click Search.
The log
les that match the search condions will be displayed on the Log List.
4. Oponal: Click Export to save the log les to your computer.
Set Log Server
The log server should support syslog (RFC 3164) over TLS.
Steps
1. Check Enable Log Upload Server.
2. Oponal: Check Enable Encrypted Transmission if you want the log data to be encrypted.
3. Input Log Server IP and Log Server Port.
4. Click Test to test the
sengs.
E Series Network Speed Dome User Manual
84