Maintaining a log of operations is useful in analyzing the cause of
problems, such as confirming the operation performed before the error
is detected. Using the security feature, you can identify which users
logged into the system.
Copyright (C) 2025 Schneider Electric Japan Holdings Ltd. All Rights Reserved.
|BLUE 4.0 (Manual Version : 4.0.0.000)|
Feature Guide