ATM_ID: B1531554-53A2-11EA-9805-9BD3993DCDB4 MFF: PLANNEDTIMESTAFF: ID: WFAST_Accounting/Testcases/FS_50.001.01_Audit_Log_Events/10540 TESTCASE_HEADLINE: Event ID=92 The audit log entry data shall report events contained in table 1 Audit Log - Scan2Mailbox Folder Password Change Event ID = 92 UserName (managing passwords) Device name Device serial number Folder Name Completion Status (Password was Changed)\ NOTE: Custom Scan2mailbox folders must be created ahead of time before following with this test case. GROUP: FEATURE: SUB_FEATURE: INPUT:

Audit Log:
\ Note: Test procedure should be performed through admin user only.

Audit Log must be enabled.
Scan to Mailbox feature is enabled.
Scan policy Require password when creating additional foldersis checked
Custom Scan to Mailbox folders are created.
Create a private folder with a folder name and a password.

Syslog:
Syslog Destination Server details must be configured..

PROCEDURE:

 Passcode Changed on a custom Scan2Mailbox Folder:

1.) In EWS --Navigate to Scan tab--
a. Select the created private folder by entering password .
b. Now click Modify folderbutton .
c. Enter the old password--Change folder password--Confirm folder password--Click Save passwordbutton.
2.) Save the audit log and view the recorded events. .
3.) Validate the audit log has an event for Scan2Mailbox Folder Password Change.
4.) Validate the Scan2Mailbox Folder Password Change event contains the correct event ID; event description and the correct event data.
5.) Validate the Scan2Mailbox Folder Password Change event entry data contains User Name; Device Name; Device Serial number; Folder Name and "Password was Changed" for Completion Status.

OUTPUT:

The audit log has an event for a Scan2Mailbox Folder Password Change.
Event ID=92
Scan to Mailbox Folder Password
User Name (managing passwords)
Device Name
Device Serial Number
Folder Name
Completion Status (Password was Changed)

Sys log Verfication using View Events option:

Syslog+CEF format shoud be displayed as per the Spec (Refer SIEM Integration and Audit Log Events Spec):

PRI number; Timestamp; Device name; CEF:0; Xerox; Device Model; Device Software Version; Device Audit log Event ID; Audti log Event Description; Severity)along with CEF Key Name Mapping.

PROCESS: PRIORITY: TEST_TYPE: automated LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: testcases TESTCASE_SOURCE: SPEC: FS 50.001 Audit Log Events SPEC_VERSION: 66 SPEC_TAG: [50.001.01.097] (FT-26374) [D2.0-*][+Te,Ju,+L2,Ra,+Nw][-PO] ATM_OWNER: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: canyon, carroll, corvo, corrib, kiska, malawi, mystic, melody, muckross TESTCASE_APPROVALS: CDATE: 1582176881 MDATE: 1582176881 MUSER: q4BVX0J1 AUTHOR: q4BVX0J1 ATM_MCOMMENTS: Imported from spreadsheet HISTORY: ATM_LOCKED: ATM_REQLINK: 435934DC-97F7-11E9-9925-CFADAA3FCFED ATM_REQCOUNT: 1 QA_TEAM: TC_WEIGHTAGE: FILENAME: FILEDESC: FILES: RELEASE: AUTOMATION_GROUP: TC_WORK_LOCATION_CAT: work_from_home_tc DEVICE_CATEGORY: mfp CONSTRAINTS_DAR: Imp_98 . NA Done By Previous Analysis COMPETENCY: wfast_accounting APTEST_TRACKING: yes COMPLEXITY_OUTPUT_VALIDATION: non_outliers AUTOMATION_CANDIDATE: yes AUTOMATABLE: yes SRT_ANALYZATION: analyzed