2
Table of Contents
Before Using the Security Function..................................................................5
Preface .......................................................................................................................................................5
Security Features...................................................................................................................................6
Settings for the Secure Operation ................................................................................................6
Data Restoration...................................................................................................................................7
Starting use of the data encryption feature and changing the settings...................7
Use of the Overwrite Hard Disk......................................................................................................8
Service Representative Restricted Operation ..........................................................................8
For Optimal Performance of the Security features ..............................................................9
Confirm the Machine ROM version and the System Clock ............................................ 10
How to check by Control Panel.........................................................................................10
How to check by Print Report............................................................................................10
How to check the Clock........................................................................................................ 10
Initial Settings Procedures Using Control Panel...................................... 11
Authentication for entering the System Administration mode...................................11
Change the System Administrator’s Passcode .................................................................... 11
Set Maximum Login Attempts.....................................................................................................11
Set Service Rep. Restricted Operation......................................................................................12
Set Overwrite Hard Disk..................................................................................................................12
Set Scheduled Image Overwrite .................................................................................................12
Set Authentication ............................................................................................................................ 13
Set Access Control .............................................................................................................................13
Set Private Print .................................................................................................................................. 13
Set User Passcode Minimum Length........................................................................................14
Initial Settings Procedures Using CentreWare Internet Services .... 15
Preparations for settings on the CentreWare Internet Services ................................. 15
Set SMB................................................................................................................................................... 15
Set SSL/TSL ...........................................................................................................................................16
Configuring Machine certificates............................................................................................... 16
Set IPSec ................................................................................................................................................ 17
Set IPSec Address .................................................................................................... 17
Set SNMPv3.......................................................................................................................................... 18
Set S/MIME...........................................................................................................................................19
Regular Review by Audit Log ............................................................................ 20
Set Audit Log........................................................................................................................................ 20
Import the Audit Log File............................................................................................................... 20
Authentication for the Secure Operation ................................................... 21
Overview of Authentication..........................................................................................................21
Users Controlled by Authentication............................................................................... 21
Machine Administrator........................................................................................................ 21