Installing and Setting up the Machine > Strengthening the Security by the Administrator
Strengthening the Security by the Administrator
In addition to the information provided in this chapter, the administrator of this machine should check the following, and
strengthen the security as needed.
In addition, this machine is equipped with user authentication function, which can be configured to limit the access to this
machine to only those who have a registered login name and password.
User Authentication and Accounting (User Login, Job Accounting) (9-1)
I want to...
Restrict the users of the machine.
Restrict the basic functions that can be
used.
Prevent another user from handling the
documents stored in the machine.
Prevent the data stored in the machine
from being leaked.
Completely delete the data on the
machine before disposing of the
machine.
Protect the transmission from
interception and wiretapping.
*1 Optional Card Authentication Kit is required.
*2 Optional SSD is required.
*3 Optional Data Security Kit is required.
Function Name
User Login
Authentication Security
Auto Panel Reset
*1
ID Card Settings
Local Authorization
Group Authorization Set
Guest Authorization Set
*2
Custom Box
*3
Data Overwrite
*3
Encrypt
PDF Encryption Functions
Data Sanitization
IPP over SSL
HTTPS
LDAP Security
SMTP Security
POP3 Security
FTP Encrypted TX
Enhanced WSD (SSL)
IPSec
SNMPv3
2-41
Reference page
9-3
9-6
8-58
9-26
9-17
9-17
9-20
2-1
Data Security Kit (E)
User Guide
6-54
8-55
8-45
8-44
Command Center RX
User Guide
8-48
8-48
8-17
8-47
8-41
8-43