e-ManualTopSite mapHelpGlossary

Category Top

Preventing Unauthorized Access

Increasing Security

Network Security

Key Pair and Server Certificate Settings for Encrypted SSL Communication

Generating a Key Pair and Server Certificate

Registering a Key Pair File and Server Certificate File Installed from a Computer

Editing Key Pairs and Server Certificates

Registering/Editing a CA Certificate File

Verifying Certificate Validity Using Certificate Revocation List

Network Settings/Management when Using an Advanced Box

MEAP Settings

Using the SSL

Printing Installed Application Information

Preventing Information Leakage

Digital Signatures

Setting/Confirming a Key Pair and Device Certificate

Confirming a Key Pair and User Certificate

Checking a Device Signature/User Signature Certificate

Setting a Rights Management Server

Forced Secure Watermark/Document Scan Lock

Secure Watermark (Forced Secure Watermark/Printer Driver Secure Watermark)

Adjusting the Secure Watermark Contrast

Document Scan Lock Settings

Specifying the Document Scan Lock Operational Settings
Setting the Document Scan Lock Mode
Adjusting the TL Code

Copy Set Numbering Options

Accepting Only Encrypted Secure Printing

Restricting the Send Function

Setting the Address Book

Mail Box Settings

Specifying Settings for All Mail Boxes

Specifying the Mail Box Security Settings

Setting the Control Panel Display

Managing the Setting Information Registered in the Machine

Specifying Management Settings for the Memory

Completely Erasing Unnecessary Data from the Memory

Initializing All Data/Settings

TPM Settings

Device Management

Using the USB Port

Device Information Settings

Specifying Device Information Distribution Settings

Registering/Deleting/Printing Distribution Destinations

Setting the Receiving Machine

Setting Automatic Distribution

Setting Manual Distribution

Checking/Printing the Communication Log

Limiting Functions

Remote UI

Clearing the Message Board

Saving a Log of Key Operations

Starting the Setup Guide

Retrieving Audit Logs

IEEE 2600 Security Standard

Top » Security » IEEE 2600 Security Standard
IEEE 2600 Security Standard
0R9W-21F
This section describes the IEEE 2600 defined security requirements and how the functions of this machine meet these requirements.
Security Requirement
Function on the Machine
Description
User Authentication/User Information Management:
Preventing Unauthorized Use of the Machine By Authenticating Users
User Authentication
User Authentication enables you to manage the machine's users by performing authentication with registered user names and passwords.
Manages user information such as user names and passwords, as well as Department IDs and roles (privileges).
Access Restrictions:
Restricting Use of Functions By User
ACCESS MANAGEMENT SYSTEM
You can set access restrictions for functions, such as the Print or Copy function, for each user.
Audit Log*2:
Overseeing Security-Related User Operations
Generate/Export Audit Logs
You can generate user authentication logs and job logs, and export the logs in CSV format from the Remote UI.
Temporary Data Erase:
Completely Erasing Unnecessary Temporary Data from the Memory
Complete Data Erase
You can erase unnecessary data from the memory of the machine by overwriting the data.
Data Protection*3:
Protecting Data and Confidential Information on the hard disk
HDD Data Encryption Kit*1
You can encrypt data stored on the hard disk such as information registered in the Address Book and password information.
Network Data Protection:
Protecting Data Transmissions with Encrypted Communication
IPSec
IPSec protects data sent and received over an IP network from threats such as theft, modification, and impersonation, using security policies created for encrypted communication.
Software Verification:
Self-Verification of Security Functions
IPSec
If IPSec settings are enabled, the self-test for the code module is automatically performed when the machine starts.
*1
Indicates optional products.
*2
[Network]/[Memory Media] for [Scan and Store]/[Access Stored Files] is not included in the scope of the audit.
*3
Files stored in memory media are not encrypted.