Clearing Print Volume Use Counters
..........................................................................................................
92
Configuring the Auto-Reset Function
..........................................................................................................
94
4. Preventing Leakage of Information from Machines
Protecting the Address Book
...........................................................................................................................
97
Specifying Address Book Access Permissions
...........................................................................................
97
Encrypting Data in the Address Book
.........................................................................................................
99
Encrypting Data on the Hard Disk
................................................................................................................
101
Enabling the Encryption Settings
..............................................................................................................
103
Backing Up the Encryption Key
................................................................................................................
105
Updating the Encryption Key
....................................................................................................................
106
Canceling Data Encryption
......................................................................................................................
107
Deleting Data on the Hard Disk
....................................................................................................................
108
Conditions for Use
.....................................................................................................................................
108
Instructions for Use
....................................................................................................................................
108
Auto Erase Memory
..................................................................................................................................
109
Erase All Memory
......................................................................................................................................
113
5. Enhanced Network Security
Access Control
...............................................................................................................................................
117
Enabling and Disabling Protocols
................................................................................................................
118
Enabling and Disabling Protocols Using the Control Panel
...................................................................
124
Enabling and Disabling Protocols Using Web Image Monitor
.............................................................
125
Specifying Network Security Level
...............................................................................................................
126
Specifying Network Security Level Using the Control Panel
.................................................................
126
Specifying Network Security Level Using Web Image Monitor
............................................................
127
Status of Functions under Each Network Security Level
.........................................................................
128
Protecting the Communication Path via a Device Certificate
.....................................................................
131
Creating and Installing a Device Certificate from the Control Panel (Self-Signed Certificate)
...........
131
Creating and Installing a Device Certificate from Web Image Monitor (Self-Signed Certificate)
.....
132
Creating the Device Certificate (Issued by a Certificate Authority)
.......................................................
133
Installing the Device Certificate (Issued by a Certificate Authority)
......................................................
134
Installing an Intermediate Certificate (Issued by a Certificate Authority)
..............................................
135
Configuring SSL/TLS
.....................................................................................................................................
136
Enabling SSL/TLS
......................................................................................................................................
137
3