501/421/361
x-1
Contents
Contents
1
Security
1.1
Introduction
...........................................................................................................................................
1-2
Compliance with the ISO15408 Standard
................................................................................................
1-2
Operating Precautions
..............................................................................................................................
1-2
INSTALLATION CHECKLIST
....................................................................................................................
1-3
1.2
Security Functions
................................................................................................................................
1-4
1.2.1
Check Count Clear Conditions
.................................................................................................................
1-4
1.3
Data to be Protected
............................................................................................................................
1-6
1.4
Precautions for Operation Control
......................................................................................................
1-7
Roles and Requirements of the Administrator
..........................................................................................
1-7
Password Usage Requirements
...............................................................................................................
1-7
Network Connection Requirements for the Machine
...............................................................................
1-8
User information control server control requirements
..............................................................................
1-8
Security function operation setting operating requirements
....................................................................
1-8
Operation and control of the machine
......................................................................................................
1-8
Machine Maintenance Control
..................................................................................................................
1-8
1.5
Miscellaneous
.......................................................................................................................................
1-9
Password Rules
........................................................................................................................................
1-9
Precautions for Use of Various Types of Applications
.............................................................................
1-9
Encrypting communications
.....................................................................................................................
1-9
IPP printing
.............................................................................................................................................
1-10
Types of Data Cleared by Overwrite All Data Function
..........................................................................
1-11
2
Administrator Operations
2.1
Accessing the Administrator Settings
................................................................................................
2-2
2.1.1
Accessing the Administrator Settings
......................................................................................................
2-2
<From the Control Panel>
........................................................................................................................
2-3
2.1.2
Accessing the User Mode
........................................................................................................................
2-5
<From the Control Panel>
........................................................................................................................
2-5
<From PageScope Web Connection>
......................................................................................................
2-7
2.2
Enhancing the Security Function
........................................................................................................
2-9
2.2.1
Items cleared by HDD Format
................................................................................................................
2-10
2.2.2
Setting the Enhanced Security Mode
.....................................................................................................
2-11
<Setting can be made only from the control panel>
..............................................................................
2-11
2.3
Preventing Unauthorized Access
......................................................................................................
2-14
2.3.1
Setting Prohibited Functions When Authentication Error
.......................................................................
2-14
<Setting can be made only from the control panel>
..............................................................................
2-15
2.4
Canceling the Operation Prohibited State
.......................................................................................
2-17
2.4.1
Performing Release Setting
....................................................................................................................
2-17
<Setting can be made only from the control panel>
..............................................................................
2-17
2.5
Setting the Authentication Method
...................................................................................................
2-19
2.5.1
Setting the Authentication Method
.........................................................................................................
2-19
<Setting can be made only from the control panel>
..............................................................................
2-19
2.5.2
Setting the External Server
.....................................................................................................................
2-22
<Setting can be made only from the control panel>
..............................................................................
2-22
2.6
ID & Print Setting Function
................................................................................................................
2-24
2.6.1
Setting ID & Print
....................................................................................................................................
2-24
<Setting can be made only from the control panel>
..............................................................................
2-24
2.7
System Auto Reset Function
.............................................................................................................
2-26
2.7.1
Setting the System Auto Reset function
.................................................................................................
2-26
<Setting can be made only from the control panel>
..............................................................................
2-26