bizhub PRESS C1070/C1070P/C1060/C71hc, bizhub PRO C1060L
Contents-1
Contents
1
Introduction
1.1
Welcome
..........................................................................................................................................
1-2
1.1.1
Composition and Usage of this Guide
...............................................................................................
1-2
1.2
Conventions Used in This Guide
...................................................................................................
1-3
1.2.1
Symbols Used in This Guide
..............................................................................................................
1-3
2
Security Functions
2.1
Security Functions
..........................................................................................................................
2-2
2.1.1
Security Mode
....................................................................................................................................
2-2
2.1.2
Environment
.......................................................................................................................................
2-3
2.1.3
Description of Enhanced Security Mode
...........................................................................................
2-3
2.1.4
Data Protected by the Enhanced Security Mode
..............................................................................
2-5
2.1.5
Protecting and Deleting of Remaining Data After Being Used
..........................................................
2-5
2.1.6
Quick Security Setting
.......................................................................................................................
2-6
2.2
Administrator Security Functions
..................................................................................................
2-8
2.2.1
Turning the Enhanced Security Mode ON/OFF
.................................................................................
2-8
2.2.2
HDD Lock Password
........................................................................................................................
2-11
2.2.3
Deleting Temporary Data
.................................................................................................................
2-15
2.2.4
Deleting All Data
...............................................................................................................................
2-18
2.2.5
Outputting Audit Log
........................................................................................................................
2-21
2.2.6
Analyzing Audit Log
.........................................................................................................................
2-24
2.3
User Authentication in Enhanced Security Mode
......................................................................
2-27
2.3.1
Adding User Registration
.................................................................................................................
2-27
2.3.2
Changing User Registration
.............................................................................................................
2-35
2.3.3
Deleting User Data
...........................................................................................................................
2-43
2.3.4
Changing Password by User
...........................................................................................................
2-46
3
Index
3.1
Index by item
...................................................................................................................................
3-2
3.2
Index by button
................................................................................................................................
3-3