Fuji Xerox ApeosPort-IV C7780 Administrator's Manual page 292

Hide thumbs Also See for ApeosPort-IV C7780:
Table of Contents

Advertisement

5 Tools
Prerequisite for Using the Data Security feature
The system administrator must follow the instructions below:
To protect the data deleted from or stored on the hard disk, the following settings are
required:
- Number of Overwrites: [1 Overwrite] or [3 Overwrites]
- Data Encryption: [On]: an encryption key of 12 digits
- Service Representative Restricted Operation: [Yes]
Change the system administrator's factory default passcode (x-admin). Register a new
passcode of 7 characters or more (maximum 12 characters). Be careful not to register a
passcode that can be easily assumed and not to store the registered passcode on a location
that is easily accessible to other persons.
Important • If the system administrator's user ID and passcode are forgotten, the machine configuration
Set [Passcode Entry from Control Panel] to [On].
Set [Maximum Login Attempts by System Administrator] to 5 times.
Note that the hard disk security will not be warranted if you do not correctly follow the above
setting instructions.
For more information on how to set data encryption, refer to "Data Encryption" (P.178).
For more information on how to set service representative restricted operation, refer to "Service Rep.
Restricted Operation" (P.179).
For more information on how to set passcode entry from control panel, refer to "Passcode Policy"
(P.288).
5
For more information on how to set the system administrator's user ID, refer to "System Administrator's
Login ID" (P.283).
The manager (of the organization that this machine is used for) must follow the instructions
below:
Assign an appropriate person as a system administrator and manage and train the person
properly.
When turning off the machine, make sure no operation is running. Train the users to turn off
the machine after an active operation completes, if any.
Note that the Data Security feature is used to protect deleted document data from being
recovered; it does not protect files stored in folders in the hard disk.
Install an anti-bugging device on the internal network that the machine with the Data Security
feature is located on, and perform the network settings properly to protect the machine from
interceptions.
To block unauthorized access, install a firewall device between the external network and the
internal network that the machine is located on.
Set the passcode and encryption key according to the following rules:
- Do not use easily assured character string
- Use both characters and numerics
For more information on encryption key, refer to "Encryption Key for Confidential Data" (P.179).
292
will not be able to recover in case of malfunction.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents