TABLE OF CONTENTS
How to Read This Manual.................................................................................................................................6
Symbols...........................................................................................................................................................6
IP Address.......................................................................................................................................................6
List of Options.................................................................................................................................................6
Manuals for This Printer......................................................................................................................................8
1. Getting Started
Before Using the Security Functions................................................................................................................11
Setting Up the Printer........................................................................................................................................
12
Enhanced Security............................................................................................................................................13
Glossary............................................................................................................................................................14
Security Measures Provided by this Printer....................................................................................................16
Using Authentication and Managing Users...............................................................................................16
Ensuring Information Security.....................................................................................................................16
Limiting and Controlling Access..................................................................................................................17
Enhanced Network Security.......................................................................................................................17
2. Configuring Administrator Authentication
Administrators...................................................................................................................................................19
User Administrator.......................................................................................................................................19
Machine Administrator................................................................................................................................20
Network Administrator................................................................................................................................20
File Administrator.........................................................................................................................................20
Supervisor.....................................................................................................................................................20
About Administrator Authentication................................................................................................................21
Enabling Administrator Authentication...........................................................................................................22
Using Web Image Monitor to Configure Administrator Authentication..................................................22
Specifying Administrator Privileges............................................................................................................23
Registering the Administrator......................................................................................................................24
Logging in Using Administrator Authentication.........................................................................................25
Logging out Using Administrator Authentication.......................................................................................25
Changing the Administrator........................................................................................................................25
3. Configuring User Authentication
Users..................................................................................................................................................................27
About User Authentication...............................................................................................................................28
1