Konica Minolta 7222 User Manual

Security
Hide thumbs Also See for 7222:

Advertisement

7222
User's Guide
7228
Security
7235

Advertisement

Table of Contents
loading

Summary of Contents for Konica Minolta 7222

  • Page 1 7222 User's Guide 7228 Security 7235...
  • Page 3 User’s Guide About the ROM version display function: The 7222/7228/7235 Control Software Version can be confirmed by using the service administrator (CE) 25-mode ROM version display function. When you display the ROM version, the control software version and the boot ROM version will be displayed on the same line.
  • Page 5: Table Of Contents

    Table of Contents Security Functions ......................1 Enhanced Security Mode....................2 Description of Enhanced Security mode ..................2 Data protected by Enhanced Security mode ................3 Display When Enhanced Security Mode Is On ..............4 Protect and Delete Data After Use..................6 Protect Data in the Document Folder from Access and Tampering ........7 Access to a User Box in Enhanced Security mode ..............
  • Page 7: Security Functions

    Security Functions The 7222/7228/7235 device has two security modes. Regular mode Use this mode if the machine is used by a single person and there is a low possibility of illicit access and operations. This is the default mode when shipped from the factory. To use regular mode, please see the user’s guide for each individual machine.
  • Page 8: Enhanced Security Mode

    Enhanced Security Mode Description of Enhanced Security mode The following items will have enhanced security. • Protect and delete used data in memory and on the HDD There are two kinds of image data that will be saved in memory and on the HDD: LZ compressed data and uncompressed data (TIFF and PDF formats).
  • Page 9: Data Protected By Enhanced Security Mode

    Enhanced Security Mode (continued) Data protected by Enhanced Security mode Data protected by Enhanced Security mode (for users) is as follows. Data saved in the User Box (with user ID and password) The following data administered by the Key Operator will also receive enhanced protection.
  • Page 10: Display When Enhanced Security Mode Is On

    Display When Enhanced Security Mode Is On The Key Operator can turn Enhanced Security mode ON/OFF. To turn Enhanced Security mode ON/OFF, see Security Key Operator Operation on page 20. When Enhanced Security mode is ON, the enhanced security icon [ ] will appear on the Copy/Scanner/Fax/Printer Basic Screens and on some screens of the Document Folder.
  • Page 11 Display When Enhanced Security Mode Is On (continued) Printer Basic Screen Check the Enhanced Security icon on each Basic Screen to see if Enhanced Security mode is ON or OFF. If Enhanced Security mode is OFF, data can potentially be accessed or tampered with, and this will not be recorded in an audit log, so be careful.
  • Page 12: Protect And Delete Data After Use

    Protect and Delete Data After Use Data from each mode (copy / scan / fax / printer) will be temporarily saved in memory or on the HDD, and it will be deleted unless it is moved to a Document Folder. Data is compressed using a special method, so it cannot be decompressed externally.
  • Page 13: Protect Data In The Document Folder From Access And Tampering

    Protect Data in the Document Folder from Access and Tampering To save and output data, use a User Box in the Document Folder. In Enhanced Security mode, setting up user ID and password conditions in a User Box will be tougher to improve security as follows. To protect data from access and tampering, it is recommended that you use a User Box in which a password has been set.
  • Page 14: Access To A User Box In Enhanced Security Mode

    Protect Data in the Document Folder from Access and Tampering (continued) Access to a User Box in Enhanced Security mode The following is a detailed explanation of how to access a User Box in Enhanced Security mode for which a user ID and password have been set. •...
  • Page 15 Protect Data in the Document Folder from Access and Tampering (continued) Enter user ID (when accessing a User Box for which a user ID has been set). Use the control panel keypad to enter the user ID designated by the Key Operator (4 to 8 numbers), and touch OK.
  • Page 16 Protect Data in the Document Folder from Access and Tampering (continued) Enter the password. Touch Password to display the Data Entry Screen. Use the control panel keypad to enter the password without touching Password, if it consists of numbers only Use the touch screen keypad and control panel keypad to enter the password (8 alphanumerical characters), and touch OK.
  • Page 17: Delete Data In The User Box In Enhanced Security Mode

    Protect Data in the Document Folder from Access and Tampering (continued) Delete data in the User Box in Enhanced Security mode The following is a detailed explanation of how to delete a document saved in a User Box. Procedure Touch Document Folder on any of the Copy/Fax/Printer Basic Screens. In copy mode, touch PRINT.
  • Page 18 Protect Data in the Document Folder from Access and Tampering (continued) Select the data (document) to delete. Touch the document key you want to delete. • If a password has been set for the selected document, a popup window will appear in which to enter the document password.
  • Page 19: Save Scanned Data / Change Box Password In Enhanced Security Mode

    Protect Data in the Document Folder from Access and Tampering (continued) Save scanned data / change Box password in Enhanced Security mode You can select a User Box in which to output scanned data. Regardless of whether or not a password has been set, access any box that a box number has been assigned to, set an enhanced password in Enhanced Security mode, and save data to the User Box.
  • Page 20 Protect Data in the Document Folder from Access and Tampering (continued) • You cannot create a new box number. If you want to change it, contact the Key Operator. • A default password will be displayed as "********." Enter 8 alphanumerical characters of your choice.
  • Page 21 Protect Data in the Document Folder from Access and Tampering (continued) Touch Password. The Data Entry Screen will appear. Enter the password and touch OK. If the box didn't have a password, the entered password will be set for the box. If the box already had a password, the entered password will overwrite the old one.
  • Page 22: Output Data In The Confidential Print Box

    Protect Data in the Document Folder from Access and Tampering (continued) Output data in the Confidential Print Box Confidential printing using a PC: To set up data output using the confidential printing function on PC, enter a user ID made up of 4-8 numbers. In Enhanced Security mode, enter a password made up of 8 alphanumerical characters as well.
  • Page 23 Protect Data in the Document Folder from Access and Tampering (continued) Touch OK. The screen will go back to the Confidential Print User ID/Password Entry Screen. Touch OK on the Confidential Print User ID/Password Entry Screen. Confidential printing will start. •...
  • Page 24: Output Data In The Fax Confidential Inbox

    Protect Data in the Document Folder from Access and Tampering (continued) Output data in the Fax Confidential Inbox Registering a confidential password/access protection number for the Fax Confidential Inbox: When registering the Fax Confidential Inbox, touch Confiden. P.W. (confidential password) and enter 1-4 numbers using the numeric keypad on the control panel. Touch Protect No to display the Data Entry Screen.
  • Page 25 Protect Data in the Document Folder from Access and Tampering (continued) Output data in Fax Confidential Inbox: Press [FAX] on the control panel to select Fax mode, and go to the Print File Screen on the Application to display the Confidential File List Screen. Touch PRINT or DELETE.
  • Page 26: Key Operator Security Functions

    Key Operator Security Functions The Key Operator turns Enhanced Security mode ON/OFF. To do so, an 8-digit Key Operator password must be set for the machine. Ask your authorized service representative to set up a Key Operator password. To protect data in the machine from access and tampering, it is recommended to designate a Key Operator and use Enhanced Security mode.
  • Page 27 Key Operator Security Functions (continued) On the Password Entry Screen, touch OK. The Key Operator Mode Screen will appear. On the Key Operator Mode Screen, touch 7. Enhanced Security. The Enhanced Security Setup Screen will appear. Touch 1. Enable Enhanced Security. The Enable Enhanced Security Screen will appear.
  • Page 28 Key Operator Security Functions (continued) Turn Enhanced Security mode ON or OFF. If you want to turn Enhanced Security mode ON, touch ON to highlight it. If you want to turn it OFF, touch OFF to highlight it. Touch OK. The Restart Confirmation popup screen will appear.
  • Page 29: Register/Edit User Id And Password In The User Box

    Key Operator Security Functions (continued) Register/edit user ID and password in the User Box The following is an explanation of how to access the screen to register/edit a User Box in Enhanced Security mode, and accompanying precautions. Procedures Press [COPY] on the control panel to display the Copy Screen. Press [HELP].
  • Page 30 Key Operator Security Functions (continued) • Passwords are case sensitive. • If a wrong password or fewer than 8 alphanumerical characters are entered and the OK key is touched, the warning message Password does not match" will appear, and no key will work for five seconds. Enter the right password after five seconds.
  • Page 31 Key Operator Security Functions (continued) A password should be set up in each box, and please pay extra attention to the following if Enhanced Security mode is turned ON. System Box password: 8 alphanumerical characters (case sensitive) Fewer than 8 characters will not be accepted. Duplicate passwords cannot be used.
  • Page 32: Print Audit Log

    Key Operator Security Functions (continued) Print audit log If Enhanced Security mode is turned ON, an audit log will be automatically created. The following is an explanation of how to print the automatically created audit log. Procedure Press [COPY] on the control panel to display the Copy Screen. Press [HELP].
  • Page 33 Key Operator Security Functions (continued) On the Key Operator Mode Screen, touch 7. Enhanced Security. The Enhanced Security Setup Screen will appear. Touch 2. Audit log print. The Audit Log Print Screen will appear. Select the output format you want, and touch the key to highlight it. Audit log report (latest 1,000 logs): The latest of up to 1,000 log entries will be printed in the audit log report.
  • Page 34 Key Operator Security Functions (continued) Audit log report (specify): Display the Log Specification Setting Screen, specify the date and time when audit log entries were created and the number to print. If you combine this with "Audit log report (Authentication error)," you can obtain only the necessary entries around the time an authentication error occurred.
  • Page 35: Analyze Audit Log

    Key Operator Security Functions (continued) Analyze audit log Audit logs need to be analyzed by the Key Operator regularly or when unauthorized access and tampering of data saved in the machine in Enhanced Security mode is noticed. Audit log entries can be output in four different formats as explained on pages 27 to 28. Keep the individual characteristics in mind when printing logs for analysis.
  • Page 36: Table Of Items Saved In Audit Log

    Key Operator Security Functions (continued) Table of items saved in audit log Operation Action ID Result 1 CE authentication CE ID 01: CE_ID (fixed) OK/NG 2 Key Operator authentication Key Operator ID 02: Key Operator ID (fixed) OK/NG 3 Set/change Enhanced Security mode Key Operator ID 03: Set/change security mode 4 Print audit log...
  • Page 37 Key Operator Security Functions (continued) Specify unauthorized actions: password authentication If logs have NG as the result of password authentication (action ID: 01, 02, 11, 16, 17), items protected by passwords may have been attacked. • Failed password authentication (NG) log entries specify who made the operation, and show if unauthorized actions were made when password authentication failed.

This manual is also suitable for:

72287235

Table of Contents