
Changing Passwords of Locked Print Files..............................................................................................112
Unlocking Locked Print Files.....................................................................................................................114
Specifying Access Permission for Stored Files.............................................................................................116
Assigning Users and Access Permission for Stored Files........................................................................116
Specifying Access Privileges for Files Stored using the Scanner and Fax Functions............................119
Assigning the User and the Access Permission for the User's Stored Files............................................123
Specifying Passwords for Stored Files.....................................................................................................126
Unlocking Files...........................................................................................................................................127
Preventing Data Leaks Due to Unauthorized Transmission........................................................................130
Restrictions on Destinations.......................................................................................................................130
Using S/MIME to Protect Email Transmission.............................................................................................133
Email Encryption........................................................................................................................................133
Attaching an Electronic Signature............................................................................................................135
Protecting the Address Book.........................................................................................................................141
Address Book Access Permission.............................................................................................................141
Encrypting Data in the Address Book......................................................................................................144
Encrypting Data on the Hard Disk................................................................................................................147
Enabling the Encryption Settings..............................................................................................................147
Printing the Encryption Key.......................................................................................................................150
Updating the Encryption Key....................................................................................................................152
Canceling Data Encryption......................................................................................................................154
Deleting Data on the Hard Disk....................................................................................................................157
Overwriting Data on the Hard Disk.........................................................................................................157
4. Managing Access to the Machine
Preventing Modification of Machine Settings..............................................................................................167
Menu Protect..................................................................................................................................................169
Menu Protect..............................................................................................................................................169
Limiting Available Functions..........................................................................................................................174
Specifying Which Functions are Available.............................................................................................174
Managing Log Files.......................................................................................................................................177
Specifying Delete All Logs........................................................................................................................177
Transfer Log Setting...................................................................................................................................178
5. Enhanced Network Security
5
Содержание C6055
Страница 12: ...10...
Страница 47: ...5 Press OK 6 Press Exit 7 Press the User Tools Counter key User Code Authentication 45 2...
Страница 53: ...4 Press Address Book Management 5 Select the user or group 6 Press Auth Info Basic Authentication 51 2...
Страница 57: ...p 50 Specifying Login User Name and Login Password Basic Authentication 55 2...
Страница 126: ...4 Press Address Book Management 5 Select the user or group 6 Press Protection 3 Ensuring Information Security 124 3...
Страница 168: ...3 Ensuring Information Security 166 3...
Страница 175: ...5 Select the menu protect level and then press OK 6 Press the User Tools Counter key Menu Protect 173 4...
Страница 177: ...3 Press Administrator Tools 4 Press Address Book Management 5 Select the user Limiting Available Functions 175 4...
Страница 190: ...2 Press System Settings 3 Press Interface Settings 4 Press Effective Protocol 5 Enhanced Network Security 188 5...
Страница 197: ...2 Press System Settings 3 Press Administrator Tools 4 Press Extended Security Encrypting Transmitted Passwords 195 5...
Страница 245: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 243 6...
Страница 250: ...6 Specifying the Extended Security Functions 248 6...
Страница 272: ...7 Troubleshooting 270 7...
Страница 359: ...Windows Authentication Operational Requirements for NTLM authentication 56 357...
Страница 360: ...MEMO 358...
Страница 361: ...MEMO 359...
Страница 362: ...MEMO 360 EN USA D015 7902...