Security
Confidential information is handled by information devices everywhere, including computers and printers, and any of
these devices may become a target for malicious third parties at anytime. Attackers may directly gain unauthorized
access to your devices, or indirectly take advantage of negligence or improper use. Either way, you may incur
unanticipated losses when your confidential information is leaked. To counter these risks, the machine is equipped
with a variety of security functions. Set the necessary configuration depending on your environment.
◼
Establishing the Basics of Information Security
Protecting the Machine from Unauthorized Access(P. 89)
Security
88
3EEJ-01Y