
Overwriting the Data on the Hard Disk
Before disposing of the machine, make sure all data on the hard disk is deleted.
Prevent data leakage by automatically deleting transmitted printer jobs from the memory.
To overwrite the hard disk data, the optional DataOverwriteSecurity Unit is required. For details about
overwriting the data on the hard disk, see "Deleting Data on the Hard Disk".
• p.101 "Preventing Unauthorized Copying"
• p.105 "Printing with Unauthorized Copy Prevention and Data Security for Copying"
• p.102 "Data Security for Copying"
• p.108 "Printing a Confidential Document"
• p.116 "Specifying Access Permission for Stored Files"
• p.130 "Preventing Data Leaks Due to Unauthorized Transmission"
• p.133 "Using S/MIME to Protect Email Transmission"
• p.141 "Protecting the Address Book"
• p.177 "Managing Log Files"
• p.147 "Encrypting Data on the Hard Disk"
• p.157 "Deleting Data on the Hard Disk"
Limiting and Controlling Access
Preventing Modification or Deletion of Stored Data
You can allow selected users to access stored scan files and files stored in Document Server.
You can permit selected users who are allowed to access stored files to modify or delete the files. For
details about limiting and controlling access, see "Specifying Access Permission for Stored Files".
Preventing Modification of Machine Settings
The machine settings that can be modified depend on the type of administrator account.
Register the administrators so that users cannot change the administrator settings. For details about
preventing modification of machine settings, see "Preventing Modification of Machine Settings".
Limiting Available Functions
To prevent unauthorized operation, you can specify who is allowed to access each of the machine's
functions. For details about limiting available functions for users and groups, see "Limiting Available
Functions".
• p.116 "Specifying Access Permission for Stored Files"
Security Measures Provided by this Machine
17
1
Содержание C6055
Страница 12: ...10...
Страница 47: ...5 Press OK 6 Press Exit 7 Press the User Tools Counter key User Code Authentication 45 2...
Страница 53: ...4 Press Address Book Management 5 Select the user or group 6 Press Auth Info Basic Authentication 51 2...
Страница 57: ...p 50 Specifying Login User Name and Login Password Basic Authentication 55 2...
Страница 126: ...4 Press Address Book Management 5 Select the user or group 6 Press Protection 3 Ensuring Information Security 124 3...
Страница 168: ...3 Ensuring Information Security 166 3...
Страница 175: ...5 Select the menu protect level and then press OK 6 Press the User Tools Counter key Menu Protect 173 4...
Страница 177: ...3 Press Administrator Tools 4 Press Address Book Management 5 Select the user Limiting Available Functions 175 4...
Страница 190: ...2 Press System Settings 3 Press Interface Settings 4 Press Effective Protocol 5 Enhanced Network Security 188 5...
Страница 197: ...2 Press System Settings 3 Press Administrator Tools 4 Press Extended Security Encrypting Transmitted Passwords 195 5...
Страница 245: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 243 6...
Страница 250: ...6 Specifying the Extended Security Functions 248 6...
Страница 272: ...7 Troubleshooting 270 7...
Страница 359: ...Windows Authentication Operational Requirements for NTLM authentication 56 357...
Страница 360: ...MEMO 358...
Страница 361: ...MEMO 359...
Страница 362: ...MEMO 360 EN USA D015 7902...