Category Top
Preventing Unauthorized Access
Increasing Security
Restricting Access by Authentication
Administrator Settings
Specifying the System Manager Settings
Department ID Management
Specifying Department ID Management
Checking/Printing/Clearing Page Totals
Accepting Jobs with Unknown Department IDs
Accepting B&W Copy and Print Jobs without Entering a Department ID
User Setting Information Management (User Setting Information Management Service)
Logging In to the User Setting Information Management Service Page
Deleting the User Setting Information
Authentication Method Settings for Sending Operations
Specifying Personal Folders
Registering Personal Folders for Each User
Setting Up the Home Folder and Personal Folders
Registering Folders Designated by Login Service as Personal Folders
Specifying Authentication Method for LDAP Server
Specifying Authentication Method for Rights Management Server
Specifying Authentication Method for SMTP Server
Specifying Authentication Method for File Server
Simple Authentication Settings for Secure Print
Setting to Disable Integrated Authentication
Network Security
Key Pair and Server Certificate Settings for Encrypted SSL Communication
Generating a Key Pair and Server Certificate
Registering a Key Pair File and Server Certificate File Installed from a Computer
Editing Key Pairs and Server Certificates
Registering/Editing a CA Certificate File
Verifying Certificate Validity Using Certificate Revocation List
Using an Encryption Method That Complies with FIPS 140-2
MEAP Settings
Using the SSL
Printing Installed Application Information
Preventing Information Leakage
Digital Signatures
Setting/Confirming a Key Pair and Device Certificate
Confirming a Key Pair and User Certificate
Checking a Device Signature/User Signature Certificate
Setting a Rights Management Server
Copy Set Numbering Options
Accepting Only Encrypted Secure Printing
Restricting the Send Function
Setting the Address Book
Mail Box Settings
Specifying Settings for All Mail Boxes
Specifying the Mail Box Security Settings
Setting the Control Panel Display
Specifying Management Settings for the Hard Disk
Completely Erasing Unnecessary Data from the Hard Disk
Initializing All Data/Settings
TPM Settings
Device Management
Using the USB Port
Device Information Settings
Specifying Device Information Delivery Settings
Registering/Deleting/Printing Delivery Destinations
Setting Automatic Delivery
Setting Manual Delivery
Setting the Receiving Machine
Checking/Printing the Communication Log
Setting SSO-H Authentication for Device Information Delivery Settings
Limiting Functions
Remote UI
Clearing the Message Board
ACCESS MANAGEMENT SYSTEM
Retrieving Audit Logs
Saving a Log of Key Operations
Available Administrator Settings Table (Touch Panel Display)
IEEE 2600 Security Standard|
Security Requirement
|
Function on the Machine
|
Description
|
|
User Authentication/User Information Management:
Preventing Unauthorized Use of the Machine By Authenticating Users |
SSO-H (Single Sign-On H)
|
SSO-H enables you to manage the machine's users by performing authentication with registered user names and passwords.
Manages user information such as user names and passwords, as well as Department IDs and roles (privileges).
|
|
Access Restrictions:
Restricting Use of Functions By User |
ACCESS MANAGEMENT SYSTEM KIT*1
|
You can set access restrictions for functions, such as the Print or Copy function, for each user.
|
|
Audit Log*2:
Overseeing Security-Related User Operations |
Generate/Export Audit Logs
|
You can generate user authentication logs and job logs, and export the logs in CSV format from the Remote UI.
|
|
Temporary Data Erase:
Completely Erasing Temporary Data from the Hard Disk |
Data Erase Kit*1
|
You can erase unnecessary data from the hard disk of the machine by overwriting the data.
|
|
Data Protection*3:
Protecting Hard Disk Data and Confidential Information |
HDD Data Encryption & Mirroring Kit*1
|
You can encrypt data stored in the hard disk such as files stored in mail boxes, information registered in the Address Book, and password information.
|
|
Network Data Protection:
Protecting Data Transmissions with Encrypted Communication |
IPSec
|
IPSec protects data sent and received over an IP network from threats such as theft, modification, and impersonation, using security policies created for encrypted communication.
|
|
Software Verification:
Self-Verification of Security Functions |
IPSec
|
If IPSec settings are enabled, the self-test for the code module is automatically performed when the machine starts.
|
|
*1
|
Indicates optional products.
|
|
*2
|
[Memory Media] for [Scan and Store]/[Access Stored Files] is not included in the scope of the audit.
|
|
*3
|
Files stored in memory media are not encrypted.
|