Kyocera ECOSYS P6130cdn ECOSYS P6130cdn Operation Guide - Page 62

Additional Preparations for the Administrator, Strengthening the Security

Page 62 highlights

Installing and Setting up the Machine > Additional Preparations for the Administrator Additional Preparations for the Administrator In addition to the information provided in this chapter, the administrator of this machine should check the following, and configure the settings as needed. Strengthening the Security One user with administrator rights has been pre-registered in the machine. Logging in as this user will allow you to configure all settings; therefore, please change the login user name and password. In addition, this machine is equipped with user authentication function, which can be configured to limit the access to this machine to only those who have a registered login name and password. User Authentication and Accounting (User Login, Job Accounting) (page 8-1) I want to... Restrict the users of the machine. Prevent another user from handling the documents stored in the machine. Prevent the data stored in the machine from being leaked. Auto Panel Reset Custom Box*1 Data Overwrite*2 Encryption*2 Completely delete the data on the machine before disposing of the machine. Protect the transmission from interception and wiretapping. DataSanitization IPP over SSL HTTPS SMTP Security Function POP3 Security *1 The optional SSD is required. *2 The optional Data Security Kit is required. IPSec SNMPv3 Reference page page 7-14 page 5-6 Refer to the Data Security Kit (E) Operation Guide. page 7-22 page 7-20 page 7-20 Command Center RX User Guide Command Center RX User Guide page 7-20 page 7-17 2-30

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239

2-30
Installing and Setting up the Machine > Additional Preparations for the Administrator
Additional Preparations for the Administrator
In addition to the information provided in this chapter, the administrator of this machine should check the following, and
configure the settings as needed.
Strengthening the Security
One user with administrator rights has been pre-registered in the machine. Logging in as this user will allow you to
configure all settings; therefore, please change the login user name and password.
In addition, this machine is equipped with user authentication function, which can be configured to limit the access to this
machine to only those who have a registered login name and password.
User Authentication and Accounting (User Login, Job Accounting) (page 8-1)
I want to...
Function
Reference page
Restrict the users of the machine.
Auto Panel Reset
page 7-14
Prevent another user from handling the
documents stored in the machine.
Custom Box
*1
*1
The optional SSD is required.
page 5-6
Prevent the data stored in the machine from
being leaked.
Data Overwrite
*2
*2
The optional Data Security Kit is required.
Refer to the
Data
Security Kit (E)
Operation Guide
.
Encryption
*2
Completely delete the data on the machine
before disposing of the machine.
DataSanitization
page 7-22
Protect the transmission from interception and
wiretapping.
IPP over SSL
page 7-20
HTTPS
page 7-20
SMTP Security
Command
Center RX User
Guide
POP3 Security
Command
Center RX User
Guide
IPSec
page 7-20
SNMPv3
page 7-17