Printing a List of Print Volume Use Counters
...............................................................................................
89
Clearing Print Volume Use Counters
..........................................................................................................
90
Configuring the Auto-Reset Function
..........................................................................................................
91
4. Preventing Leakage of Information from Machines
Protecting the Address Book
...........................................................................................................................
93
Specifying Address Book Access Permissions
...........................................................................................
93
Encrypting Data in the Address Book
.........................................................................................................
95
Encrypting Data on the Hard Disk
..................................................................................................................
97
Enabling the Encryption Settings
.................................................................................................................
99
Backing Up the Encryption Key
................................................................................................................
101
Updating the Encryption Key
....................................................................................................................
102
Canceling Data Encryption
......................................................................................................................
103
Deleting Data on the Hard Disk
....................................................................................................................
104
Conditions for Use
.....................................................................................................................................
104
Instructions for Use
....................................................................................................................................
104
Auto Erase Memory
..................................................................................................................................
104
Erase All Memory
......................................................................................................................................
109
5. Enhanced Network Security
Access Control
...............................................................................................................................................
113
Enabling and Disabling Protocols
................................................................................................................
114
Enabling and Disabling Protocols Using the Control Panel
...................................................................
121
Enabling and Disabling Protocols Using Web Image Monitor
.............................................................
121
Specifying Network Security Level
...............................................................................................................
123
Specifying Network Security Level Using the Control Panel
.................................................................
123
Specifying Network Security Level Using Web Image Monitor
............................................................
124
Status of Functions under Each Network Security Level
.........................................................................
124
Protecting the Communication Path via a Device Certificate
.....................................................................
128
Creating and Installing a Device Certificate from the Control Panel (Self-Signed Certificate)
...........
128
Creating and Installing a Device Certificate from Web Image Monitor (Self-Signed Certificate)
.....
129
Creating the Device Certificate (Issued by a Certificate Authority)
.......................................................
130
Installing the Device Certificate (Issued by a Certificate Authority)
......................................................
131
Installing an Intermediate Certificate (Issued by a Certificate Authority)
..............................................
132
Configuring SSL/TLS
.....................................................................................................................................
133
3