Ricoh Aficio MP C3000 Security Guide - Page 18

Limiting and Controlling Access

Page 18 highlights

Security Measures Provided by this Machine ❖ Managing Log Files You can improve data security by deleting log files stored in the machine. By transferring the log files, you can check the history data and identify unau- thorized access. To transfer the log data, the log collection server is required. 1 Reference For details, see p.126 "Managing Log Files". ❖ Overwriting the Data on the Hard Disk Before disposing of the machine, make sure all data on the hard disk is deleted. Prevent data leakage by automatically deleting transmitted printer jobs from memory. To overwrite the hard disk data, the optional DataOverwriteSecurity unit is required. Reference For details, see p.110 "Overwriting the Data on the Hard Disk". Limiting and Controlling Access ❖ Preventing Modification or Deletion of Stored Data You can specify who is allowed to access stored scan files and files stored in Document Server. You can permit selected users who are allowed to access stored files to modify or delete the files. Reference For details, see p.87 "Specifying Access Permission for Stored Files". ❖ Preventing Modification of Machine Settings The machine settings that can be modified according to the type of administrator account. Register the administrators so that users cannot change the administrator settings. Reference For details, see p.119 "Preventing Modification of Machine Settings". ❖ Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine's functions. Reference For details, see p.124 "Limiting Available Functions". 9

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236

Security Measures Provided by this Machine
9
1
Managing Log Files
You can improve data security by deleting log files stored in the machine. By
transferring the log files, you can check the history data and identify unau-
thorized access.
To transfer the log data, the log collection server is required.
Reference
For details, see p.126 “Managing Log Files”.
Overwriting the Data on the Hard Disk
Before disposing of the machine, make sure all data on the hard disk is delet-
ed. Prevent data leakage by automatically deleting transmitted printer jobs
from memory.
To overwrite the hard disk data, the optional DataOverwriteSecurity unit is
required.
Reference
For details, see p.110 “Overwriting the Data on the Hard Disk”.
Limiting and Controlling Access
Preventing Modification or Deletion of Stored Data
You can specify who is allowed to access stored scan files and files stored in
Document Server.
You can permit selected users who are allowed to access stored files to modify
or delete the files.
Reference
For details, see p.87 “Specifying Access Permission for Stored Files”.
Preventing Modification of Machine Settings
The machine settings that can be modified according to the type of adminis-
trator account.
Register the administrators so that users cannot change the administrator set-
tings.
Reference
For details, see p.119 “Preventing Modification of Machine Settings”.
Limiting Available Functions
To prevent unauthorized operation, you can specify who is allowed to access
each of the machine’s functions.
Reference
For details, see p.124 “Limiting Available Functions”.