User Manual

Table Of Contents
12.13.4 Security Audit Log
The security audit logs refer to the security operaon logs. You can search and analyze the security
log
les of the device so as to nd out the illegal intrusion and troubleshoot the security events.
Security audit logs can be saved on device internal storage. The log will be saved every half hour
aer device boong. Due to limited storage space, you can also save the logs on a log server.
Search Security Audit Logs
You can search and analyze the security log les of the device so as to nd out the illegal intrusion
and troubleshoot the security events.
Steps
Note
This funcon is only supported by certain camera models.
1. Go to Conguraon → System → Maintenance → Security Audit Log .
2. Select log types, Start Time, and End Time.
3. Click Search.
The log
les that match the search condions will be displayed on the Log List.
4. Oponal: Click Export to save the log les to your computer.
Set Log Server
The log server should support syslog (RFC 3164) over TLS.
Before You Start
Install client and CA cercates before conguraon. Refer to Cercate Management for
detailed informaon.
Select cercates according to the requirement of the log server. If two-way authencaon is
required, select the CA cercate and the client cercate. If one-way authencaon is
required, select the CA
cercate only.
Steps
1. Check Enable Log Upload Server.
2. Oponal: Check Enable Encrypted Transmission if you want the log data to be encrypted.
3. Input Log Server IP and Log Server Port.
4.
Oponal: Select client cercate.
5. Select CA cercate to the device.
6. Click Test to test the sengs.
7. Click Save.
Network Speed Dome & Posioning System User Manual
93