e-ManualTopSite mapHelp

Category Top

Preventing Unauthorized Access

Increasing Security

Restricting Access by Authentication

Administrator Settings

Specifying the System Manager Settings

Department ID Management

Specifying Department ID Management

Checking/Printing/Clearing Page Totals

Accepting Jobs with Unknown Department IDs

Accepting B&W Copy and Print Jobs without Entering a Department ID

Specifying Authentication Method for Rights Management Server

Network Security

IEEE 802.1X Authentication Settings

Key Pair and Server Certificate Settings for Encrypted SSL Communication

Generating a Key Pair and Server Certificate

Registering a Key Pair File and Server Certificate File Installed from a Computer

Setting the Key Pair Used With SSL Encrypted Communications

Editing Key Pairs and Server Certificates

Registering/Editing a CA Certificate File

Verifying Certificate Validity Using Certificate Revocation List

IPSec Settings

Preventing Information Leakage

Digital Signatures

Setting/Confirming a Key Pair and Device Certificate

Checking a Device Signature Certificate

Setting a Rights Management Server

Copy Set Numbering Options

Restricting the Send Function

Setting the Address Book

Mail Box Settings

Specifying Settings for All Mail Boxes

Specifying the Mail Box Security Settings

Setting the Control Panel Display

Specifying Management Settings for the Hard Disk

Completely Erasing Unnecessary Data from the Hard Disk

Initializing All Data/Settings

TPM Settings

Device Management

Device Information Settings

Specifying Device Information Delivery Settings

Registering/Deleting/Printing Delivery Destinations

Setting Automatic Delivery

Setting Manual Delivery

Setting the Receiving Machine

Checking/Printing the Communication Log

Limiting Functions

Remote UI

Clearing the Message Board

Retrieving Audit Logs

Saving a Log of Key Operations

Available Administrator Settings Table (Touch Panel Display)

Top » Security » Increasing Security
Increasing Security
0S9Y-1F8
This machine is equipped with comprehensive security functions such as authentication, encryption, and input/output management to protect confidential information. Thus, you can reduce the risk of information leakage due to access to the network system by an unauthorized user and falsification of data due to tampering of the data.
For information on security functions, see the following: