
Printing confidential files
Using the printer's Locked Print, you can store files in the machine as confidential files and then print
them. You can print a file using the machine's control panel and collect it on the spot to prevent others
from seeing it. For details about printing confidential files, see "Printing a Confidential Document".
Protecting Stored Files from Unauthorized Access
You can specify who is allowed to use and access scanned files and the files in Document Server.
You can prevent activities such as the printing of stored files by unauthorized users. For details about
protecting stored files from unauthorized access, see "Specifying Access Permission for Stored Files".
Protecting Stored Files from Theft
You can specify who is allowed to use and access scanned files and the files in Document Server.
You can prevent activities such as the sending and downloading of stored files by unauthorized users.
For details about protecting stored files from theft, see "Specifying Access Permission for Stored Files".
Preventing Data Leaks Due to Unauthorized Transmission
You can specify in the Address Book which users are allowed to send files using the scanner or fax
function.
You can also limit the direct entry of destinations to prevent files from being sent to destinations not
registered in the Address Book. For details about preventing data leaks due to unauthorized
transmission, see "Preventing Data Leaks Due to Unauthorized Transmission".
Using S/MIME to Protect Email Transmission
When sending mail from the scanner or forwarding a fax to a user registered in the Address Book,
you can use S/MIME to protect its contents from interception and alteration, and attach an electronic
signature to guarantee the sender's identity. For details about using S/MIME to protect e-mail
transmission, see "Using S/MIME to Protect Email Transmission".
Protecting Registered Information in the Address Book
You can specify who is allowed to access the data in the Address Book. You can prevent the data in
the Address Book being used by unregistered users.
To protect the data from unauthorized reading, you can also encrypt the data in the Address Book.
For details about protecting registered information in the Address Book, see "Protecting the Address
Book".
Managing Log Files
You can improve data security by deleting log files stored in the machine. By transferring the log files,
you can check the history data and identify unauthorized access.
To transfer the log data, Web SmartDeviceMonitor Professional IS/Standard is required. For details
about managing log files, see "Managing Log Files".
Encrypting Data on the Hard Disk
Encrypt data stored on the hard disk to prevent information leakage. The HDD Encryption Unit is
required for hard disk data encryption. For details about encrypting data on the hard disk, see
"Encrypting Data on the Hard Disk".
1. Getting Started
16
1
Summary of Contents for C6055
Page 12: ...10...
Page 47: ...5 Press OK 6 Press Exit 7 Press the User Tools Counter key User Code Authentication 45 2...
Page 57: ...p 50 Specifying Login User Name and Login Password Basic Authentication 55 2...
Page 168: ...3 Ensuring Information Security 166 3...
Page 245: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 243 6...
Page 250: ...6 Specifying the Extended Security Functions 248 6...
Page 272: ...7 Troubleshooting 270 7...
Page 359: ...Windows Authentication Operational Requirements for NTLM authentication 56 357...
Page 360: ...MEMO 358...
Page 361: ...MEMO 359...
Page 362: ...MEMO 360 EN USA D015 7902...