bizhub PRESS C1070/C1070P/C1060, bizhub PRO C1060L
Contents-1
Contents
1
Introduction
1.1
Welcome
..........................................................................................................................................
1-2
1.1.1
Composition and Usage of this Guide
...............................................................................................
1-2
1.2
Conventions Used in This Guide
...................................................................................................
1-3
1.2.1
Symbols Used in This Guide
..............................................................................................................
1-3
1.2.2
Original and Paper Indications
...........................................................................................................
1-4
2
Security Functions
2.1
Control Software
.............................................................................................................................
2-2
2.1.1
Control Software Version
...................................................................................................................
2-2
2.1.2
About the ROM Version Display Function
.........................................................................................
2-2
2.2
Security Functions
..........................................................................................................................
2-3
2.2.1
Security Mode
....................................................................................................................................
2-3
2.2.2
Environment
.......................................................................................................................................
2-3
2.2.3
Description of Enhanced Security Mode
...........................................................................................
2-4
2.2.4
Data Protected by the Enhanced Security Mode
..............................................................................
2-5
2.2.5
Protecting and Deleting of Remaining Data After Being Used
..........................................................
2-6
2.3
Administrator Security Functions
..................................................................................................
2-7
2.3.1
Turning the Enhanced Security Mode ON/OFF
.................................................................................
2-7
2.3.2
HDD Lock Password
........................................................................................................................
2-10
2.3.3
Deleting Temporary Data
.................................................................................................................
2-14
2.3.4
Deleting All Data
...............................................................................................................................
2-17
2.3.5
Outputting Audit Log
........................................................................................................................
2-20
2.3.6
Analyzing Audit Log
.........................................................................................................................
2-23
2.4
User Authentication in Enhanced Security Mode
......................................................................
2-26
2.4.1
Adding User Registration
.................................................................................................................
2-26
2.4.2
Changing User Registration
.............................................................................................................
2-34
2.4.3
Deleting User Data
...........................................................................................................................
2-42
2.4.4
Changing Password by User
...........................................................................................................
2-45
3
Index
3.1
Index by item
...................................................................................................................................
3-2
3.2
Index by button
................................................................................................................................
3-3