User Manual

Network Camera User Manual
81
viewing live image) to the device via web browser within the set timeout period.
Go to Configuration System Security Advanced Security to complete settings.
9.14.7 Search Security Audit Logs
You can search and analyze the security log files of the device so as to find out the illegal intrusion
and troubleshoot the security events.
Steps
Note
This function is only supported by certain camera models.
1. Go to Configuration System Maintenance Security Audit Log.
2. Select log types, Start Time, and End Time.
3. Click Search.
The log files that match the search conditions will be displayed on the Log List.
4. Optional: Click Export to save the log files to your computer.
9.14.8 Security Reinforcement
Security reinforce is a solution to enhance network security. With the function enabled, risky
functions, protocols, ports of the device are disabled and more secured alternative functions,
protocols and ports are enabled.
Go to Configuration System Security Advanced Security. Check Security Reinforcement,
and click Save.
9.15 Certificate Management
It helps to manage the server/client certificates and CA certificate, and to send an alarm if the
certificates are close to expiry date, or are expired/abnormal.
9.15.1 Create Self-signed Certificate
Steps
1. Click Create Self-signed Certificate.
2. Follow the prompt to enter Certificate ID, Country, Hostname/IP, Validity and other
parameters.
Note
The certificate ID should be digits or letters and be no more than 64 characters.