Generating a Device Signature Certificate(P. 643)
Registering a User Signature Certificate(P. 644)
Generating a Key and Certificate Signing Request (CSR)(P. 671)
<Display Job Status Before Authentication>
<Management Settings>
Select whether to restrict access to the <Status Monitor/Cancel> screen when using a login service.
<Restrict Access to Other User Jobs>
<Management Settings>
Select whether to restrict users from performing operations on the jobs of other users on the <Status Monitor/
Cancel> screen when User Authentication is used.
<Display Job Log>
<Management Settings>
Select whether to display job logs on the <Status Monitor/Cancel> screen. You can also select whether to allow
device management software to retrieve job logs from the machine.
Display(P. 94)
<Save Audit Log>
<Management Settings>
Select whether to start log recording. For information on the types of logs, see
Starting Log Recording(P. 680)
Specifications(P. 1029)
●
If this is set to <On>, the
<Retrieve Network Authentication Log>
<Management Settings>
Select whether to start log recording for authentication performed when the machine is accessed via the
network, such as when printing from a computer or accessing the Advanced Box.
<Store Key Operation Log>
<Management Settings>
Select whether to save a log of the key operations performed by users. By analyzing the stored logs, you can
survey how the machine is being used.
●
When the log is output, PINs, passwords, and information obfuscated by the settings for <Restrict
Access to Other User Jobs>, etc., are output as masked characters. Therefore, confidential information
cannot be leaked externally.
Settings/Registration
<Device Management>
<Device Management>
<Device Management>
<Device Management>
<Adjust Time>(P. 738) setting cannot be used.
<Device Management>
<Device Management>
811
Basic Screens on the Touch Panel
Specifications(P. 1029) .