User's Manual

Table Of Contents
Note
Refer to the specic content of protocol to view authencaon requirements.
12.13.2 Security Audit Log
The security audit logs refer to the security operaon logs. You can search and analyze the security
log les of the device so as to nd out the illegal intrusion and troubleshoot the security events.
Security audit logs can be saved on device internal storage. The log will be saved every half hour
aer device boong. Due to limited storage space, you can also save the logs on a log server.
Search Security Audit Logs
You can search and analyze the security log les of the device so as to nd out the illegal intrusion
and troubleshoot the security events.
Steps
Note
This funcon is only supported by certain camera models.
1. Go to Conguraon → System → Maintenance → Security Audit Log .
2. Select log types, Start Time, and End Time.
3. Click Search.
The log
les that match the search condions will be displayed on the Log List.
4.
Oponal: Click Export to save the log les to your computer.
12.13.3 Set IP Address Filter
IP address lter is a tool for access control. You can enable the IP address lter to allow or forbid
the visits from the certain IP addresses.
IP address refers to IPv4.
Steps
1. Go to
Conguraon → System → Security → IP Address Filter .
2. Check Enable IP Address Filter.
3. Select the type of IP address lter.
Forbidden
IP addresses in the list cannot access the device.
Allowed Only IP addresses in the list can access the device.
4. Edit the IP address lter list.
Add
Add a new IP address to the list.
Thermal & Opcal Bi-spectrum Network Camera User Manual
70