
Preventing Unauthorized Use
8W0J-08A
The machine handles a variety of information including the Address Book and print data. It also provides various
settings to ensure efficient management and operation. While this information and the settings provide convenience,
they can also lead to information leakage and other security issues if the information and settings can be accessed by
anyone.
You can take measures to restrict access and disable functions according to the usage status of the function, to ensure
safer use of the machine.
Restricting Access to Information and Settings
Restricting users and operations accessing information and settings on the machine can help prevent
unauthorized use and protect confidential information.
Restricting Address Book Registration and Editing(P. 386)
Restricting Use of Remote UI(P. 388)
Disabling Unused Functions
You can disable unused functions to prevent intrusion from the outside.
Preventing Connection to Computer via USB Port(P. 391)
Configuring LPD, RAW, or WSD(P. 392)
Disabling HTTP Communication(P. 394)
◼
See Also
For details about the administrator account and how to manage users and groups with access to the machine, see the
following.
Setting the Department ID and PIN for the Administrator(P. 350)
Security
385
Summary of Contents for imageCLASS MF264dw
Page 72: ... Shared Key Encryption for WPA WPA2 TKIP AES CCMP IEEE 802 1X Authentication Setting Up 63 ...
Page 139: ...Basic Operations 130 ...
Page 204: ... The volume is adjusted Basic Operations 195 ...
Page 333: ...Copying 324 ...
Page 368: ...8 Log out from Remote UI Security 359 ...
Page 501: ... Confirm Destination Scan PC Settings Menu Items 492 ...