External Authentication Server Control Requirements; Security Function Operation Setting Operating Requirements; Operation And Control Of The Machine - Konica Minolta BIZHUB 367 User Manual

Hide thumbs Also See for BIZHUB 367:
Table of Contents

Advertisement

1.3
Precautions for Operation Control
-
The administrator should make sure that any user does not set any number that can easily be guessed
from birthdays, employee identification numbers, and the like for the passwords set for the User Au-
thentication and Secure Print.
-
The administrator should disclose the Account Password to the user in accordance with the operating
environment of the machine and the security policies of the organization on his or her own responsibil-
ity.

External authentication server control requirements

The administrator of the machine and the server administrator are required to apply patches to, or perform
account control for, this machine and the external authentication server connected to the office LAN in which
the machine is installed to ensure operation control that achieves appropriate access control.
This machine can be used only after the user who uses this machine has been registered in the external au-
thentication server. The server administrator should also check registered users at regular intervals to thereby
ensure that any unnecessary users are left registered.

Security function operation setting operating requirements

The administrator of the machine should observe the following operating conditions.
-
The administrator of the machine should make sure that the machine is operated with the settings de-
scribed in the installation checklist made properly in advance.
-
The administrator of the machine should make sure of correct operation control so that the machine is
used with the Enhanced Security Mode set to [ON].
-
When the Enhanced Security Mode is turned [OFF], the administrator of the machine is to make various
settings according to the installation checklist and then set the Enhanced Security Mode to [ON] again.
For details of settings made by the service engineer, contact your service representative.
-
When the machine is to be discarded or use of a leased machine is terminated at the end of the leasing
contract, the administrator of the machine should use the Overwrite HDD Data function and the Over-
write All Data function to thereby prevent data to be protected from leaking.

Operation and control of the machine

The administrator of the machine should perform the following operation control.
-
The administrator of the machine should log off from the Administrator Settings whenever the operation
in the Administrator Settings is completed. The administrator of the machine should also make sure that
each individual user logs off from the User Authentication mode after the operation in the User Authen-
tication mode is completed, including operation of the Secure Print document, User Box, and User Box
file.
-
During user registration and box registration, the administrator of the machine should make sure that
the correct settings are made for the correct users, including functional restrictions and box attributes.
-
The administrator of the machine should set the Encryption Key according to the environment, in which
this machine is used.
-
The administrator of the machine should appropriately control the device certificate (SSL certificate)
registered in the machine.
-
The administrator of the machine should ensure that no illegal connection or access is attempted when
the machine is to be connected to an external interface.
-
The administrator of the machine should appropriately control the file of Job Log (Audit Log) data down-
loaded to, for example, a PC and ensure that none other than the administrator handles it.
-
The administrator of the machine should check the Job Log (Audit Log) data at appropriate timing,
thereby determining whether a security compromise or a faulty condition has occurred during an oper-
ating period.
-
When generating or deleting Job Log (Audit Log) and Job Log (Audit Log) data, the administrator of the
machine should check conditions of using this machine by the user.
-
The administrator of the machine should make sure that each individual user updates the OS of the us-
er's terminal and applications installed in it to eliminate any vulnerabilities.
-
The administrator of the machine should set the account track and make sure that the machine is op-
erated through operative association with the account track.
-
The administrator of the machine should delete cache following the procedure specified for each
browser when seeing previews on a web browser because the contents can be cached on PCs and
make sure that users perform the same procedure.
bizhub 367/287/227
1
1-9

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Bizhub 287Bizhub 227

Table of Contents