Loading ...
Loading ...
Loading ...
![](https://files.manualsfile.com/60794658-hm-td5528t-10-w/bg81.png)
device supports digest or basic authentication. If you select digest, the device only
supports digest authentication.
Note
Refer to the specic content of protocol to view authentication requirements.
15.16.2 Security Audit Log
The security audit logs refer to the security operation logs. You can search and analyze the
security log les of the device so as to nd out the illegal intrusion and troubleshoot the
security events.
Security audit logs can be saved on device internal storage. The log will be saved every
half hour after device booting. Due to limited storage space, you can also save the logs on
a log server.
Search Security Audit Logs
You can search and analyze the security log les of the device so as to nd out the illegal
intrusion and troubleshoot the security events.
Steps
Note
This function is only supported by certain camera models.
1.
Go to Conguration > System > Maintenance > Security Audit Log .
2.
Select log types, Start Time, and End Time.
3.
Click Search.
The log les that match the search conditions will be displayed on the Log List.
4.
Optional: Click Export to save the log les to your computer.
Set Log Server
The log server should support syslog (RFC 3164) over TLS.
Before You Start
●
Install client and CA certicates before conguration. Refer to
Certicate Management
for detailed information.
●
Select certicates according to the requirement of the log server. If two-way
authentication is required, select the CA certicate and the client certicate. If one-way
authentication is required, select the CA certicate only.
Thermal & Optical Bi-spectrum PTZ Network Camera User Manual
112
Loading ...
Loading ...
Loading ...