- vi -
4.5.3
Security log file ..................................................................................................................................................... 4-26
4.5.4 Parameter log file ................................................................................................................................................. 4-27
4.6 Timing of data writing ................................................................................................................................................. 4-28
5. Ex.Sec Viewer – OPERATION – ......................................................................................... 5-1
5.1 Overview ...................................................................................................................................................................... 5-1
5.1.1 Introduction............................................................................................................................................................. 5-1
5.1.2 About Ex.Sec Viewer .............................................................................................................................................. 5-1
5.1.3 Recommended operating environment .................................................................................................................. 5-1
5.1.4 Installation .............................................................................................................................................................. 5-1
5.1.5 Uninstallation .......................................................................................................................................................... 5-3
5.1.6 About authentication-key ........................................................................................................................................ 5-4
5.2 Operation ..................................................................................................................................................................... 5-5
5.2.1 Start Ex.Sec Viewer ............................................................................................................................................... 5-5
5.2.2 Get record data to PC ............................................................................................................................................ 5-6
5.2.3 Check and sign the recorded data .......................................................................................................................... 5-9
5.2.4 Check and print the audit trail (security log) ......................................................................................................... 5-13
5.2.5 Printing signed record data................................................................................................................................... 5-15
5.2.6 Register and edit batch information of recorded data ........................................................................................... 5-19
5.2.7 Migrate the signed record data to another PC ...................................................................................................... 5-20
5.3 Setting/Display ........................................................................................................................................................... 5-22
5.3.1 Basic display ........................................................................................................................................................ 5-22
5.3.2 Extended security data list display ....................................................................................................................... 5-23
5.3.3 Login authentication ............................................................................................................................................. 5-31
5.3.4 Trend display ........................................................................................................................................................ 5-32
5.3.5 Signature .............................................................................................................................................................. 5-33
5.3.6 Security log display .............................................................................................................................................. 5-35
5.3.7 Display and operation in each state of the recorded data .................................................................................... 5-36
5.4 Menu .......................................................................................................................................................................... 5-38
5.4.1 File ....................................................................................................................................................................... 5-39
5.4.2 View ..................................................................................................................................................................... 5-39
5.4.3 Zoom .................................................................................................................................................................... 5-40
5.4.4 Event/Comment .................................................................................................................................................... 5-40
5.4.5 Extended security ................................................................................................................................................. 5-40
5.4.6 Language ............................................................................................................................................................. 5-41
5.4.7 Window ................................................................................................................................................................ 5-41
5.4.8 Help ...................................................................................................................................................................... 5-41
5.5 Toolbar ....................................................................................................................................................................... 5-42
6. Ex.Sec Viewer – CONTROL – ............................................................................................. 6-1
6.1 Basic Layout of Trend Window .................................................................................................................................... 6-1
6.1.1 Screen Layout ........................................................................................................................................................ 6-1
6.1.2 Trend area .............................................................................................................................................................. 6-2
6.1.3 Instant Value area .................................................................................................................................................. 6-7
6.1.4 Event Summary area .............................................................................................................................................. 6-8
6.2 Operate the trend screen ............................................................................................................................................. 6-9
6.2.1 View ....................................................................................................................................................................... 6-9
6.2.2 Zoom .................................................................................................................................................................... 6-11