Konica Minolta bizhub C35 bizhub C35 Security Operations User Guide - Page 9

Precautions for Operation Control

Page 9 highlights

1.4 Precautions for Operation Control 1 1.4 Precautions for Operation Control This machine and the data handled by this machine should be used in an office environment that meets the following conditions. Roles and Requirements of the Administrator The Administrator should take full responsibility for controlling the machine, thereby ensuring that no improper operations are performed. - A single individual person who is capable of taking full responsibility for controlling the machine should be appointed as the Administrator to make sure that no improper operations are performed. - When using an SMTP server (mail server) or an DNS server, each server should be appropriately man- aged by the Administrator and should be periodically checked to confirm that settings have not been changed without permission. Password Usage Requirements The Administrator must control the Administrator Password, auth-password, and priv-password appropriately so that they may not be leaked. These passwords should not be ones that can be easily guessed. The user, on the other hand, should control the Secured Job Password and User Password appropriately so that they may not be leaked. Again, these passwords should not be ones that can be easily guessed. - Make absolutely sure that only the Administrator knows the Administrator Password, auth-password, and priv-password. - The Administrator must change the Administrator Password, auth-password, and priv-password at regular intervals. - The Administrator should make sure that any number that can easily be guessed from birthdays, em- ployee identification numbers, and the like is not set for the Administrator Password, auth-password, and priv-password. - If a User Password has been changed, the Administrator should have the corresponding user change the password as soon as possible. - If the Administrator Password has been changed by the Service Engineer, the Administrator should change the Administrator Password as soon as possible. - The Administrator should have users ensure that the passwords set for the User Authentication and Secured Job are known only by the user concerned. - The Administrator should have users change the passwords set for the User Authentication at regular intervals. - The Administrator should make sure that any user does not set any number that can easily be guessed from birthdays, employee identification numbers, and the like for the passwords set for the User Authentication and Secured Job. - Upon change of the Administrators, the old Administrator of the machine should promptly have the new one change the Administrator password. Network Connection Requirements for the Machine If the LAN is to be connected to an outside network, no unauthorized attempt to establish connection from the external network should be permitted. - If the LAN, in which the machine is installed, is connected to an outside network, install a firewall or similar network device to block any access to the machine from the outside network and make the necessary settings. - Provide an appropriate network control at all times to make sure that no other copying machine is connected without prior notice to the office LAN to which this machine is connected. User information control system control requirements The administrator of the machine and the server administrator are required to apply patches to, or perform account control for, this machine and the user information control system connected to the office LAN in which the machine is installed to ensure operation control that achieves appropriate access control. bizhub C35 1-6

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94

bizhub C35
1-6
1.4
Precautions for Operation Control
1
1.4
Precautions for Operation Control
This machine and the data handled by this machine should be used in an office environment that meets the
following conditions.
Roles and Requirements of the Administrator
The Administrator should take full responsibility for controlling the machine, thereby ensuring that no improp-
er operations are performed.
<To Achieve Effective Security>
-
A single individual person who is capable of taking full responsibility for controlling the machine should
be appointed as the Administrator to make sure that no improper operations are performed.
-
When using an SMTP server (mail server) or an DNS server, each server should be appropriately man-
aged by the Administrator and should be periodically checked to confirm that settings have not been
changed without permission.
Password Usage Requirements
The Administrator must control the Administrator Password, auth-password, and priv-password appropriate-
ly so that they may not be leaked. These passwords should not be ones that can be easily guessed. The user,
on the other hand, should control the Secured Job Password and User Password appropriately so that they
may not be leaked. Again, these passwords should not be ones that can be easily guessed.
<To Achieve Effective Security>
-
Make absolutely sure that only the Administrator knows the Administrator Password, auth-password,
and priv-password.
-
The Administrator must change the Administrator Password, auth-password, and priv-password at
regular intervals.
-
The Administrator should make sure that any number that can easily be guessed from birthdays, em-
ployee identification numbers, and the like is not set for the Administrator Password, auth-password,
and priv-password.
-
If a User Password has been changed, the Administrator should have the corresponding user change
the password as soon as possible.
-
If the Administrator Password has been changed by the Service Engineer, the Administrator should
change the Administrator Password as soon as possible.
-
The Administrator should have users ensure that the passwords set for the User Authentication and Se-
cured Job are known only by the user concerned.
-
The Administrator should have users change the passwords set for the User Authentication at regular
intervals.
-
The Administrator should make sure that any user does not set any number that can easily be guessed
from birthdays, employee identification numbers, and the like for the passwords set for the User Au-
thentication and Secured Job.
-
Upon change of the Administrators, the old Administrator of the machine should promptly have the new
one change the Administrator password.
Network Connection Requirements for the Machine
If the LAN is to be connected to an outside network, no unauthorized attempt to establish connection from
the external network should be permitted.
<To Achieve Effective Security>
-
If the LAN, in which the machine is installed, is connected to an outside network, install a firewall or
similar network device to block any access to the machine from the outside network and make the nec-
essary settings.
-
Provide an appropriate network control at all times to make sure that no other copying machine is con-
nected without prior notice to the office LAN to which this machine is connected.
User information control system control requirements
The administrator of the machine and the server administrator are required to apply patches to, or perform
account control for, this machine and the user information control system connected to the office LAN in
which the machine is installed to ensure operation control that achieves appropriate access control.