2-38
Installing and Setting up the Machine > Additional Preparations for the Administrator
Additional Preparations for the Administrator
In addition to the information provided in this chapter, the administrator of this machine should check the following, and
configure the settings as needed.
Strengthening the Security
This machine is shipped with two default users registered one with Machine Administrator rights, and another with
Administrator rights.Logging in as this user will allow you to configure all settings; therefore, please change the login
user name and password.
In addition, this machine is equipped with user authentication fun
ction, which can be configured to limit the access to this
machine to only those who have a registered login name and password.
User Authentication and Accounting (User Login, Job Accounting) (page 9-1)
I want to... Function Reference page
Restrict the users of the machine. User Login page 9-2
Auto Panel Reset page 8-32
ID Card Settings
*1
*1 The optional Card Authentication Kit is required.
page 9-11
Prevent another user from handling the
documents stored in the machine.
Custom Box
*2
*2 The optional SSD is required.
page 5-5
Prevent the data stored in the machine from
being leaked.
Data Overwrite
*3
*3 It is necessary to activate the Data Security Function.
Data
Encryption/
Overwrite
OPERATION
GUIDE
Encryption
*3
Completely delete the data on the machine
before disposing of the machine.
DataSanitization page 8-37
Protect the transmission from interception and
wiretapping.
IPP over SSL page 8-20
HTTPS page 8-20
SMTP Security
Command
Center RX User
Guide
POP3 Security
Command
Center RX User
Guide
IPSec page 8-28
SNMPv3 page 8-18