bizhub C554/C454/C364/C284/C224
Contents-1
Contents
1
Security
1.1
Introduction
.....................................................................................................................................
1-2
Compliance with the ISO15408 Standard
.........................................................................................
1-2
Operating Precautions
.......................................................................................................................
1-2
INSTALLATION CHECKLIST
..............................................................................................................
1-3
1.2
Security Functions
..........................................................................................................................
1-4
Check Count Clear Conditions
..........................................................................................................
1-4
1.3
Data to be Protected
......................................................................................................................
1-5
1.4
Precautions for Operation Control
................................................................................................
1-6
Roles and Requirements of the Administrator
...................................................................................
1-6
Password Usage Requirements
........................................................................................................
1-6
Network Connection Requirements for the Machine
.........................................................................
1-6
Security function operation setting operating requirements
..............................................................
1-6
Operation and control of the machine
...............................................................................................
1-6
Machine Maintenance Control
...........................................................................................................
1-7
Implementing digital signature properly
.............................................................................................
1-7
Operating conditions for the IC card and IC card reader
..................................................................
1-7
IC card owner requirements
..............................................................................................................
1-7
1.5
Miscellaneous
..................................................................................................................................
1-8
Password Rules
.................................................................................................................................
1-8
Precautions for Use of Various Types of Applications
.......................................................................
1-8
Encrypting communications
..............................................................................................................
1-8
Items of Data Cleared by Overwrite All Data Function
......................................................................
1-8
Fax functions
......................................................................................................................................
1-9
General functions and operations
......................................................................................................
1-9
2
Administrator Operations
2.1
Accessing the Administrator Settings
..........................................................................................
2-2
2.1.1
Accessing the Administrator Settings
................................................................................................
2-2
2.1.2
Accessing the User Mode
..................................................................................................................
2-4
2.2
Enhancing the Security Function
...................................................................................................
2-6
2.2.1
Items cleared by HDD Format
...........................................................................................................
2-7
2.2.2
Setting the Password Rules
...............................................................................................................
2-8
2.2.3
Setting the Enhanced Security Mode
..............................................................................................
2-10
2.3
Preventing Unauthorized Access
................................................................................................
2-12
Setting Prohibited Functions When Authentication Error
................................................................
2-12
2.4
Setting the External Server
..........................................................................................................
2-14
Setting the External Server
..............................................................................................................
2-14
2.5
System Auto Reset Function
.......................................................................................................
2-17
Setting the System Auto Reset function
..........................................................................................
2-17
2.6
Changing the Administrator Password
.......................................................................................
2-19
Changing the Administrator Password
............................................................................................
2-19
2.7
Protecting Data in the HDD
..........................................................................................................
2-21
2.7.1
Setting the Encryption Key (encryption word)
.................................................................................
2-21
2.7.2
Changing the Encryption Key
..........................................................................................................
2-25
2.8
Overwrite All Data Function
.........................................................................................................
2-27
Setting the Overwrite All Data function
............................................................................................
2-27
2.9
S/MIME Communication Setting Function
.................................................................................
2-29
Setting the S/MIME Communication
...............................................................................................
2-29
2.10
PC-Fax RX Setting Function
........................................................................................................
2-32
PC-Fax RX Setting
...........................................................................................................................
2-32
2.11
TSI User Box Setting Function
.....................................................................................................
2-34
TSI User Box Setting
........................................................................................................................
2-34