Authentication/Security Settings
213
T
ools
5
z
Note that the hard disk security will not be warranted if you do not correctly follow the above
setting instructions.
For information on how to set [Data Encryption], refer to "Data Encryption" (P.123).
For information on how to set [Service Rep. Restricted Operation], refer to "Service Rep. Restricted
Operation" (P.124).
For information on how to set [Passcode Entry from Control Panel], refer to "Passcode Policy" (P.209).
For information on how to set the system administrator's user ID, refer to "System Administrator’s
Login ID" (P.202).
The manager (of the organization that this machine is used for) must be follow the
instructions below:
z
Assign appropriate persons as system and machine administrators, and manage and train
them properly.
z
When turning off the machine, make sure no operation is running. Train the users to turn off
the machine after an active operation completes, if any.
z
Note that Security Kit is used to protect deleted document data from being recovered; it does
not protect documents stored in mailboxes on the hard disk.
z
Install an anti-bugging device on the internal network that the machine with Security Kit is
located on, and perform the network settings properly to protect the machine from
interceptions.
z
To block unauthorized access, install a firewall device between the external network and the
internal network that the machine is located on.
Scheduled Image Overwrite
Specifies how often and when to overwrite data on the hard disk. At the specified time,
overwriting starts and all jobs in progress, including a fax being received, are canceled. The
machine will reboot after the overwriting process.