bizhub PRESS 1250P
Contents-1
Contents
1
Introduction
1.1
Welcome
..........................................................................................................................................
1-2
1.1.1
Composition of User's Guide
.............................................................................................................
1-2
1.1.2
User's Guide
......................................................................................................................................
1-2
1.2
Conventions Used in This Manual
.................................................................................................
1-3
1.2.1
Symbols Used in This Manual
...........................................................................................................
1-3
1.2.2
Paper Indications
...............................................................................................................................
1-4
2
Security Functions
2.1
Control Software
.............................................................................................................................
2-2
2.1.1
Control Software Version
...................................................................................................................
2-2
2.1.2
About the ROM Version Display Function
.........................................................................................
2-2
2.2
Security Functions
..........................................................................................................................
2-3
2.2.1
Security Mode
....................................................................................................................................
2-3
2.2.2
Environment
.......................................................................................................................................
2-3
2.2.3
Description of Enhanced Security Mode
...........................................................................................
2-4
2.2.4
Data Protected by the Enhanced Security Mode
..............................................................................
2-5
2.2.5
Protecting and Deleting of Remaining Data After Being Used
..........................................................
2-6
2.3
User Authentication in Enhanced Security Mode
........................................................................
2-7
2.3.1
Adding User Registration
...................................................................................................................
2-7
2.3.2
Changing User Registration
.............................................................................................................
2-13
2.3.3
Deleting User Data
...........................................................................................................................
2-18
2.3.4
Changing Password by User
...........................................................................................................
2-20
2.4
HDD Recall Function in Enhanced Security Mode
.....................................................................
2-24
2.4.1
Recalling and Deleting of Data
.........................................................................................................
2-24
2.4.2
Output Data in the Secure Box
........................................................................................................
2-28
2.5
Administrator Security Functions
................................................................................................
2-32
2.5.1
Turning the Enhanced Security Mode ON/OFF
...............................................................................
2-32
2.5.2
HDD Lock Password
........................................................................................................................
2-35
2.5.3
Deleting Temporary Data
.................................................................................................................
2-37
2.5.4
Deleting All Data
...............................................................................................................................
2-40
2.5.5
Printing Audit Log
............................................................................................................................
2-43
2.5.6
Analyzing Audit Log
.........................................................................................................................
2-45
3
Index
3.1
Index by item
...................................................................................................................................
3-2
3.2
Index by button
................................................................................................................................
3-3