bizhub C287/C227
Contents-1
Contents
1
Security
1.1
Introduction
.....................................................................................................................................
1-2
Administrators
....................................................................................................................................
1-2
Compliance with the ISO15408 Standard
.........................................................................................
1-2
Operating Precautions
.......................................................................................................................
1-2
INSTALLATION CHECKLIST
..............................................................................................................
1-4
1.2
Security Functions
..........................................................................................................................
1-7
Check Count Clear Conditions
..........................................................................................................
1-7
1.3
Precautions for Operation Control
................................................................................................
1-9
Roles of the Owner of the Machine
...................................................................................................
1-9
Roles and Requirements of the Administrator of the machine
..........................................................
1-9
Password Usage Requirements
........................................................................................................
1-9
External authentication server control requirements
.......................................................................
1-10
Security function operation setting operating requirements
............................................................
1-10
Operation and control of the machine
.............................................................................................
1-10
Machine Maintenance Control
.........................................................................................................
1-12
Precautions for using the printer driver
............................................................................................
1-12
1.4
Miscellaneous
................................................................................................................................
1-13
Password Rules
...............................................................................................................................
1-13
Precautions for Use of Various Types of Applications
.....................................................................
1-13
Encrypting communications
............................................................................................................
1-14
Print functions
..................................................................................................................................
1-14
IPP printing
......................................................................................................................................
1-14
Items of Data Cleared by Overwrite All Data Function
....................................................................
1-15
Fax functions
....................................................................................................................................
1-16
USB keyboard
..................................................................................................................................
1-16
Different types of boxes
...................................................................................................................
1-16
Hardware and software used in the machine
..................................................................................
1-16
Firmware integrity verification function
............................................................................................
1-17
IPsec setting
....................................................................................................................................
1-17
CS Remote Care function
................................................................................................................
1-17
Terminating a Session and Logging out
..........................................................................................
1-17
Authentication error during external server authentication
..............................................................
1-18
2
Administrator Operations
2.1
Accessing the Administrator Mode
...............................................................................................
2-2
2.1.1
Accessing the Administrator Mode
....................................................................................................
2-2
2.1.2
Accessing the User Mode
..................................................................................................................
2-8
2.2
Enhancing the Security Function
.................................................................................................
2-12
2.2.1
Items cleared by HDD Format
.........................................................................................................
2-14
2.2.2
Setting the Password Rules
.............................................................................................................
2-15
2.2.3
Setting the Enhanced Security Mode
..............................................................................................
2-17
2.3
Preventing Unauthorized Access
................................................................................................
2-20
Setting Prohibited Functions When Authentication Error
................................................................
2-20
2.4
Canceling the Operation Prohibited State
..................................................................................
2-22
Performing Release Setting
.............................................................................................................
2-22
2.5
Setting the Authentication Method
.............................................................................................
2-24
2.5.1
Setting the Authentication Method
..................................................................................................
2-24
2.5.2
Setting the External Server
..............................................................................................................
2-27
2.6
ID & Print Setting Function
...........................................................................................................
2-30
Setting ID & Print
..............................................................................................................................
2-30
2.7
System Auto Reset Function
.......................................................................................................
2-32
Setting the System Auto Reset function
..........................................................................................
2-32