Konica Minolta bizhub PRESS 1250/1250P User Guide - Page 2

Contents - bizhub

Page 2 highlights

Contents 1 Introduction 1.1 1.1.1 1.1.2 1.2 1.2.1 1.2.2 Welcome ...1-2 Composition of User's Guide...1-2 User's Guide ...1-2 Conventions Used in This Manual 1-3 Symbols Used in This Manual ...1-3 Paper Indications ...1-4 2 Security Functions 2.1 2.1.1 2.1.2 2.2 2.2.1 2.2.2 2.2.3 2.2.4 2.2.5 2.3 2.3.1 2.3.2 2.3.3 2.3.4 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 2.5.3 2.5.4 2.5.5 2.5.6 Control Software ...2-2 Control Software Version ...2-2 About the ROM Version Display Function 2-2 Security Functions ...2-3 Security Mode...2-3 Environment ...2-3 Description of Enhanced Security Mode 2-4 Data Protected by the Enhanced Security Mode 2-5 Protecting and Deleting of Remaining Data After Being Used 2-6 User Authentication in Enhanced Security Mode 2-7 Adding User Registration...2-7 Changing User Registration...2-13 Deleting User Data ...2-18 Changing Password by User ...2-20 HDD Recall Function in Enhanced Security Mode 2-24 Recalling and Deleting of Data...2-24 Output Data in the Secure Box ...2-28 Administrator Security Functions 2-32 Turning the Enhanced Security Mode ON/OFF 2-32 HDD Lock Password...2-35 Deleting Temporary Data ...2-37 Deleting All Data...2-40 Printing Audit Log ...2-43 Analyzing Audit Log ...2-45 3 Index 3.1 Index by item ...3-2 3.2 Index by button...3-3 bizhub PRESS 1250P Contents-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66

bizhub PRESS 1250P
Contents-1
Contents
1
Introduction
1.1
Welcome
..........................................................................................................................................
1-2
1.1.1
Composition of User's Guide
.............................................................................................................
1-2
1.1.2
User's Guide
......................................................................................................................................
1-2
1.2
Conventions Used in This Manual
.................................................................................................
1-3
1.2.1
Symbols Used in This Manual
...........................................................................................................
1-3
1.2.2
Paper Indications
...............................................................................................................................
1-4
2
Security Functions
2.1
Control Software
.............................................................................................................................
2-2
2.1.1
Control Software Version
...................................................................................................................
2-2
2.1.2
About the ROM Version Display Function
.........................................................................................
2-2
2.2
Security Functions
..........................................................................................................................
2-3
2.2.1
Security Mode
....................................................................................................................................
2-3
2.2.2
Environment
.......................................................................................................................................
2-3
2.2.3
Description of Enhanced Security Mode
...........................................................................................
2-4
2.2.4
Data Protected by the Enhanced Security Mode
..............................................................................
2-5
2.2.5
Protecting and Deleting of Remaining Data After Being Used
..........................................................
2-6
2.3
User Authentication in Enhanced Security Mode
........................................................................
2-7
2.3.1
Adding User Registration
...................................................................................................................
2-7
2.3.2
Changing User Registration
.............................................................................................................
2-13
2.3.3
Deleting User Data
...........................................................................................................................
2-18
2.3.4
Changing Password by User
...........................................................................................................
2-20
2.4
HDD Recall Function in Enhanced Security Mode
.....................................................................
2-24
2.4.1
Recalling and Deleting of Data
.........................................................................................................
2-24
2.4.2
Output Data in the Secure Box
........................................................................................................
2-28
2.5
Administrator Security Functions
................................................................................................
2-32
2.5.1
Turning the Enhanced Security Mode ON/OFF
...............................................................................
2-32
2.5.2
HDD Lock Password
........................................................................................................................
2-35
2.5.3
Deleting Temporary Data
.................................................................................................................
2-37
2.5.4
Deleting All Data
...............................................................................................................................
2-40
2.5.5
Printing Audit Log
............................................................................................................................
2-43
2.5.6
Analyzing Audit Log
.........................................................................................................................
2-45
3
Index
3.1
Index by item
...................................................................................................................................
3-2
3.2
Index by button
................................................................................................................................
3-3