2-69
Installing and Setting up the Machine > Additional Preparations for the Administrator
Strengthening the Security
This machine is shipped with two default users registered one with Machine Administrator rights, and another
with Administrator rights.Logging in as this user will allow you to configure all settings; therefore, please change
the login user name and password.
In addition, this machine is equipped with user authentication function, which can be configured to limit the
access to this machine to only those who have a registered login name and password.
User Authentication and Accounting (User Login, Job Accounting) (page 9-1)
This product has an optional security chip called TPM (UG-50) (Trusted Platform Module). The encryption key
used to encrypt confidential information on this machine is stored in a dedicated storage area on the TPM chip.
Since this storage area cannot be read from outside the TPM, confidential information can be safely protected.
I want to... Function Reference
page
Restrict the users of the machine. User Login page 9-2
Authentication Security page 9-4
Auto Panel Reset page 8-8
ID Card Settings
*1
*1 The optional Card Authentication Kit is required.
page 9-29
Restrict the basic functions that can be used. Local Authorization page 9-16
Group Authorization Set. page 9-19
Guest Authorization Set. page 9-21
Prevent another user from handling the
documents stored in the machine.
Custom Box
*2
*2 The optional SSD is required.
page 5-50
Output the document stored in the machine
at the time when user operates the device via
operation panel.
Remote Printing page 8-35
Prevent the data stored in the machine from
being leaked.
Data Overwrite
*3
*3 The optional Data Security Kit is required.
Refer to the Data
Security Kit (E)
Operation
Guide.
Encryption
*3
PDF Encryption Functions page 6-39
Completely delete the data on the machine
before disposing of the machine.
Data Sanitization page 8-59