External Authentication Server Control Requirements; Security Function Operation Setting Operating Requirements; Operation And Control Of The Machine - Konica Minolta BIZHUB C658 User Manual

Hide thumbs Also See for BIZHUB C658:
Table of Contents

Advertisement

1.3
Precautions for Operation Control
-
The administrator should have users ensure that the passwords set for the User Authentication, Secure
Print, and the box that can be used by the user are known only by the user concerned.
-
The administrator should have users change the passwords set for the User Authentication at regular
intervals.
-
The administrator of the machine should have the user administrator log on to the User Mode and
change his or her password in [Utility] - [User Settings] - [Change Password] if he or she changes the
password.
-
The administrator should make sure that any user does not set any number that can easily be guessed
from birthdays, employee identification numbers, and the like for the passwords set for the User Au-
thentication and Secure Print.
-
The administrator should disclose the Account Password to the user in accordance with the operating
environment of the machine and the security policies of the organization on his or her own responsibil-
ity.

External authentication server control requirements

The administrator and the server administrator are required to apply patches to, or perform account control
for, this machine and the external authentication server connected to the office LAN in which the machine is
installed to ensure operation control that achieves appropriate access control.
This machine can be used only after the user who uses this machine has been registered in the external au-
thentication server. The server administrator should also check registered users at regular intervals to thereby
ensure that any unnecessary users are left registered.

Security function operation setting operating requirements

The administrator should observe the following operating conditions.
-
The administrator should make sure that the machine is operated with the settings described in the in-
stallation checklist made properly in advance.
-
The administrator should make sure of correct operation control so that the machine is used with the
Enhanced Security Mode set to [ON].
-
The administrator should make sure of correct operation control so that the appropriate FW Update
(USB) Password is used with [FW Update (USB) Permission Setting] set to [Password Priority].
-
When the Enhanced Security Mode is turned [OFF], the administrator is to make various settings ac-
cording to the installation checklist and then set the Enhanced Security Mode to [ON] again. For details
of settings made by the service engineer, contact your service representative.
-
When the machine is to be discarded or use of a leased machine is terminated at the end of the leasing
contract, the administrator should use the Overwrite HDD Data function and the Overwrite All Data
function to thereby prevent data to be protected from leaking.

Operation and control of the machine

The administrator should perform the following operation control.
-
The administrator should log off from the Administrator Mode whenever the operation in the Adminis-
trator Mode is completed. The administrator of the machine should also make sure that each individual
user logs off from the User Authentication mode after the operation in the User Authentication mode is
completed, including operation of the Secure Print document, User Box, and User Box file.
-
During user registration and box registration, the administrator should make sure that the correct set-
tings are made for the correct users, including functional restrictions and box attributes.
-
The administrator should set the Encryption Key and FW Update (USB) Password according to the en-
vironment, in which this machine is used.
-
The administrator should appropriately control the device certificate (SSL certificate) registered in the
machine.
-
The administrator should ensure that no illegal connection or access is attempted when the machine is
to be connected to an external interface.
-
The administrator should appropriately control the file of Job Log (Audit Log) data downloaded to, for
example, a PC and ensure that none other than the administrator of the machine handle it.
-
The administrator should check the Job Log (Audit Log) data at appropriate timing, thereby determining
whether a security compromise or a faulty condition has occurred during an operating period.
-
When generating or deleting Job Log (Audit Log) and Job Log (Audit Log) data, the administrator should
check conditions of using this machine by the user.
bizhub C658/C558/C458
1
1-10

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Bizhub c558Bizhub c458

Table of Contents