C650
x-1
Contents
Contents
1
Security
1.1
Introduction
............................................................................................................................................
1-2
Compliance with the ISO15408 Standard
...............................................................................................
1-2
Operating Precautions
.............................................................................................................................
1-2
INSTALLATION CHECKLIST
....................................................................................................................
1-3
1.2
Security Functions
.................................................................................................................................
1-4
1.2.1
Check Count Clear Conditions
................................................................................................................
1-4
1.3
Data to be Protected
.............................................................................................................................
1-5
1.4
Precautions for Operation Control
.......................................................................................................
1-6
Roles and Requirements of the Administrator
.........................................................................................
1-6
Password Usage Requirements
..............................................................................................................
1-6
Network Connection Requirements for the Machine
...............................................................................
1-7
User information control server control requirements
.............................................................................
1-7
Security function operation setting operating requirements
....................................................................
1-7
Operation and control of the machine
.....................................................................................................
1-7
Machine Maintenance Control
.................................................................................................................
1-7
1.5
Miscellaneous
.........................................................................................................................................
1-8
Password Rules
.......................................................................................................................................
1-8
Precautions for Use of Various Types of Applications
.............................................................................
1-8
Encrypting communications
....................................................................................................................
1-8
IPP printing
..............................................................................................................................................
1-9
Types of Data Cleared by Overwrite All Data Function
.........................................................................
1-10
2
Administrator Operations
2.1
Accessing the Administrator Settings
.................................................................................................
2-2
2.1.1
Accessing the Administrator Settings
......................................................................................................
2-2
<From the Control Panel>
........................................................................................................................
2-3
2.1.2
Accessing the User Mode
........................................................................................................................
2-5
<From the Control Panel>
........................................................................................................................
2-5
<From PageScope Web Connection>
.....................................................................................................
2-7
2.2
Enhancing the Security Function
..........................................................................................................
2-9
2.2.1
Items cleared by HDD Format
...............................................................................................................
2-10
2.2.2
Setting the Enhanced Security Mode
....................................................................................................
2-11
<Setting can be made only from the control panel>
.............................................................................
2-11
2.3
Preventing Unauthorized Access
.......................................................................................................
2-14
2.3.1
Setting Prohibited Functions When Authentication Error
......................................................................
2-14
<Setting can be made only from the control panel>
.............................................................................
2-15
2.4
Canceling the Operation Prohibited State
.........................................................................................
2-17
2.4.1
Performing Release Setting
...................................................................................................................
2-17
<Setting can be made only from the control panel>
.............................................................................
2-17
2.5
Setting the Authentication Method
....................................................................................................
2-19
2.5.1
Setting the Authentication Method
........................................................................................................
2-19
<Setting can be made only from the control panel>
.............................................................................
2-19
2.5.2
Setting the External Server
....................................................................................................................
2-22
<Setting can be made only from the control panel>
.............................................................................
2-22
2.6
System Auto Reset Function
..............................................................................................................
2-24
2.6.1
Setting the System Auto Reset function
................................................................................................
2-24
<Setting can be made only from the control panel>
.............................................................................
2-24
2.7
User Setting Function
..........................................................................................................................
2-26
2.7.1
Making user setting
................................................................................................................................
2-27
<From the Control Panel>
......................................................................................................................
2-27
<From PageScope Web Connection>
...................................................................................................
2-32
2.8
Account Track Setting Function
.........................................................................................................
2-34