Ricoh Aficio MP C3000 Security Guide - Page 110

Preventing Data Leaks Due to, Unauthorized Transmission

Page 110 highlights

Preventing Data Leaks Due to Unauthorized Transmission Preventing Data Leaks Due to Unauthorized Transmission If user authentication is specified, the user who has logged on will be designated as the sender to prevent data from being sent by an unauthorized person masquerading as the user. You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered in the address book. Restrictions on Destinations 3 This can be specified by the user administrator. Make the setting to disable the direct entry of e-mail addresses and phone numbers under the scanner and fax functions. By making this setting, the destinations can be restricted to addresses registered in the address book. If you set [Restrict Use of Destinations] to [On], you can prohibit users from directly entering telephone numbers, e-mail addresses, or Folder Path in order to send files. If you set [Restrict Use of Destinations] to [Off], [Restrict Adding of User Destinations] appears. In [Restrict Adding of User Destinations], you can restrict users from registering data in the address book. If you set [Restrict Adding of User Destinations] to [Off], users can directly enter destination telephone numbers, e-mail addresses, and Folder Path in [Program Dest.] on the fax and scanner screens. If you set [Restrict Adding of User Destinations] to [On], users can specify destinations directly, but cannot use [Program Dest.] to register data in the address book. When this setting is made, only the user administrator can change the address book. For details, see p.151 "Changing the Extended Security Functions". Preparation For details about logging on and logging off with administrator authentication, see p.23 "Logging on Using Administrator Authentication", p.26 "Logging off Using Administrator Authentication". A Press the {User Tools/Counter} key. 101

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236

Preventing Data Leaks Due to Unauthorized Transmission
101
3
Preventing Data Leaks Due to
Unauthorized Transmission
If user authentication is specified, the user who has logged on will be designated
as the sender to prevent data from being sent by an unauthorized person mas-
querading as the user.
You can also limit the direct entry of destinations to prevent files from being sent
to destinations not registered in the address book.
Restrictions on Destinations
This can be specified by the user administrator.
Make the setting to disable the direct entry of e-mail addresses and phone num-
bers under the scanner and fax functions.
By making this setting, the destinations can be restricted to addresses registered
in the address book.
If you set
[
Restrict Use of Destinations
]
to
[
On
]
, you can prohibit users from directly
entering telephone numbers, e-mail addresses, or Folder Path in order to send
files. If you set
[
Restrict Use of Destinations
]
to
[
Off
]
,
[
Restrict Adding of User Destina-
tions
]
appears. In
[
Restrict Adding of User Destinations
]
, you can restrict users from
registering data in the address book.
If you set
[
Restrict Adding of User Destinations
]
to
[
Off
]
, users can directly enter des-
tination telephone numbers, e-mail addresses, and Folder Path in
[
Program Dest.
]
on the fax and scanner screens. If you set
[
Restrict Adding of User Destinations
]
to
[
On
]
, users can specify destinations directly, but cannot use
[
Program Dest.
]
to reg-
ister data in the address book. When this setting is made, only the user adminis-
trator can change the address book.
For details, see p.151 “Changing the Extended Security Functions”.
Preparation
For details about logging on and logging off with administrator authentica-
tion, see p.23 “Logging on Using Administrator Authentication”, p.26 “Log-
ging off Using Administrator Authentication”.
A
Press the
{
User Tools/Counter
}
key.