15 Tools
460
For more information on how to check the status during overwriting, refer to "Overwrite Hard Disk"
(P.285).
Prerequisite for Using Data Security Feature
The system administrator must follow the instructions below:
• To protect the data deleted from or stored on the hard disk, the following settings are
required:
- Number of Overwrites: [1 Overwrite] or [3 Overwrites]
- Data Encryption: [On]: an encryption key of 12 digits
- Service Representative Restricted Operation: [Yes]
• Change the system administrator's factory default passcode (1111). Register a new
passcode of 7 characters or more (maximum 12 characters). Be careful not to register a
passcode that can be easily assumed and not to store the registered passcode on a location
that is easily accessible to other persons.
Note
•
If the system administrator's user ID and passcode are forgotten, the machine configuration will not
be able to recover in case of malfunction.
• Set [Passcode Entry for Control Panel Login] to [On].
• Set [Maximum Login Attempts by System Administrator] to 5 times.
• Note that the hard disk security will not be warranted if you do not correctly follow the
above setting instructions.
For more information on how to set data encryption, refer to "Data Encryption" (P.344).
For more information on how to set service representative restricted operation, refer to "Service
Rep. Restricted Operation" (P.346).
For more information on how to set [Passcode Entry for Control Panel Login], refer to "Passcode
Policy" (P.456).
For more information on how to set the system administrator's user ID, refer to "System
Administrator's Login ID" (P.450).
The manager (of the organization that this machine is used for) must follow the
instructions below:
• Assign an appropriate person as a system administrator and manage and train he/she
properly.
• When turning off the machine, make sure no operation is running. Train the users to turn
off the machine after an active operation completes, if any.
• Note that this feature is used to protect deleted document data from being recovered; it
does not protect files stored in folders in the hard disk.
• Install an anti-bugging device on the internal network that the machine is located on, and
perform the network settings properly to protect the machine from interceptions.
• To block unauthorized access, install a firewall device between the external network and
the internal network that the machine is located on.
• Set the passcode and encryption key according to the following rules:
- Do not use easily assured character string
- Use both characters and numerics
For more information on encryption key, refer to "Encryption Key for Confidential Data" (P.346).
Summary of Contents for C7765DN
Page 1: ...Dell C7765dn Color Multifunction Printer User s Guide Regulatory Model C7765dn ...
Page 32: ...1 Before Using the Machine 32 ...
Page 144: ...3 Copy 144 ...
Page 156: ...4 Fax 156 ...
Page 168: ...5 Scan 168 ...
Page 272: ...13 Maintenance 272 ...
Page 294: ...14 Machine Status 294 ...
Page 468: ...16 Dell Printer Configuration Web Tool Settings 468 ...
Page 510: ...19 Scanner Environment Settings 510 ...
Page 564: ...22 Authentication and Accounting Features 564 ...
Page 764: ...28 Using Shortcut Menu 764 ...
Page 796: ...29 Using Access Google Drive 796 2 Check the content status 3 Select Close ...
Page 802: ...29 Using Access Google Drive 802 ...
Page 816: ...30 Google Cloud Print 816 ...