HP XP7 Audit Log User and Reference Guide (H6F56-96001)

Table Of Contents
=[{3E2332580B110E052D13C378866427A218EF1609881BC058FCBCF79FCD
7727C7,2013/07/06 09:20:37,BACK0706,Normal end,-}],
Num. of Keys=1
Detailed Information
DescriptionItem
The UUID of the encryption key to be backed up on the key management serverUUID
The date and time entered into the backup information when an encryption key is backed up
on the key management server
Backup Date
The description set in the backup information when an encryption key is backed up on the key
management server
Description
The result of the operationResult
Normal end: Normal end, Error(xxxx-yyyyy): Abnormal end
The return value from the key management serverServer_Reply
A hyphen (-) is displayed unless an error occurred while processing.
For details on return values, see the manuals for each key management server.
The number of encryption keys to be backed upNum. of Keys
[ENC] Change CEK Status
This information is output to the audit log information file 2, and it is asynchronous with the Remote
Web Console operations.
Example
08xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,,<system>,,,[ENC],
Change CEK Status,,Normal end,,,Seq.=xxxxxxxxxx
+0000010200000000 0000000000000000
+0123456789ABCDEF 0123456789ABCDEF 0123456789ABCDEF,(snip)
Detailed Information
DescriptionItem
Indicates the 16 byte parameter added in the storage system and the number of the encryption
key that is a target of the event in binary format
Command parameter
[ENC] Change DEK Status
This information is output to the audit log information file 2, and it is asynchronous with the Remote
Web Console operations.
Example
08xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,,<system>,,,[ENC],
Change DEK Status,,Normal end,,,Seq.=xxxxxxxxxx
+0000010200000000 0000000000000000
+0123456789ABCDEF 0123456789ABCDEF 0123456789ABCDEF,(snip)
Detailed Information
DescriptionItem
Indicates the 16 byte parameter added in the storage system and the number of the encryption
key that is a target of the event in binary format
Command parameter
220 Audit log examples for encryption key operations