Security Settings
This chapter explains the security settings.
Security Settings and Prevention of Danger
When a device is connected to a network, you can access it from a remote location. In addition, many people can
share the device, which is helpful in improving operational efficiency and convenience. However, risks such as
illegal access, illegal use, and tampering with data are increased.
In order to avoid this risk, Epson printers have a variety of security technologies. Set the device as necessary
according to the environmental conditions that have been built with the customer’s environment information.
Feature name
Feature type
What to set
What to prevent
Setup for the administrator
password
Locks the system settings,
such as connection setup
for network or USB.
An administrator sets a
password to the device.
Configuration or update are
available anywhere from
Web Config and Epson
Device Admin.
Prevent from illegally
reading and changing the
formation stored in the
device such as ID, password,
network settings, and
contacts. Also, reduce a
wide range of security risks
such as leakage of
information for the network
environment or security
policy.
Protocol and control of
service
Controls the protocols and
services to be used for
communication between
devices and computers, and
it enables and disables
feature such as print.
A protocol or service that is
applied to features allowed
or prohibited separately.
Reducing security risks that
may occur through
unintended use by
preventing users from using
unnecessary functions.
SSL/TLC communications
The communication path of
a computer and a printer is
encrypted using SSL/TLS
communication. The
content of the
communication is protected
by printer settings and by
IPPS protocol printings via a
browser.
Obtain a CA-signed
certificate, and then import
it to the printer.
Clearing an identification of
the device by the CA-signed
certification prevents
impersonation and
unauthorized access. In
addition, communication
contents of SSL/TLS are
protected, and it prevents
the leakage of contents for
printing data and setup
information.
Network Guide
Security Settings
26