Konica Minolta bizhub C3850FS bizhub C3850FS/C3850/C3350 Utility Keys User Gui - Page 69

Enhanced Security Mode]

Page 69 highlights

5.10 [Security Settings] 5 Settings [Job Log] [Enable Settings] [Accounting Log] [Counting Log] [Audit Log] [Overwrite] [Erase Job Log] [Hide Personal Data] [Hide Activity Log] [Initialize] [Web browser contents access] Description Select whether or not to obtain log information for each job log type. Select whether or not to obtain a job log. [OFF] is specified by default. Select whether or not to obtain an accounting log. You can obtain information relevant to paper consumption for each user or account. [ON] is specified by default. Select whether or not to obtain a counting log. You can obtain information about paper consumption and the reduction rate of paper used for printing. [ON] is specified by default. Select whether or not to obtain an audit log. You can obtain user operation or job history. You can track unauthorized actions or the leakage of information. [ON] is specified by default. Select whether or not to allow a log to be overwritten by a new log when the hard disk becomes full. [Restrict] is specified by default. Erases job logs. On the [Job List] screen, select whether or not to hide personal information such as destinations or document names. [OFF] is specified by default. Select whether or not to hide activity logs on Scan to E-mail and Fax TX/RX. If [ON] is selected, [Log] does not appear on the [Job List] screen. [OFF] is specified by default. Select network settings, system settings, and all settings to carry out initialization. Select whether to allow an access to the Web page contents saved on the hard disk of this machine. This option is displayed when [Utility] - [Administrator Settings] - [Network Settings] - [Web Browser Setting] is enabled. For details, contact your service representative. [Allow] is specified by default. [Enhanced Security Mode] To display: [Utility] - [Administrator Settings] - [Security Settings] - [Enhanced Security Mode] Select whether or not to enable the Enhanced Security Mode. If you enable the Enhanced Security Mode, the various security functions are forcibly configured. This allows you to ensure higher-level security of data management. To enable the enhanced security mode, the following settings must have been configured. Setting items in Administrator Settings [Security Settings] - [Security Details] [Password Rules] [Security Settings] - [Administrator Password] [Security Settings] - [HDD Settings] [HDD Encryption Setting] Configuring User Authentication in Web Connection In Web Connection, register the certificate. Settings to forcibly changed Select [ON]. Set a password complying with password rules. Select [ON]. For details, refer to Chapter 2 "Configuring the Operating Environment of This Machine" in [User's Guide: Applied Functions]. For details, refer to Chapter 2 "Configuring the Operating Environment of This Machine" in [User's Guide: Applied Functions]. [Description of Utility Keys] 5-38

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78

[Description of Utility Keys]
5-38
5.10
[Security Settings]
5
[Enhanced Security Mode]
To display: [Utility] - [Administrator Settings] - [Security Settings] - [Enhanced Security Mode]
Select whether or not to enable the Enhanced Security Mode.
If you enable the Enhanced Security Mode, the various security functions are forcibly configured. This allows
you to ensure higher-level security of data management.
To enable the enhanced security mode, the following settings must have been configured.
[Job Log]
Select whether or not to obtain log information for each job log type.
[Enable Settings]
Select whether or not to obtain a job log.
[OFF] is specified by default.
[Accounting Log]
Select whether or not to obtain an accounting log. You can obtain information
relevant to paper consumption for each user or account.
[ON] is specified by default.
[Counting Log]
Select whether or not to obtain a counting log. You can obtain information
about paper consumption and the reduction rate of paper used for printing.
[ON] is specified by default.
[Audit Log]
Select whether or not to obtain an audit log. You can obtain user operation or
job history. You can track unauthorized actions or the leakage of information.
[ON] is specified by default.
[Overwrite]
Select whether or not to allow a log to be overwritten by a new log when the
hard disk becomes full.
[Restrict] is specified by default.
[Erase Job Log]
Erases job logs.
[Hide Personal Data]
On the [Job List] screen, select whether or not to hide personal information
such as destinations or document names.
[OFF] is specified by default.
[Hide Activity Log]
Select whether or not to hide activity logs on Scan to E-mail and Fax TX/RX.
If [ON] is selected, [Log] does not appear on the [Job List] screen.
[OFF] is specified by default.
[Initialize]
Select network settings, system settings, and all settings to carry out initializa-
tion.
[Web browser contents
access]
Select whether to allow an access to the Web page contents saved on the hard
disk of this machine.
This option is displayed when [Utility] - [Administrator Settings] - [Network Set-
tings] - [Web Browser Setting] is enabled.
For details, contact your service representative.
[Allow] is specified by default.
Settings
Description
Setting items in Administrator Set-
tings
Settings to forcibly changed
[Security Settings] - [Security Details] -
[Password Rules]
Select [ON].
[Security Settings] - [Administrator
Password]
Set a password complying with password rules.
[Security Settings] - [HDD Settings] -
[HDD Encryption Setting]
Select [ON].
Configuring User Authentication in
Web
Connection
For details, refer to Chapter 2 "Configuring the Operating En-
vironment of This Machine" in [User's Guide: Applied Func-
tions].
In
Web Connection
, register the certifi-
cate.
For details, refer to Chapter 2 "Configuring the Operating En-
vironment of This Machine" in [User's Guide: Applied Func-
tions].