- vi -
4.5.3 Security log file ..................................................................................................................................................... 4-26
4.5.4 Parameter log file ................................................................................................................................................. 4-27
4.6 Timing of data writing ................................................................................................................................................. 4-28
5. Ex.Sec Viewer – OPERATION – ......................................................................................... 5-1
5.1 Overview ...................................................................................................................................................................... 5-1
5.1.1 Introduction............................................................................................................................................................. 5-1
5.1.2 About Ex.Sec Viewer .............................................................................................................................................. 5-1
5.1.3 Recommended operating environment .................................................................................................................. 5-1
5.1.4 Installation .............................................................................................................................................................. 5-1
5.1.5 Uninstallation .......................................................................................................................................................... 5-3
5.1.6 About authentication-key ........................................................................................................................................ 5-4
5.2 Operation ..................................................................................................................................................................... 5-5
5.2.1 Start Ex.Sec Viewer ............................................................................................................................................... 5-5
5.2.2 Get record data to PC ............................................................................................................................................ 5-6
5.2.3 Check and sign the recorded data .......................................................................................................................... 5-9
5.2.4 Check and print the audit trail (security log) ......................................................................................................... 5-13
5.2.5 Printing signed record data................................................................................................................................... 5-15
5.2.6 Display and print the report (It supports since Ver.2.10) .......................................................................................... 5-19
5.2.7 Display and print the Max. /Min. /Ave. for a specified period (For Ver. 2.10 or later) ..................................... 5-22
5.2.8 Register and edit batch information of recorded data ........................................................................................... 5-24
5.2.9 Migrate the signed record data to another PC ...................................................................................................... 5-25
5.3 Setting/Display ........................................................................................................................................................... 5-27
5.3.1 Basic display ........................................................................................................................................................ 5-27
5.3.2 Extended security data list display ....................................................................................................................... 5-28
5.3.3 Login authentication ............................................................................................................................................. 5-36
5.3.4 Trend display ........................................................................................................................................................ 5-37
5.3.5 Signature .............................................................................................................................................................. 5-38
5.3.6 Security log display .............................................................................................................................................. 5-40
5.3.7 Display and operation in each state of the recorded data .................................................................................... 5-41
5.4 Menu .......................................................................................................................................................................... 5-43
5.4.1 File ....................................................................................................................................................................... 5-44
5.4.2 View ..................................................................................................................................................................... 5-44
5.4.3 Zoom .................................................................................................................................................................... 5-45
5.4.4 Event/Comment .................................................................................................................................................... 5-45
5.4.5 Extended security ................................................................................................................................................. 5-45
5.4.6 Language ............................................................................................................................................................. 5-46
5.4.7 Window ................................................................................................................................................................ 5-46
5.4.8 Help ...................................................................................................................................................................... 5-46
5.5 Toolbar ....................................................................................................................................................................... 5-47
6. Ex.Sec Viewer – CONTROL – ............................................................................................... 6-1
6.1 Basic Layout of Trend Window ....................................................................................................................................... 6-1
6.1.1 Screen Layout .......................................................................................................................................................... 6-1
6.1.2 Trend area ................................................................................................................................................................ 6-2
6.1.3 Instant Value area ..................................................................................................................................................... 6-7
6.1.4 Event Summary area ................................................................................................................................................. 6-8
6.2 Operate the trend screen .................................................................................................................................................. 6-9