2
1. Before Using the Security Function ...................................................................................4
1.1. Preface.........................................................................................................................4
1.2. Security Features .........................................................................................................4
1.3. Settings for the Secure Operation.................................................................................4
1.4. Data Restoration...........................................................................................................5
1.5. Starting use of the data encryption feature and changing the settings..........................5
1.6. For Optimal Performance of the Security features........................................................6
1.7. Confirm the Machine ROM version and Clock..............................................................7
1.7.1. How to check by Control Panel...........................................................................7
1.7.2. How to check by Print Report .............................................................................7
1.7.3. How to check the Clock......................................................................................7
2. Initial Setting Procedures...................................................................................................8
2.1. Use Passcode Entry from Control Panel ......................................................................8
2.2. Preparations for settings on the machine’s control panel..............................................8
2.3. Change the System Administrator Passcode................................................................8
2.4. Set Maximum Login Attempts.......................................................................................9
2.5. Set Service Rep. Restricted Operation.........................................................................9
2.6. Set Overwrite Hard Disk.............................................................................................10
2.7. Set Data Encryption....................................................................................................10
2.8. Set Scheduled Image Overwrite.................................................................................10
2.9. Set Authentication.......................................................................................................11
2.10. Set Private Print..........................................................................................................11
2.11. Set User Passcode Minimum Length..........................................................................11
2.12. Preparations for settings on the CentreWare Internet Services ..................................12
2.13. Disable SMB...............................................................................................................12
2.14. Creating a self-signed certificate (for SSL server) and SSL/TSL Client ....................12
2.15. Configuring Machine certificates.................................................................................12
2.16. Set IPSec ...................................................................................................................13
2.17. Set SNMPv3...............................................................................................................13
2.18. Set S/MIME ................................................................................................................14
2.19. Set Audit Log..............................................................................................................14
3. Authentication..................................................................................................................15
3.1. Overview of Authentication .........................................................................................15
3.1.1. Users Controlled by Authentication...................................................................15
3.1.2. Local Machine Authentication...........................................................................15
3.1.3. Functions Controlled by Authentication.............................................................16
3.2. Authentication for Mailboxes.......................................................................................17
3.2.1. Types of Mailboxes...........................................................................................17
4. Operation Using Control Panel........................................................................................19
4.1. User Authentication ....................................................................................................19
4.2. Create/View User Accounts........................................................................................19
4.3. Reset User Accounts..................................................................................................20
4.4. Change User Passcode..............................................................................................21
4.5. Mailbox/Stored Document Settings ..........................................................................21
4.5.1. Mailbox Service Settings ..................................................................................21
4.5.2. Stored Document Settings................................................................................21
4.6. Create Mailbox ...........................................................................................................22
4.7. Send from Mailbox......................................................................................................23
4.8. Private Charge Print ...................................................................................................24
5. Operation Using CentreWare Internet Services...............................................................25
5.1. Target Computers.......................................................................................................25
5.2. Accessing CentreWare Internet Services ...................................................................25
5.3. Print............................................................................................................................26
5.4. Mailbox.......................................................................................................................26