
Changing Passwords of Locked Print Files..............................................................................................112
Unlocking Locked Print Files.....................................................................................................................114
Specifying Access Permission for Stored Files.............................................................................................116
Assigning Users and Access Permission for Stored Files........................................................................116
Specifying Access Privileges for Files Stored using the Scanner and Fax Functions............................119
Assigning the User and the Access Permission for the User's Stored Files............................................123
Specifying Passwords for Stored Files.....................................................................................................126
Unlocking Files...........................................................................................................................................127
Preventing Data Leaks Due to Unauthorized Transmission........................................................................130
Restrictions on Destinations.......................................................................................................................130
Using S/MIME to Protect Email Transmission.............................................................................................133
Email Encryption........................................................................................................................................133
Attaching an Electronic Signature............................................................................................................135
Protecting the Address Book.........................................................................................................................141
Address Book Access Permission.............................................................................................................141
Encrypting Data in the Address Book......................................................................................................144
Encrypting Data on the Hard Disk................................................................................................................147
Enabling the Encryption Settings..............................................................................................................147
Printing the Encryption Key.......................................................................................................................150
Updating the Encryption Key....................................................................................................................152
Canceling Data Encryption......................................................................................................................154
Deleting Data on the Hard Disk....................................................................................................................157
Overwriting Data on the Hard Disk.........................................................................................................157
4. Managing Access to the Machine
Preventing Modification of Machine Settings..............................................................................................167
Menu Protect..................................................................................................................................................169
Menu Protect..............................................................................................................................................169
Limiting Available Functions..........................................................................................................................174
Specifying Which Functions are Available.............................................................................................174
Managing Log Files.......................................................................................................................................177
Specifying Delete All Logs........................................................................................................................177
Transfer Log Setting...................................................................................................................................178
5. Enhanced Network Security
5
Summary of Contents for C6055
Page 12: ...10...
Page 47: ...5 Press OK 6 Press Exit 7 Press the User Tools Counter key User Code Authentication 45 2...
Page 57: ...p 50 Specifying Login User Name and Login Password Basic Authentication 55 2...
Page 168: ...3 Ensuring Information Security 166 3...
Page 245: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 243 6...
Page 250: ...6 Specifying the Extended Security Functions 248 6...
Page 272: ...7 Troubleshooting 270 7...
Page 359: ...Windows Authentication Operational Requirements for NTLM authentication 56 357...
Page 360: ...MEMO 358...
Page 361: ...MEMO 359...
Page 362: ...MEMO 360 EN USA D015 7902...