e-ManualTopSite mapHelpGlossary

Category Top

Preventing Unauthorized Access

Increasing Security

Network Security

Key Pair and Server Certificate Settings for Encrypted SSL Communication

Generating a Key Pair and Server Certificate

Registering a Key Pair File and Server Certificate File Installed from a Computer

Editing Key Pairs and Server Certificates

Registering/Editing a CA Certificate File

Verifying Certificate Validity Using Certificate Revocation List

Network Settings/Management when Using an Advanced Box

MEAP Settings

Using the SSL

Printing Installed Application Information

Preventing Information Leakage

Digital Signatures

Setting/Confirming a Key Pair and Device Certificate

Confirming a Key Pair and User Certificate

Checking a Device Signature/User Signature Certificate

Setting a Rights Management Server

Forced Secure Watermark/Document Scan Lock

Secure Watermark (Forced Secure Watermark/Printer Driver Secure Watermark)

Adjusting the Secure Watermark Contrast

Document Scan Lock Settings

Specifying the Document Scan Lock Operational Settings
Setting the Document Scan Lock Mode
Adjusting the TL Code

Copy Set Numbering Options

Accepting Only Encrypted Secure Printing

Restricting the Send Function

Setting the Address Book

Mail Box Settings

Specifying Settings for All Mail Boxes

Specifying the Mail Box Security Settings

Setting the Control Panel Display

Managing the Setting Information Registered in the Machine

Specifying Management Settings for the Memory

Completely Erasing Unnecessary Data from the Memory

Initializing All Data/Settings

TPM Settings

Device Management

Using the USB Port

Device Information Settings

Specifying Device Information Distribution Settings

Registering/Deleting/Printing Distribution Destinations

Setting the Receiving Machine

Setting Automatic Distribution

Setting Manual Distribution

Checking/Printing the Communication Log

Limiting Functions

Remote UI

Clearing the Message Board

Saving a Log of Key Operations

Starting the Setup Guide

Retrieving Audit Logs

IEEE 2600 Security Standard

Top » Security » Device Management
Device Management
0R9W-20X
You can store the device information or refer/output the log for previous transmission. Also, various functions are available on this machine by connecting to external device. In addition, the administrator can set restrictions on the usage of those functions. (See "Setting Administrators.")
USB Settings
If an administrator wants to use the machine with a USB device, the connection settings must be activated. Also, you can set whether to use the MEAP driver when connecting the USB device. (See "Using the USB Port.")
Device Information Distribution
If multiple machines are connected via the shared network, an administrator can distribute the device information (management data) stored on the host machine to other client machines. The client machine receives and updates the device information. This enables you to easily manage multiple machines at the same time. (See "Specifying Device Information Distribution Settings.")
Communication log for device information distribution is recorded/managed. Administrators can output the communication log as necessary or set to automatically output the log. (See "Checking/Printing the Communication Log.")
Remote UI Settings
You can use SSL communication when setting and operating the machine using the Remote UI. (See "Remote UI.")
The administrator can also perform operations that cannot be performed from the control panel, using the Remote UI. The following are examples of such operations:
Restarting the machine
Installing a CA certificate file
Managing (exporting/clearing) the audit log
Importing/exporting an Address List or Settings/Registration
Backing up/restoring Mail Box
User Authentication System Switching and Preferences
NOTE
For more information on operating the Remote UI, see "Remote UI." For information on the Remote UI functions that require administrator privileges, see "Available Settings for Administrator Table (Remote UI)."
For information on settings for User Authentication, see "Authentication."