15 Tools
460
For more information on how to check the status during overwriting, refer to "Overwrite Hard Disk"
(P.285).
Prerequisite for Using Data Security Feature
The system administrator must follow the instructions below:
• To protect the data deleted from or stored on the hard disk, the following settings are
required:
- Number of Overwrites: [1 Overwrite] or [3 Overwrites]
- Data Encryption: [On]: an encryption key of 12 digits
- Service Representative Restricted Operation: [Yes]
• Change the system administrator's factory default passcode (1111). Register a new
passcode of 7 characters or more (maximum 12 characters). Be careful not to register a
passcode that can be easily assumed and not to store the registered passcode on a location
that is easily accessible to other persons.
Note
•
If the system administrator's user ID and passcode are forgotten, the machine configuration will not
be able to recover in case of malfunction.
• Set [Passcode Entry for Control Panel Login] to [On].
• Set [Maximum Login Attempts by System Administrator] to 5 times.
• Note that the hard disk security will not be warranted if you do not correctly follow the
above setting instructions.
For more information on how to set data encryption, refer to "Data Encryption" (P.344).
For more information on how to set service representative restricted operation, refer to "Service
Rep. Restricted Operation" (P.346).
For more information on how to set [Passcode Entry for Control Panel Login], refer to "Passcode
Policy" (P.456).
For more information on how to set the system administrator's user ID, refer to "System
Administrator's Login ID" (P.450).
The manager (of the organization that this machine is used for) must follow the
instructions below:
• Assign an appropriate person as a system administrator and manage and train he/she
properly.
• When turning off the machine, make sure no operation is running. Train the users to turn
off the machine after an active operation completes, if any.
• Note that this feature is used to protect deleted document data from being recovered; it
does not protect files stored in folders in the hard disk.
• Install an anti-bugging device on the internal network that the machine is located on, and
perform the network settings properly to protect the machine from interceptions.
• To block unauthorized access, install a firewall device between the external network and
the internal network that the machine is located on.
• Set the passcode and encryption key according to the following rules:
- Do not use easily assured character string
- Use both characters and numerics
For more information on encryption key, refer to "Encryption Key for Confidential Data" (P.346).
Содержание C7765DN
Страница 1: ...Dell C7765dn Color Multifunction Printer User s Guide Regulatory Model C7765dn ...
Страница 32: ...1 Before Using the Machine 32 ...
Страница 144: ...3 Copy 144 ...
Страница 155: ...Operations during Faxing 155 3 Set Resolution Original Size and the density 4 Select Save 5 Press the Start button ...
Страница 156: ...4 Fax 156 ...
Страница 168: ...5 Scan 168 ...
Страница 272: ...13 Maintenance 272 ...
Страница 294: ...14 Machine Status 294 ...
Страница 468: ...16 Dell Printer Configuration Web Tool Settings 468 ...
Страница 510: ...19 Scanner Environment Settings 510 ...
Страница 559: ...Configuration for Authentication 559 10 Select Close repeatedly until the Tools screen is displayed 11 Select Close ...
Страница 564: ...22 Authentication and Accounting Features 564 ...
Страница 764: ...28 Using Shortcut Menu 764 ...
Страница 796: ...29 Using Access Google Drive 796 2 Check the content status 3 Select Close ...
Страница 802: ...29 Using Access Google Drive 802 ...
Страница 816: ...30 Google Cloud Print 816 ...
Страница 829: ...www dell com dell com support KB3206EN0 5 ...