80Security Menu10.2 Configure security10.3 User management10.4 User action log fileConfigure securityThis enables defining the users with their access level when the software starts for the first time. It ispossible to configure several parameters related to confidentiality. This requires a user access level 4.Note: Access rights are disabled by default.• Access rights: When enabled, it is required to log in as a registered user. Refer to Usermanagement on page 80 to access the menus. When disabled (default), all menu are access free,and the effect of leaving the text box blank in user login window is that there will be no name recordedfor the action in the log file.• Enter a maximum session time in minutes for improved confidentiality. The user is logged outautomatically when the set delay for inactivity is over.• User action logging: When enabled, every action from a logged on user is recorded in a user log filefor traceability.• Clear all user actions log file. Confirm to clear the log file. This functionality is aimed at clearing demoor test logs for example. The log file is a rolling buffer recording the past 100 actions.User managementThis window shows the list of registered users for the instrument. They are listed by name, ID, passwordand access level.Note: The "User password" must be at least 4 characters long.Pressing on an empty line, or pressing the Add button brings a window to add a new user. Name, ID,password and access level (from 1 to 4) must be entered.Pressing on a registered user line brings a window for editing or deleting the user data in the list.Note: The list can contain up to 99 usersUser action log fileEach time the user performs an important action, a record is written in the "User action log file". It is arolling buffer which contains the last 1000 user actions. The "User Interface" will allow viewing this log file(Menu Security / View log file). This log file contains the following data:• line number• the action name• the user name and ID• the current date and time.Note: Unsuccessful attempts to register are recorded in the log file without a user ID.