2
Table of Contents
Before Using the Security Function .................................................................. 5
Preface
.......................................................................................................................................................5
Security Features
...................................................................................................................................6
Settings for the Secure Operation
................................................................................................6
Data Restoration
...................................................................................................................................7
Starting use of the data encryption feature and changing the settings
...................7
Use of the Overwrite Hard Disk
......................................................................................................8
Service Representative Restricted Operation
..........................................................................8
For Optimal Performance of the Security features
..............................................................9
Confirm the Machine ROM version and the System Clock
............................................ 10
How to check by Control Panel......................................................................................... 10
How to check by Print Report ............................................................................................ 10
How to check the Clock........................................................................................................ 10
Initial Settings Procedures Using Control Panel...................................... 11
Authentication for entering the System Administration mode
................................... 11
Change the System Administrator’s Passcode
.................................................................... 11
Set Maximum Login Attempts
..................................................................................................... 11
Set Service Rep. Restricted Operation
...................................................................................... 12
Set Overwrite Hard Disk
.................................................................................................................. 12
Set Scheduled Image Overwrite
................................................................................................. 12
Set Authentication
............................................................................................................................ 13
Set Access Control
............................................................................................................................. 13
Set Private Print
.................................................................................................................................. 13
Set User Passcode Minimum Length
........................................................................................ 14
Initial Settings Procedures Using CentreWare Internet Services .... 15
Preparations for settings on the CentreWare Internet Services
................................. 15
Set SMB
................................................................................................................................................... 15
Set SSL/TSL
........................................................................................................................................... 16
Configuring Machine certificates
............................................................................................... 16
Set IPSec
................................................................................................................................................ 17
Set IPSec Address .................................................................................................... 17
Set SNMPv3
.......................................................................................................................................... 18
Set S/MIME
........................................................................................................................................... 19
Regular Review by Audit Log ............................................................................ 20
Set Audit Log
........................................................................................................................................ 20
Import the Audit Log File
............................................................................................................... 20
Authentication for the Secure Operation ................................................... 21
Overview of Authentication
.......................................................................................................... 21
Users Controlled by Authentication ............................................................................... 21
Machine Administrator ........................................................................................................ 21