1
Security
1-8
C300
Security
Chapter 1
1.4
Precautions for Operation Control
This machine and the data handled by this machine should be used in an of-
fice environment that meets the following conditions.
Roles and Requirements of the Administrator
The Administrator should take full responsibility for controlling the machine,
thereby ensuring that no improper operations are performed.
<To Achieve Effective Security>
-
A person who is capable of taking full responsibility for controlling the
machine should be appointed as the Administrator to make sure that no
improper operations are performed.
-
When using an SMTP server (mail server) or an DNS server, each server
should be appropriately managed by the Administrator and should be pe-
riodically checked to confirm that settings have not been changed with-
out permission.
Password Usage Requirements
The Administrator must control the Administrator Password, HDD Lock
Password, Encryption Key, auth-Password, and priv-Password appropriate-
ly so that they may not be leaked. These passwords should not be ones that
can be easily guessed. The user, on the other hand, should control the User
Box Password, Secure Print Password, and User Password appropriately so
that they may not be leaked. Again, these passwords should not be ones that
can be easily guessed. For the Public User Box shared among a number of
users, the User Box Password should be appropriately controlled so that it
may not be leaked to anyone who is not the user of the Public User Box.
<To Achieve Effective Security>
-
Make absolutely sure that only the Administrator knows the Administrator
Password, HDD Lock Password, Encryption Key, auth-Password, and
priv-Password.
-
The Administrator must change the Administrator Password, HDD Lock
Password, Encryption Key, auth-Password, and priv-Password at regular
intervals.
-
The Administrator should make sure that any number that can easily be
guessed from birthdays, employee identification numbers, and the like is
not set for the Administrator Password, HDD Lock Password, Encryption
Key, auth-Password, and priv-Password.
-
If a User Password or User Box Password has been changed, the Admin-
istrator should have the corresponding user change the password as
soon as possible.
-
If the Administrator Password has been changed by the Service Engi-
neer, the Administrator should change the Administrator Password as
soon as possible.
c300_security_E.book 8 ページ 2007年4月11日 水曜日 午前10時42分
Содержание BIZHUB C300
Страница 7: ...Contents x 6 C300 c300_security_E book 6...
Страница 8: ...1 Security Chapter 1 Security c300_security_E book 1...
Страница 20: ...2 Administrator Operations Chapter 2 Administrator Operations c300_security_E book 1...
Страница 112: ...3 User Operations Chapter 3 User Operations c300_security_E book 1...
Страница 155: ...3 User Operations 3 44 C300 User Operations Chapter 3 c300_security_E book 44...
Страница 156: ...4 Application Software Chapter 4 Application Software c300_security_E book 1...