
Security Measures Provided by this Machine
9
1
❖
Managing Log Files
You can improve data security by deleting log files stored in the machine. By
transferring the log files, you can check the history data and identify unau-
thorized access.
To transfer the log data, the log collection server is required.
Reference
For details, see p.126 “Managing Log Files”.
❖
Overwriting the Data on the Hard Disk
Before disposing of the machine, make sure all data on the hard disk is delet-
ed. Prevent data leakage by automatically deleting transmitted printer jobs
from memory.
To overwrite the hard disk data, the optional DataOverwriteSecurity unit is
required.
Reference
For details, see p.110 “Overwriting the Data on the Hard Disk”.
Limiting and Controlling Access
❖
Preventing Modification or Deletion of Stored Data
You can specify who is allowed to access stored scan files and files stored in
Document Server.
You can permit selected users who are allowed to access stored files to modify
or delete the files.
Reference
For details, see p.87 “Specifying Access Permission for Stored Files”.
❖
Preventing Modification of Machine Settings
The machine settings that can be modified depend on the type of administra-
tor account.
Register the administrators so that users cannot change the administrator set-
tings.
Reference
For details, see p.119 “Preventing Modification of Machine Settings”.
❖
Limiting Available Functions
To prevent unauthorized operation, you can specify who is allowed to access
each of the machine’s functions.
Reference
For details, see p.124 “Limiting Available Functions”.
AthenaC1-EN_Sec_F2_FM_forPaper.book Page 9 Wednesday, January 18, 2006 4:53 PM
Summary of Contents for LD430c
Page 2: ......
Page 24: ...10 AMF087S AMF088S...
Page 48: ...Entering Text 34 2...
Page 70: ...56 EN USA B230 7737 MEMO...
Page 124: ...Connecting the Machine 46 1...
Page 272: ...Printer Features 194 5...
Page 350: ...Other User Tools 272 8 C Press the Start key Inquiry information prints out D Press Exit twice...
Page 352: ...Other User Tools 274 8...
Page 384: ...306 EN USA B230 7857...
Page 388: ......
Page 394: ...vi...
Page 396: ...2...
Page 458: ...Troubleshooting When Using the Printer Function 64 4...
Page 496: ...Adding Paper Toner and Staples 102 6...
Page 500: ...Clearing Misfeeds 106 7 When C is lit When D is lit AMK009S AMK010S...
Page 510: ...Clearing Misfeeds 116 7...
Page 522: ......
Page 530: ...2...
Page 600: ...Authentication and its Application 72 2...
Page 628: ...Preventing Information Leaks 100 3 D Press Unlock Files E Press Yes F Press OK...
Page 646: ...Preventing Information Leaks 118 3...
Page 678: ...Enhanced Network Security 150 5...
Page 692: ...Specifying the Extended Security Functions 164 6...
Page 756: ...228 MEMO...
Page 757: ...229 MEMO...
Page 758: ...230 EN USA B230 7907 MEMO...
Page 804: ...Placing Originals 24 1...
Page 962: ...182 EN USA B230 7607...