Operations of the client (CT) users will be saved on the server as various logs. The system administrator or department administrator confirms operation content of CT users as daily operations via the log viewer.
Special processing is not required when the user operates in accordance with operation guidelines. However, it is required to investigate what client (CT) users want to do and whether these operations may result in possibilities of information leakage when any operation suspected to violate operation guidelines or misoperation is detected.
The file names left in the log can be used to trace file operation by the user or search the information of the CT that performed the misoperation.
If it is required to review policies according to investigation results, the policy corresponding to the client (CT) and user should be modified. Thus, violation can be prevented from happening again and system operation will protect internal information more safely.