Getting Started; Before Configuring The Security Function Settings - Ricoh Pro C9100 Operating Instructions Manual

Hide thumbs Also See for Pro C9100:
Table of Contents

Advertisement

1. Getting Started

This chapter describes the precautions you need to take when using the machine's security features and
how to configure the administrator settings.
Before Configuring the Security Function
Settings
• If the security settings are not configured, the data in the machine is vulnerable to attack.
• To prevent this machine from being stolen or willfully damaged, install it in a secure location.
• Purchasers of this machine must make sure that people who use it do so appropriately, in
accordance with operations determined by the machine administrator and supervisor. If the
administrator or supervisor does not make the required security settings, there is a risk of security
breaches by users.
• Before setting this machine's security features and to ensure appropriate operation by users,
administrators must read the Security Guide completely and thoroughly, paying particular attention
to the section entitled "Before Configuring the Security Function Settings".
• Administrators must inform users regarding proper usage of the security functions.
• If this machine is connected to a network, its environment must be protected by a firewall or similar.
• For protection of data during the communication stage, apply the machine's communication
security functions and connect it to devices that support security functions such as encrypted
communication.
• Administrators should regularly examine the machine's logs to check for irregular and unusual
events.
7

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pro c9110

Table of Contents