Konica Minolta bizhub C280 Product Guide - Page 177

Network Security

Page 177 highlights

bizhub C360/C280/C220 Security Network Security NETWORK AUTHENTICATION The Network Authentication function uses the Active Directory service, Novell's directory system or NTLM to permit or restrict access to the C360/C280/C220 through the network. NTLM version 1 and NLM version 2 are supported. SMTP AUTHENTICATION FOR EMAIL DISTRIBUTION The C360/C280/C220 supports SMTP Authentication when using Scan-to-Email. This function strengthens protection against spamming and computer viruses by letting you use an Email server equipped with an authentication function. To prevent improper use of the Email Server when sending mail, users must enter both an ID number and a password. SCAN ENCRYPTION SSL Encryption protects scanned data over a TCP socket. PDF files scanned at the MFP can be encrypted. Scanned files are encoded in such a way that only those with the Key (password) can decode the message. With an "embedded" scan encryption function, users are able to perform the encryption directly at the desktop. There is no need to scan it, file it electronically, retrieve it using an application such as Adobe Acrobat, apply the encryption and then electronically distribute the encrypted file. All these steps can be eliminated and yet you are still allowed the encryption level and permissions available to you in Adobe Acrobat. The user does not need to sacrifice any type of functionality or security by performing the scan encryption at the device. 173

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

bizhub C360
/
C280
/
C220
Security
173
Network Security
NETWORK AUTHENTICATION
The Network Authentication function uses the Active Directory service, Novell’s
directory system or NTLM to permit or restrict access to the C360/C280/C220
through the network. NTLM version 1 and NLM version 2 are supported.
SMTP AUTHENTICATION FOR EMAIL DISTRIBUTION
The C360/C280/C220 supports SMTP Authentication when using Scan-to-Email.
This function strengthens protection against spamming and computer viruses
by letting you use an Email server equipped with an authentication function.
To prevent improper use of the Email Server when sending mail, users must
enter both an ID number and a password.
SCAN ENCRYPTION
SSL Encryption protects scanned data over a TCP socket. PDF files scanned
at the MFP can be encrypted. Scanned files are encoded in such a way that
only those with the Key (password) can decode the message.
With an “embedded” scan encryption function, users are able to perform the
encryption directly at the desktop. There is no need to scan it, file it electronically,
retrieve it using an application such as Adobe Acrobat, apply the encryption and
then electronically distribute the encrypted file. All these steps can be eliminated
and yet you are still allowed the encryption level and permissions available to you
in Adobe Acrobat. The user does not need to sacrifice any type of functionality
or security by performing the scan encryption at the device.