Security Functions; Check Count Clear Conditions - Konica Minolta BIZHUB C658 User Manual

Hide thumbs Also See for BIZHUB C658:
Table of Contents

Advertisement

1.2

Security Functions

1.2
Security Functions
Setting the Enhanced Security Mode to [ON] will validate the security function of this machine. For details of
the settings of different security functions to be changed by turning [ON] the Enhanced Security Mode, see
page 2-12.
The following the major security functions when the Enhanced Security Mode is set to [ON].
Function
Identification and au-
thentication function
User limiting function
HDD encryption function
Auditing function
Residual information de-
leting function
Network communication
protecting function

Check Count Clear Conditions

In the Enhanced Security Mode, the number of wrong entries at the time of authentication is checked. The
following is the conditions for clearing or resetting the number.
<Administrator Authentication>
-
Authentication of Administrator of the machine is successful.
<User Authentication Mode>
-
Authentication of User Administrator is successful.
-
User Authentication mode is successful.
-
Release of Prohibited Functions When Authentication Error is executed.
<Account Track Mode>
-
Account Track mode is successful.
-
Release of Prohibited Functions When Authentication Error is executed.
bizhub C658/C558/C458
Description
Access control is then provided through password authentication for any ac-
cess to the Administrator Mode, User Authentication mode, User Box, a User
Box data file, and a Secure Print document. Access is thereby granted only
to the authenticated user. A password that can be set must meet the Pass-
word Rules. The machine does not accept setting of an easily decipherable
password. For details of the Password Rules, see page 1-13.
If a wrong password is entered, during password authentication, a predeter-
mined number of times (once to three times.) or more set by the administra-
tor, the machine determines that it is unauthorized access through Prohibited
Functions When Authentication Error, prohibiting any further entry of the
password. By prohibiting the password entry operation, the machine pre-
vents unauthorized use or removal of data. The administrator is responsible
for resetting the prohibition of the password entry operation. For details, see
page 2-25.
Specific functions to be used by each user/account may be limited. For de-
tails, see page 2-39.
By setting the Encryption Key, the data stored in the HDD is encrypted, there-
by protecting the data in the HDD. For details, see page 2-66.
Information including operations performed on the machine and a job history
can be stored in the HDD. Setting the Job Log (Audit Log) allows an illegal
act or inadequate operation performed on the machine to be traced. The ob-
tained Job Log can be downloaded and viewed from the Web Connection.
For details, see page 2-77.
When the machine is to be discarded or use of a leased machine is terminat-
ed at the end of the leasing contract, setting of the Overwrite HDD Data func-
tion while the machine was in use allows residual unnecessary data to be
deleted, because the machine overwrites a specific overwrite value over the
unnecessary data. This prevents data leakage. (Passwords, addresses, and
other data set while the machine was in use should, however, be deleted
manually.) For details, see page 2-72.
To delete data including the passwords, addresses, and other data all at
once, the Overwrite All Data function overwrites and erases all data stored in
all spaces of the HDD. The function also resets all passwords saved in the
flash memory and eMMC to factory settings, preventing data from leaking.
For details, see page 2-74. For details of items to be cleared by Overwrite All
Data function, see page 1-16.
Communication data transmitted to or from the machine and client PC can
be encrypted using the IPsec, which prevents information leakage through
sniffing over the network. For details, see page 2-95.
1
1-7

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Bizhub c558Bizhub c458

Table of Contents