Authentication/Security Settings
265
T
ools
5
Prerequisite for Using the Data Security Feature
The system administrator must follow the instructions below:
z
To protect the data deleted from or stored on the hard disk, the following settings are
required:
- Number of Overwrites: [1 Overwrite] or [3 Overwrites]
- Data Encryption: [On]: an encryption key of 12 digits
- Service Representative Restricted Operation: [Yes]
z
Change the system administrator's factory default passcode (x-admin). Register a new
passcode of 7 characters or more (maximum 12 characters). Be careful not to register a
passcode that can be easily assumed and not to store the registered passcode on a location
that is easily accessible to other persons.
Important •
If the system administrator's user ID and passcode are forgotten, the machine configuration
will not be able to recover in case of malfunction.
z
Set [Passcode Entry for Control Panel Login] to [On].
z
Set [Maximum Login Attempts by System Administrator] to 5 times.
z
Note that the hard disk security will not be warranted if you do not correctly follow the above
setting instructions.
For more information on how to set data encryption, refer to "Data Encryption" (P.149).
For more information on how to set service representative restricted operation, refer to "Service Rep.
Restricted Operation" (P.151).
For more information on how to set passcode entry for control panel login, refer to "Passcode Policy"
(P.261).
For more information on how to set the system administrator's user ID, refer to "System Administrator's
Login ID" (P.255).
The manager (of the organization that this machine is used for) must follow the instructions
below:
z
Assign an appropriate person as a system administrator and manage and train the person
properly.
z
When turning off the machine, make sure no operation is running. Train the users to turn off
the machine after an active operation completes, if any.
z
Note that the Data Security Feature is used to protect deleted document data from being
recovered; it does not protect files stored in folders in the hard disk.
z
Install an anti-bugging device on the internal network that the machine with the Data Security
Feature is located on, and perform the network settings properly to protect the machine from
interceptions.
z
To block unauthorized access, install a firewall device between the external network and the
internal network that the machine is located on.
z
Set the passcode and encryption key according to the following rules:
- Do not use easily assured character string
- Use both characters and numerics
For more information on encryption key, refer to "Encryption Key for Confidential Data" (P.150).
Summary of Contents for apeosport-IV 6080
Page 1: ...ApeosPort IV 7080 ApeosPort IV 6080 DocuCentre IV 7080 DocuCentre IV 6080...
Page 14: ...14...
Page 102: ...4 Machine Status 102 Machine Status 4...
Page 266: ...5 Tools 266 Tools 5...
Page 294: ...7 Printer Environment Settings 294 Printer Environment Settings 7...
Page 326: ...9 Scanner Environment Settings 326 Scanner Environment Settings 9...
Page 334: ...10 Using IP Fax SIP 334 Using IP Fax SIP 10...
Page 346: ...12 Using the Server Fax Service 346 Using the Server Fax Service 12...
Page 364: ...13 Encryption and Digital Signature Settings 364 Encryption and Digital Signature Settings 13...
Page 402: ...14 Authentication and Accounting Features 402 Authentication and Accounting Features 14...