Konica Minolta bizhub PRO C1060L bizhub PRESS C1070/C1070P/C1060/bizhub PRO C1 - Page 3

Contents

Page 3 highlights

Contents 1 Introduction 1.1 1.1.1 1.2 1.2.1 1.2.2 Welcome ...1-2 Composition and Usage of this Guide 1-2 Conventions Used in This Guide 1-3 Symbols Used in This Guide...1-3 Original and Paper Indications...1-4 2 Security Functions 2.1 2.1.1 2.1.2 2.2 2.2.1 2.2.2 2.2.3 2.2.4 2.2.5 2.3 2.3.1 2.3.2 2.3.3 2.3.4 2.3.5 2.3.6 2.4 2.4.1 2.4.2 2.4.3 2.4.4 Control Software ...2-2 Control Software Version ...2-2 About the ROM Version Display Function 2-2 Security Functions ...2-3 Security Mode...2-3 Environment ...2-3 Description of Enhanced Security Mode 2-4 Data Protected by the Enhanced Security Mode 2-5 Protecting and Deleting of Remaining Data After Being Used 2-6 Administrator Security Functions 2-7 Turning the Enhanced Security Mode ON/OFF 2-7 HDD Lock Password...2-10 Deleting Temporary Data ...2-14 Deleting All Data...2-17 Outputting Audit Log...2-20 Analyzing Audit Log ...2-23 User Authentication in Enhanced Security Mode 2-26 Adding User Registration ...2-26 Changing User Registration ...2-34 Deleting User Data ...2-42 Changing Password by User ...2-45 3 Index 3.1 Index by item ...3-2 3.2 Index by button...3-3 bizhub PRESS C1070/C1070P/C1060, bizhub PRO C1060L Contents-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68

bizhub PRESS C1070/C1070P/C1060, bizhub PRO C1060L
Contents-1
Contents
1
Introduction
1.1
Welcome
..........................................................................................................................................
1-2
1.1.1
Composition and Usage of this Guide
...............................................................................................
1-2
1.2
Conventions Used in This Guide
...................................................................................................
1-3
1.2.1
Symbols Used in This Guide
..............................................................................................................
1-3
1.2.2
Original and Paper Indications
...........................................................................................................
1-4
2
Security Functions
2.1
Control Software
.............................................................................................................................
2-2
2.1.1
Control Software Version
...................................................................................................................
2-2
2.1.2
About the ROM Version Display Function
.........................................................................................
2-2
2.2
Security Functions
..........................................................................................................................
2-3
2.2.1
Security Mode
....................................................................................................................................
2-3
2.2.2
Environment
.......................................................................................................................................
2-3
2.2.3
Description of Enhanced Security Mode
...........................................................................................
2-4
2.2.4
Data Protected by the Enhanced Security Mode
..............................................................................
2-5
2.2.5
Protecting and Deleting of Remaining Data After Being Used
..........................................................
2-6
2.3
Administrator Security Functions
..................................................................................................
2-7
2.3.1
Turning the Enhanced Security Mode ON/OFF
.................................................................................
2-7
2.3.2
HDD Lock Password
........................................................................................................................
2-10
2.3.3
Deleting Temporary Data
.................................................................................................................
2-14
2.3.4
Deleting All Data
...............................................................................................................................
2-17
2.3.5
Outputting Audit Log
........................................................................................................................
2-20
2.3.6
Analyzing Audit Log
.........................................................................................................................
2-23
2.4
User Authentication in Enhanced Security Mode
......................................................................
2-26
2.4.1
Adding User Registration
.................................................................................................................
2-26
2.4.2
Changing User Registration
.............................................................................................................
2-34
2.4.3
Deleting User Data
...........................................................................................................................
2-42
2.4.4
Changing Password by User
...........................................................................................................
2-45
3
Index
3.1
Index by item
...................................................................................................................................
3-2
3.2
Index by button
................................................................................................................................
3-3