Konica Minolta bizhub PRESS C71hc bizhub PRESS C1070/C1070P/C1060/C71hc/bizhub - Page 3

Contents, Introduction, Security Functions, Index

Page 3 highlights

Contents 1 Introduction 1.1 1.1.1 1.2 1.2.1 Welcome ...1-2 Composition and Usage of this Guide 1-2 Conventions Used in This Guide 1-3 Symbols Used in This Guide...1-3 2 Security Functions 2.1 2.1.1 2.1.2 2.1.3 2.1.4 2.1.5 2.1.6 2.2 2.2.1 2.2.2 2.2.3 2.2.4 2.2.5 2.2.6 2.3 2.3.1 2.3.2 2.3.3 2.3.4 Security Functions ...2-2 Security Mode...2-2 Environment ...2-3 Description of Enhanced Security Mode 2-3 Data Protected by the Enhanced Security Mode 2-5 Protecting and Deleting of Remaining Data After Being Used 2-5 Quick Security Setting ...2-6 Administrator Security Functions 2-8 Turning the Enhanced Security Mode ON/OFF 2-8 HDD Lock Password...2-11 Deleting Temporary Data ...2-15 Deleting All Data...2-18 Outputting Audit Log...2-21 Analyzing Audit Log ...2-24 User Authentication in Enhanced Security Mode 2-27 Adding User Registration ...2-27 Changing User Registration ...2-35 Deleting User Data ...2-43 Changing Password by User ...2-46 3 Index 3.1 Index by item ...3-2 3.2 Index by button...3-3 bizhub PRESS C1070/C1070P/C1060/C71hc, bizhub PRO C1060L Contents-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68

bizhub PRESS C1070/C1070P/C1060/C71hc, bizhub PRO C1060L
Contents-1
Contents
1
Introduction
1.1
Welcome
..........................................................................................................................................
1-2
1.1.1
Composition and Usage of this Guide
...............................................................................................
1-2
1.2
Conventions Used in This Guide
...................................................................................................
1-3
1.2.1
Symbols Used in This Guide
..............................................................................................................
1-3
2
Security Functions
2.1
Security Functions
..........................................................................................................................
2-2
2.1.1
Security Mode
....................................................................................................................................
2-2
2.1.2
Environment
.......................................................................................................................................
2-3
2.1.3
Description of Enhanced Security Mode
...........................................................................................
2-3
2.1.4
Data Protected by the Enhanced Security Mode
..............................................................................
2-5
2.1.5
Protecting and Deleting of Remaining Data After Being Used
..........................................................
2-5
2.1.6
Quick Security Setting
.......................................................................................................................
2-6
2.2
Administrator Security Functions
..................................................................................................
2-8
2.2.1
Turning the Enhanced Security Mode ON/OFF
.................................................................................
2-8
2.2.2
HDD Lock Password
........................................................................................................................
2-11
2.2.3
Deleting Temporary Data
.................................................................................................................
2-15
2.2.4
Deleting All Data
...............................................................................................................................
2-18
2.2.5
Outputting Audit Log
........................................................................................................................
2-21
2.2.6
Analyzing Audit Log
.........................................................................................................................
2-24
2.3
User Authentication in Enhanced Security Mode
......................................................................
2-27
2.3.1
Adding User Registration
.................................................................................................................
2-27
2.3.2
Changing User Registration
.............................................................................................................
2-35
2.3.3
Deleting User Data
...........................................................................................................................
2-43
2.3.4
Changing Password by User
...........................................................................................................
2-46
3
Index
3.1
Index by item
...................................................................................................................................
3-2
3.2
Index by button
................................................................................................................................
3-3