Security Measures Provided by this Machine
7
1
Security Measures Provided by this
Machine
Using Authentication and Managing Users
❖
Enabling Authentication
To control administrators’ and users’ access to the machine, perform admin-
istrator authentication and user authentication using login user names and
login passwords. To perform authentication, the authentication function
must be enabled.
Reference
For details, see p.16 “Enabling Authentication”.
❖
Specifying Authentication Information to Log on
Users are managed using the personal information managed in the machine’s
address book.
By enabling user authentication, you can allow only people registered in the
address book to use the machine. Users can be managed in the address book
by the user administrator.
Reference
For details, see p.39 “Specifying Authentication Information to Log on”.
❖
Specifying Which Functions are Available
This can be specified by the user administrator. Specify the functions availa-
ble to registered users. By making this setting, you can limit the functions
available to users.
Reference
For details, see p.124 “Specifying Which Functions are Available”.
Preventing Information Leaks
❖
Guarding Against Unauthorized Copying (Unauthorized Copy Prevention)
Using the printer driver, you can embed mask and pattern in the printed doc-
ument.
Reference
For details, see p.73 “Guarding Against Unauthorized Copying”.
❖
Guarding Against Unauthorized Copying (Data Security for Copying)
Using the printer driver to enable data security for the copying function, you
can print a document with an embedded pattern of hidden text.
To gray out the copy or stored file of a copy-guarded document when the
document is copied or stored , the optional security module is required.
Содержание Aficio MP C2000
Страница 10: ...2 ...
Страница 80: ...Authentication and its Application 72 2 ...
Страница 108: ...Preventing Information Leaks 100 3 D Press Unlock Files E Press Yes F Press OK ...
Страница 158: ...Enhanced Network Security 150 5 ...
Страница 172: ...Specifying the Extended Security Functions 164 6 ...