Authentication/Security Settings
319
To
ols
5
For more information on how to set data encryption, refer to "Data Encryption" (P.185).
For more information on how to set service representative restricted operation, refer to "Service Rep. Restricted Operation"
(P.187).
For more information on how to set [Passcode Entry for Control Panel Login], refer to "Passcode Policy" (P.314).
For more information on how to set the system administrator's user ID, refer to "System Administrator’s Login ID" (P.308).
The manager (of the organization that this machine is used for) must follow the
instructions below:
Assign an appropriate person as a system administrator and manage and train the
person properly.
When turning off the machine, make sure no operation is running. Train the users to turn
off the machine after an active operation completes, if any.
Note that the Data Security Kit is used to protect deleted document data from being
recovered; it does not protect files stored in folders in the hard disk.
Install an anti-bugging device on the internal network that the machine with the Data
Security Kit is located on, and perform the network settings properly to protect the
machine from interceptions.
To block unauthorized access, install a firewall device between the external network and
the internal network that the machine is located on.
Set the passcode and encryption key according to the following rules:
- Do not use easily assured character string
- Use both characters and numerics
For more information on encryption key, refer to "Encryption Key for Confidential Data" (P.186).
Содержание ApeosPort-V C5580
Страница 14: ...14 ...
Страница 38: ...1 Before Using the Machine 38 Before Using the Machine 1 ...
Страница 320: ...5 Tools 320 Tools 5 ...
Страница 376: ...10 Using IP Fax SIP 376 Using IP Fax SIP 10 ...
Страница 388: ...12 Using the Server Fax Service 388 Using the Server Fax Service 12 ...
Страница 638: ...15 Problem Solving 638 Problem Solving 15 ...
Страница 786: ...16 Appendix 786 Appendix 16 ...