Table Of Contents - Xerox WorkCentre 5222 Supplementary Manual

Xerox workcentre security function supplementary guide
Hide thumbs Also See for WorkCentre 5222:
Table of Contents

Advertisement

1.
Before Using the Security Function ...................................................................................4
1.1.
Preface .........................................................................................................................4
1.2.
Security Features .........................................................................................................4
1.3.
Settings for the Secure Operation.................................................................................4
1.4.
Data Restoration...........................................................................................................5
1.5.
1.6.
For Optimal Performance of the Security features ........................................................6
1.7.
Confirm the Machine ROM version and Clock ..............................................................7
1.7.1.
How to check by Control Panel...........................................................................7
1.7.2.
How to check by Print Report .............................................................................7
1.7.3.
How to check the Clock ......................................................................................7
2.
Initial Setting Procedures...................................................................................................8
2.1.
Use Passcode Entry from Control Panel ......................................................................8
2.2.
Preparations for settings on the machine's control panel..............................................8
2.3.
Change the System Administrator Passcode................................................................8
2.4.
Set Maximum Login Attempts .......................................................................................9
2.5.
Set Service Rep. Restricted Operation .........................................................................9
2.6.
Set Overwrite Hard Disk .............................................................................................10
2.7.
Set Data Encryption....................................................................................................10
2.8.
Set Scheduled Image Overwrite .................................................................................10
2.9.
Set Authentication....................................................................................................... 11
2.10. Set Private Print.......................................................................................................... 11
2.11. Set User Passcode Minimum Length.......................................................................... 11
2.13. Disable SMB...............................................................................................................12
2.15. Configuring Machine certificates.................................................................................12
2.16. Set IPSec ...................................................................................................................13
2.17. Set SNMPv3...............................................................................................................13
2.18. Set S/MIME ................................................................................................................14
2.19. Set Audit Log ..............................................................................................................14
3.
Authentication..................................................................................................................15
3.1.
Overview of Authentication .........................................................................................15
3.1.1.
Users Controlled by Authentication...................................................................15
3.1.2.
Local Machine Authentication ...........................................................................15
3.1.3.
Functions Controlled by Authentication.............................................................16
3.2.
Authentication for Mailboxes.......................................................................................17
3.2.1.
Types of Mailboxes...........................................................................................17
4.
Operation Using Control Panel ........................................................................................19
4.1.
User Authentication ....................................................................................................19
4.2.
Create/View User Accounts ........................................................................................19
4.3.
Reset User Accounts ..................................................................................................20
4.4.
Change User Passcode..............................................................................................21
4.5.
Mailbox/Stored Document Settings ..........................................................................21
4.5.1.
Mailbox Service Settings ..................................................................................21
4.5.2.
Stored Document Settings ................................................................................21
4.6.
Create Mailbox ...........................................................................................................22
4.7.
Send from Mailbox......................................................................................................23
4.8.
Private Charge Print ...................................................................................................24
5.
Operation Using CentreWare Internet Services ...............................................................25
5.1.
Target Computers .......................................................................................................25
5.2.
Accessing CentreWare Internet Services ...................................................................25
5.3.
Print ............................................................................................................................26
5.4.
Mailbox .......................................................................................................................26
2

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents