Konica-minolta bizhub 654e Bedienungsanleitung Seite 2

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 58
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 1
bizhub 754e/654e Contents-1
Contents
1 Security
1.1 Introduction ..................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ......................................................................................... 1-2
Operating Precautions ....................................................................................................................... 1-2
INSTALLATION CHECKLIST.............................................................................................................. 1-3
1.2 Security Functions .......................................................................................................................... 1-4
Check Count Clear Conditions .......................................................................................................... 1-4
1.3 Data to be Protected ...................................................................................................................... 1-5
1.4 Precautions for Operation Control................................................................................................ 1-6
Roles and Requirements of the Administrator................................................................................... 1-6
Password Usage Requirements ........................................................................................................ 1-6
Network Connection Requirements for the Machine......................................................................... 1-6
Security function operation setting operating requirements.............................................................. 1-6
Operation and control of the machine ............................................................................................... 1-7
Machine Maintenance Control........................................................................................................... 1-7
Implementing digital signature properly............................................................................................. 1-7
Operating conditions for the IC card and IC card reader .................................................................. 1-7
IC card owner requirements .............................................................................................................. 1-8
1.5 Miscellaneous.................................................................................................................................. 1-9
Password Rules ................................................................................................................................. 1-9
Precautions for Use of Various Types of Applications....................................................................... 1-9
Encrypting communications .............................................................................................................. 1-9
Items of Data Cleared by Overwrite All Data Function ...................................................................... 1-9
Fax functions.................................................................................................................................... 1-10
General functions and operations.................................................................................................... 1-10
2 Administrator Operations
2.1 Accessing the Administrator Settings .......................................................................................... 2-2
2.1.1 Accessing the Administrator Settings................................................................................................ 2-2
2.1.2 Accessing the User Mode.................................................................................................................. 2-4
2.2 Enhancing the Security Function................................................................................................... 2-6
2.2.1 Items cleared by HDD Format ........................................................................................................... 2-7
2.2.2 Setting the Password Rules............................................................................................................... 2-8
2.2.3 Setting the Enhanced Security Mode .............................................................................................. 2-10
2.3 Preventing Unauthorized Access ................................................................................................ 2-12
Setting Prohibited Functions When Authentication Error ................................................................ 2-12
2.4 Setting the External Server .......................................................................................................... 2-14
Setting the External Server .............................................................................................................. 2-14
2.5 System Auto Reset Function ....................................................................................................... 2-17
Setting the System Auto Reset function.......................................................................................... 2-17
2.6 Changing the Administrator Password....................................................................................... 2-19
Changing the Administrator Password ............................................................................................ 2-19
2.7 Protecting Data in the HDD.......................................................................................................... 2-21
2.7.1 Setting the Encryption Key (encryption word) ................................................................................. 2-21
2.7.2 Changing the Encryption Key .......................................................................................................... 2-25
2.8 Overwrite All Data Function ......................................................................................................... 2-27
Setting the Overwrite All Data function............................................................................................ 2-27
2.9 S/MIME Communication Setting Function ................................................................................. 2-29
Setting the S/MIME Communication ............................................................................................... 2-29
2.10 PC-Fax RX Setting Function ........................................................................................................ 2-32
PC-Fax RX Setting........................................................................................................................... 2-32
2.11 TSI User Box Setting Function..................................................................................................... 2-34
TSI User Box Setting........................................................................................................................ 2-34
Seitenansicht 1
1 2 3 4 5 6 7 ... 57 58

Kommentare zu diesen Handbüchern

Keine Kommentare