![Xerox D95 Скачать руководство пользователя страница 6](http://html2.mh-extra.com/html/xerox/d95/d95_supplementary-manual_3579741006.webp)
ii
Xerox
®
D95/D110/D125 Copier/Printer Security Function Supplementary Guide
Set SMB ................................................................................................................................................... 17
Set Xerox
®
FreeFlow
®
....................................................................................................................... 18
Set WebDAV ......................................................................................................................................... 18
Set Receive E-mail .............................................................................................................................. 18
Set IPP ..................................................................................................................................................... 18
Set LDAP Server ................................................................................................................................... 19
Set Kerberos Server ............................................................................................................................ 19
Set SSL/TSL ............................................................................................................................................ 20
Configuring Machine Certificates ............................................................................................... 20
Set IPSec ................................................................................................................................................. 21
Set IPSec Address ............................................................................................................................... 21
Set SNMPv3 ........................................................................................................................................... 22
Set S/MIME ........................................................................................................................................... 23
Set Browser Refresh ........................................................................................................................... 23
Set Job Deletion .................................................................................................................................. 24
Regular Review by Audit Log ......................................................................... 25
Set Audit Log ........................................................................................................................................ 25
Import the Audit Log File ................................................................................................................ 26
Self Testing .......................................................................................................... 27
Set Self Test .......................................................................................................................................... 27
Authentication for the Secure Operation ................................................ 29
Overview of Authentication ........................................................................................................... 29
Users Controlled by Authentication ............................................................................... 29
Machine Administrator ........................................................................................................ 29
Authenticated Users (with System Administrator Privileges) ............................. 30
Authenticated Users (with No System Administrator Privileges) ...................... 30
Unauthenticated Users ....................................................................................................... 30
Local Machine Authentication (Login to Local Accounts) ................................................ 30
Remote Authentication (Login to Remote Accounts)......................................................... 30
Functions Controlled by Authentication ................................................................................... 31
Authentication for Folder ................................................................................................................ 32
Types of Folder ........................................................................................................................ 32
Operation Using Control Panel .................................................................... 35
User Authentication .......................................................................................................................... 35
Create/View User Accounts ............................................................................................................ 36
Change User Passcode by General User ................................................................................... 37
Job Deletion by System Administrator ...................................................................................... 38
Folder / Stored File Settings ........................................................................................................... 38
Folder Service Settings ......................................................................................................... 38