User’s Guide [Security Operations] 2012. 2 Ver. 1.
Contents 1 2 Security 1.1 Introduction ..................................................................................................................................... 1-2 Compliance with the ISO15408 Standard ......................................................................................... 1-2 Operating Precautions ....................................................................................................................... 1-2 INSTALLATION CHECKLIST................................
2.11 2.11.1 2.11.2 2.11.3 2.11.4 2.12 SNMP Setting Function ................................................................................................................ 2-31 Changing the auth-password and priv-password ........................................................................... 2-31 SNMP access authentication function............................................................................................. 2-32 SNMP v3 setting function .............................................
1 Security
1.1 Introduction 1 Security 1.1 Introduction 1 Thank you for purchasing our product. This User's Guide contains the operating procedures and precautions to be used when using the security functions offered by the bizhub 42/36 machine. To ensure the best possible performance and effective use of the machine, read this manual thoroughly before using the security functions. The Administrator of the machine should keep this manual for ready reference.
1.1 Introduction 1 INSTALLATION CHECKLIST This Installation Checklist contains items that are to be check by the Service Engineer installing this machine. The Service Engineer should check the following items, then explain each checked item to the Administrator of the machine. To Service Engineer Make sure that each of these items is properly carried out by checking the box on the right of each item. 1. Perform the following steps before installing this machine.
1.2 1.2 Security Functions 1 Security Functions Setting the Enhanced Security Mode to [ON] will validate the security function of this machine. For details of the settings of different security functions to be changed by turning [ON] the Enhanced Security Mode, see page 2-5. Setting the Enhanced Security Mode to [ON] will enhance the authentication function.
1.3 1.3 Data to be Protected 1 Data to be Protected The underlying concept of this machine toward security is "to protect data that can be disclosed against the intention of users." The following types of image files that have been stored in the machine and made available for use by its users are protected while the machine is being used.
1.4 1.4 Precautions for Operation Control 1 Precautions for Operation Control This machine and the data handled by this machine should be used in an office environment that meets the following conditions. Roles and Requirements of the Administrator The Administrator should take full responsibility for controlling the machine, thereby ensuring that no improper operations are performed.
1.4 Precautions for Operation Control 1 Apply patches so that the user information management system is always up-to-date. Change the corresponding account information promptly as soon as user authorities are changed. Delete the corresponding account information promptly as soon as the specific user is transferred.
1.4 Precautions for Operation Control - bizhub 42/36 1 The person responsible within the organization that uses the machine should prohibit the user from transferring or lending the IC card to any third person and make sure that the user reports any lost IC card.
1.5 1.5 Miscellaneous 1 Miscellaneous Password Rules According to certain Password Rules, registration of a password consisting of a string of a single character or change of a password to one consisting of a string of a single character is rejected for the Administrator Password, User Password, Secured Job Password, and SNMP Password. For the Administrator Password, User Password, and SNMP Password, the same password as that currently set is not accepted.
1.5 Miscellaneous 1 Encrypting communications The following are the cryptographic algorithms of key exchange and communications encryption systems supported in generation of encryption keys. TLS_RSA_WITH_RC4_128_MD5 TLS_RSA_WITH_3DES_EDE_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA TLS_DHE_RSA_WITH_AES_256_CBC_SHA NOTICE No algorithms can be selected during generation of encryption keys.
1.5 Miscellaneous 1 1 From "Continue to this website" call the PageScope Web Connection window to the screen. 2 Click "Certificate Error" to display the certificate. Then, click "Install Certificate" to install the certificate. 3 Display the physical stores. Then, deploy the certificate, which has earlier been exported, in "Local Computer" of "Trusted Root Certification Authorities" to thereby import the certificate.
1.5 Miscellaneous 1 HDD Format Execute HDD format when, for example, to initialize the HDD (to be reset to the default state) or when the HDD is replaced with a referent one. Executing HDD format deletes data saved in the machine’s HDD. Different types of data are deleted depending on the type of Format. Executing [User Area Only] deletes the Secured Job file and ID & Print file. Executing [User Area (Scan)] deletes the registered user information and Scan to HDD files.
2 Administrator Operations
2.1 Accessing the Admin Settings 2 Administrator Operations 2.1 Accessing the Admin Settings 2 This machine implements authentication of the user of the Admin Settings function through the 8-digit Administrator Password that verifies the identity as the Administrator of the person who accesses the function. During the authentication procedure, the Administrator Password entered for the authentication purpose appears as "*" or "●" on the display.
2.1 Accessing the Admin Settings 4 Enter the 8-digit Administrator Password from the keyboard or keypad. % % % % 5 2 Press the [C] key to clear all characters. Touch [Delete] to delete the last character entered. Touch [↑] to show the upper case screen. Touch [!#?/] to show the symbol screen. Touch [OK]. % If a wrong Administrator Password is entered, a message that tells that the authentication has failed appears. Enter the correct Administrator Password.
2.1 Accessing the Admin Settings 2 0 0 If an attempt is made to log on to the Admin Mode while a job is being executed, the machine gives a message that tells that it is now impossible to log on to the Admin Mode. Click [OK] and try logging on to the Admin Mode after the execution of the job is completed. Do not leave the machine with the Admin Mode setting screen left shown on the display.
2.2 2.2 Enhancing the Security Function 2 Enhancing the Security Function When access to the machine by the Administrator of the machine through the Admin Settings from the control panel is authenticated, the machine enables setting of the Enhanced Security Mode that allows settings for enhancing each of different security functions to be converted all at once. In the Enhanced Security Mode, the machine allows selection of whether to use the Enhanced Security Mode or not.
2.2 Enhancing the Security Function 2 The Enhanced Security Mode is set to [OFF], if the Administrator of the machine executes any of the following functions. Set the Enhanced Security Mode to [ON] again. [All] is executed of [HDD Format]. [Overwrite All Data] is executed. [SSD Low-level Format] is executed. [Restore All] is executed. [Restore Network] is executed. [Restore System] is executed.
2.2 Enhancing the Security Function 2 Setting the Enhanced Security Mode 0 0 0 For the procedure to call the Admin Settings on the display, see page 2-2. Do not leave the machine with the setting screen of Admin Settings left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Admin Settings. The Enhanced Security Mode is factory-set to [OFF]. Be sure to turn [ON] the Enhanced Security Mode so as to enable the security function of the machine.
2.2 Enhancing the Security Function 2 % [ON] can be selected only if the Administrator of the machine has made the necessary settings beforehand. For details of the necessary settings, see page 2-5. % If the Enhanced Security Mode is properly set to [ON], a key icon appears at the portion enclosed by a red frame of the screen, indicating that the machine is in the Enhanced Security Mode.
2.3 2.3 Setting the Authentication Method 2 Setting the Authentication Method When access to the machine by the Administrator of the machine through the Admin Settings is authenticated, the machine enables setting of the authentication method for User Authentication. The User Authentication method may be [Device] that uses the authentication system the machine has, [External Server] that uses a user information control system of the external server, or [Off].
2.3 Setting the Authentication Method 2 3 Select [Device] or [External Server] from the User Authentication pull-down menu. If [Device] is selected, perform steps 4 through 5. If [External Server] is selected, perform steps 6 through 10. 4 If [Device] is selected, click [General Settings] from the [Authentication Device Settings] menu and set [Authentication Type] and [IC Card Type].
2.3 Setting the Authentication Method 7 Click [Edit]. 8 Select [Active Directory] and click [Next]. 9 Make the necessary settings. 10 Click [Apply].
2.4 2.4 ID & Print Setting Function 2 ID & Print Setting Function When access to the machine by the Administrator of the machine through the Admin Settings is authenticated, the machine enables setting of the operation of the ID & Print function. The ID & Print function temporarily stores print data transmitted from the PC in the HDD of the machine and, after user authentication is successful in this machine, automatically prints the print data of the user in question.
2.5 2.5 Auto Reset Function 2 Auto Reset Function When access to the machine by the Administrator of the machine through the Admin Settings from the control panel is authenticated, the machine enables setting of the operation of the Auto Reset function.
2.5 Auto Reset Function 5 Touch [Enable]. 6 Select [ON] and touch [OK]. 2 % If no operations are performed for 1 min. even with Auto Reset set to [OFF], the function is activated to cause the user to log off from the mode automatically. 7 bizhub 42/36 Touch [Auto Reset].
2.5 Auto Reset Function 8 2 Enter the period of time (1 min. to 9 min.) after which Auto Reset is activated using [-]/[+] key. % The time for Auto Reset can be set to a value between 1 min. and 9 min., variable in 1-min. increments. 9 bizhub 42/36 Touch [OK].
2.6 2.6 User Setting Function 2 User Setting Function When access to the machine by the Administrator of the machine through the Admin Settings is authenticated, the machine enables registration of the users who can use the machine. It also enables operations for deleting a user and changing a User Password. User Registration allows the User Name, User Password, and other user information to be registered for enabling access to, or operation of, the machine.
2.6 User Setting Function 3 2 Click [New Registration]. % To change a User Password, click [Edit] and select the "Change Password" check box. Then, enter the new User Password. 4 Make the necessary settings. % A User Name that already exists cannot be redundantly registered. % Click [Cancel] to go back to the previous screen. 5 Click [Apply].
2.7 2.7 IC card information Setting Function 2 IC card information Setting Function When access to the machine by the Administrator of the machine through the Admin Settings is authenticated, the machine enables setting of the operation of the IC card information. The machine allows authentication using an IC card, in addition to that based on entry of a user name and a user password. To use the IC card function, it is necessary to register user IC card information in the machine.
2.7 IC card information Setting Function 4 2 Select the user name to be registered and touch [OK]. % Press [All] to display all users. Press [Search] to extract target users with search characters. 5 Touch [Edit]. % Touch [Edit] also if the IC card information which has previously been registered is to be modified or a card ID has been registered through [Input the card ID directly] of PageScope Data Administrator. % To delete a previously registered IC card information, touch [Delete].
2.8 2.8 Changing the Administrator Password 2 Changing the Administrator Password When access to the machine by the Administrator of the machine through the Admin Settings from the control panel is authenticated, the machine enables the operation of changing the Administrator Password required for accessing the Admin Settings. The Administrator Password entered for the authentication purpose appears as "*" on the display.
2.8 Changing the Administrator Password 2 % Touch [!#?/] to show the symbol screen. 5 Touch [OK]. 6 Touch the lower [Password]. 7 To prevent entry of a wrong Administrator Password, enter the new 8-digit Administrator Password once again. % % % % 8 Press the [C] key to clear all characters. Touch [Delete] to delete the last character entered. Touch [↑] to show the upper case screen. Touch [!#?/] to show the symbol screen. Touch [OK].
2.9 2.9 Erasing data when the machine is to be discarded or use of a leased machine is terminated 2 Erasing data when the machine is to be discarded or use of a leased machine is terminated When access to the machine by the Administrator of the machine through the Admin Settings from the control panel is authenticated, the machine enables setting of the operations of the Overwrite All Data, SSD Lowlevel Format, and Restore All functions.
2.9 Erasing data when the machine is to be discarded or use of a leased machine is terminated 1 Call the Security Settings screen on the display from the control panel. 2 Touch [HDD Settings]. 3 Touch [Overwrite All Data]. 4 Touch [Mode]. 5 Select the desired mode.
2.9 Erasing data when the machine is to be discarded or use of a leased machine is terminated 6 Touch [OK]. 7 Touch [Execute]. 8 A confirmation message appears. Touch [OK]. 2 % Do not turn off the power switch of the machine during execution of Overwrite All Data. If the power switch is inadvertently turned off during the execution of Overwrite All Data and the machine, as a result, fails to recognize the HDD or develops other fault, contact your Service Representative.
2.9 2.9.2 Erasing data when the machine is to be discarded or use of a leased machine is terminated 2 Setting the SSD Low-level Format Overwrite and erase is executed with a fixed value (0x00) for the SSD data space. 0 0 0 For the procedure to call the Security Settings screen on the display, see steps 1 through 3 of page 2-7. Do not leave the machine with the setting screen of Admin Settings left shown on the display.
2.9 2.9.3 Erasing data when the machine is to be discarded or use of a leased machine is terminated 2 Setting the Restore All The NVRAM is initialized and reset to the default state. 0 0 0 For the procedure to call the Admin Settings on the display, see page 2-2. Do not leave the machine with the setting screen of Admin Settings left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Admin Settings.
2.10 2.10 SSL Setting Function 2 SSL Setting Function When access to the machine by the Administrator of the machine through the Admin Settings is authenticated, the machine enables the setting of encryption of image data transmitted and received between the PC and the machine. 2.10.1 Device Certificate Setting 0 0 0 0 For the procedure to access the Admin Mode, see page 2-2. Do not leave the machine with the Admin Mode setting screen left shown on the display.
2.10 SSL Setting Function 5 2 Make the necessary settings. % Settings are all cleared if [Apply] is clicked with data entered for each item not meeting the requirements. 6 bizhub 42/36 Click [Apply]. The certificate can now be registered.
2.10 2.10.2 SSL Setting Function 2 SSL Setting 0 0 For the procedure to access the Admin Mode, see page 2-2. Do not leave the machine with the Admin Mode setting screen left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Admin Mode. NOTICE When making the SSL Setting, be sure to make sure in advance that the device certificate has been registered in the machine. For the procedure to register the device certificate, see page 2-27.
2.10 2.10.3 SSL Setting Function 2 Removing a Certificate 0 0 0 For the procedure to access the Admin Mode, see page 2-2. Do not leave the machine with the Admin Mode setting screen left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Admin Mode. In the Enhanced Security Mode, no certificates can be removed. 1 Start PageScope Web Connection and access the Admin Mode. 2 Click the [Security] tab and [PKI Settings]. 3 Click [Edit].
2.11 2.11 SNMP Setting Function 2 SNMP Setting Function When access to the machine by the Administrator of the machine through the Admin Settings is authenticated, the machine enables changing of the SNMP v3 Write User Password (auth-password, priv-password) required for accessing the MIB object over the network using the SNMP from the PC. Each of the auth-password and priv-password can consist of 8 to 32 digits. The password entered for the authentication purpose appears as "●" on the display. 2.11.
2.11 2.11.2 SNMP Setting Function 2 SNMP access authentication function If the settings of the Administrator mode are to be changed using SNMP from the PC, the user attempting to gain access is authenticated to be the Administrator of the machine by using the Write User Name and SNMP Password (auth-password, priv-password) of the SNMP v3 Write settings made in this machine.
2.12 2.12 Accessing the Scan to HDD file 2 Accessing the Scan to HDD file When access to the machine by the Administrator of the machine through the Admin Settings is authenticated, the machine enables controls of the Scan to HDD files. Scan to HDD stores the image file scanned by the machine in the HDD together with user information. The image file can be stored as "Public" or "Personal".
2.12 Accessing the Scan to HDD file 4 2 Select [Save] to back up (download) the image file in the PC. % The backed up (downloaded) file is not deleted from the machine.
2.13 2.13 TCP/IP Setting Function 2 TCP/IP Setting Function When access to the machine by the Administrator of the machine through the Admin Settings is authenticated, the machine enables setting of the IP Address and registration of the DNS Server. 2.13.1 Setting the IP Address 0 0 For the procedure to call the Admin Settings on the display, see page 2-2. Do not leave the machine with the setting screen of Admin Settings left shown on the display.
2.14 2.14 NetWare Setting Function 2 NetWare Setting Function When access to the machine by the Administrator of the machine through the Admin Settings is authenticated, the machine enables registration as the Print Server. Making the NetWare Setting 0 0 For the procedure to call the Ethernet screen on the display, see steps 1 through 3 of page 2-35. Do not leave the machine with the setting screen of Admin Settings left shown on the display.
2.15 2.15 SMB Setting Function 2 SMB Setting Function When access to the machine by the Administrator of the machine through the Admin Settings is authenticated, the machine enables making of the SMB Settings. Making the SMB Setting 0 0 For the procedure to access the Admin Mode, see page 2-2. Do not leave the machine with the Admin Mode setting screen left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Admin Mode.
2.16 2.16 AppleTalk Setting Function 2 AppleTalk Setting Function When access to the machine by the Administrator of the machine through the Admin Settings is authenticated, the machine enables making of the AppleTalk Settings. Making the AppleTalk Setting 0 0 For the procedure to call the Ethernet screen on the display, see steps 1 through 3 of page 2-35. Do not leave the machine with the setting screen of Admin Settings left shown on the display.
2.17 2.17 E-Mail Setting Function 2 E-Mail Setting Function When access to the machine by the Administrator of the machine through the Admin Settings is authenticated, the machine enables setting of the SMTP Server (E-Mail Server). Setting the SMTP Server (E-Mail Server) 0 0 For the procedure to call the TCP/IP screen on the display, see steps 1 through 4 of page 2-35. Do not leave the machine with the setting screen of Admin Settings left shown on the display.
3 User Operations
3.1 User Authentication Function 3 3 User Operations 3.1 User Authentication Function When [Device] or [External Server] (Active Directory) is set for Authentication Method of the Admin Settings, the User Authentication function implements authentication of the user of this machine before he or she actually uses it through the User Password that consists of 8 to 64 digits.
3.1 3.1.1 User Authentication Function 3 Performing user authentication (authentication through entry of the user name and user password) 0 0 Do not leave the machine while you are in the user operation mode. If it is absolutely necessary to leave the machine, be sure first to log off from the user operation mode.
3.1 User Authentication Function 3 Enter the User Name from the keyboard or keypad. % % % % Press the [C] key to clear all characters. Touch [Delete] to delete the last character entered. Touch [↑] to show the upper case screen. Touch [!#?/] to show the symbol screen. 4 Touch [OK]. 5 Touch [OK]. 6 Touch [Password].
3.1 User Authentication Function 7 3 Enter the 8-to-64-digit User Password from the keyboard or keypad. % % % % Press the [C] key to clear all characters. Touch [Delete] to delete the last character entered. Touch [↑] to show the upper case screen. Touch [!#?/] to show the symbol screen. 8 Touch [OK]. 9 Touch [Login]. % If an ID & Print file has been saved, select [Begin Printing] or [Access Basic Screen] and then touch [Login].
3.1 User Authentication Function 3 % If a wrong User Name is entered, a message that tells that the authentication has failed appears. Enter the correct User Name. % If a wrong User Password is entered, a message that tells that the authentication has failed appears. Enter the correct User Password. % A failure in authentication as a result of the entry of a wrong password is counted as unauthorized access.
3.1 3.1.2 User Authentication Function 3 Performing user authentication (identification through the IC card) 0 Do not leave the machine while you are in the user operation mode. If it is absolutely necessary to leave the machine, be sure first to log off from the user operation mode. 1 Touch [Card Authentication]. % The screen as shown below appears if the ID & Print function has been set.
3.1 3.1.3 User Authentication Function 3 Performing user authentication (authentication through the IC card + user password) 0 Do not leave the machine while you are in the user operation mode. If it is absolutely necessary to leave the machine, be sure first to log off from the user operation mode. 1 Touch [Card Authentication]. % The screen as shown below appears if the ID & Print function has been set.
3.1 User Authentication Function 4 3 Enter the 8-to-64-digit User Password from the keyboard or keypad. % % % % Press the [C] key to clear all characters. Touch [Delete] to delete the last character entered. Touch [↑] to show the upper case screen. Touch [!#?/] to show the symbol screen. 5 Touch [OK]. 6 Touch [Login]. % If an ID & Print file has been saved, select [Begin Printing] or [Access Basic Screen] and then touch [Login].
3.1 User Authentication Function 3 % If a wrong User Password is entered, a message that tells that the authentication has failed appears. Enter the correct User Password. % A failure in authentication as a result of the entry of a wrong password is counted as unauthorized access. If the cumulative number of unauthorized accesses reaches three during operation of the machine, the machine is set into an access lock state and prohibits any subsequent password entry operations.
3.1 User Authentication Function 3 0 0 Do not leave the machine while you are in the user operation mode. If it is absolutely necessary to leave the machine, be sure first to log off from the user operation mode. If any User Name not registered with this machine is authenticated through User Authentication when [External Server] (Active Directory) is set for Authentication Method, the User Name is automatically registered with this machine. 1 Start the Web browser.
3.2 3.2 ID & Print Function 3 ID & Print Function For all users who have been authenticated through User Authentication, the machine enables all users who have been authenticated through user authentication to register and access ID & Print files. After authentication by a user from the control panel is successful with the ID & Print function set in the machine by the Administrator of the machine, the user can automatically print his or her print data saved in the HDD of the machine.
3.2 ID & Print Function 5 3 Enter the user name and password and then click [OK]. % If the user password does not correspond to the user name entered, the ID & Print file is discarded without being registered. % If an attempt is made to print or save a file by specifying a user name that contains ["] (a double quotation mark), a login error results and the machine cancels the print job. % A failure in authentication as a result of the entry of a wrong password is counted as unauthorized access.
3.2 3.2.2 ID & Print Function 3 Accessing the ID & Print file 0 0 For the logon procedure, see page 3-2. Do not leave the machine while you are in the user operation mode. If it is absolutely necessary to leave the machine, be sure first to log off from the user operation mode. 1 Log on to the user operation mode through User Authentication from the control panel. 2 Touch [USB/HDD]. 3 Touch [ID & Print]. 4 Touch [Login User].
3.2 ID & Print Function 5 3 Select the desired ID & Print file and touch [Print]. % The ID & Print file is automatically deleted as soon as the printing is normally terminated.
3.3 3.3 Change Password Function 3 Change Password Function When [Device] is set for Authentication Method of User Authentication, the machine permits each of all users who have been authenticated through User Authentication to change his or her User Password. The User Password entered is displayed as "●." Performing Change Password 0 0 0 0 0 For the logon procedure, see page 3-2. Do not leave the machine while you are in the user operation mode.
3.3 Change Password Function 4 3 Click [Apply]. % If a wrong User Password is entered in the "Current Password" box, a message that tells that the User Password does not match appears. Enter the correct User Password. % If the entered User Password in the "New Password" box does not meet the requirements of the Password Rules, a message that tells that the entered User Password cannot be used appears. Enter the correct User Password. For details of the Password Rules, see page 1-9.
3.4 3.4 Secured Job Function 3 Secured Job Function The Secured Job function allows a Secured Job file specified by a corresponding password from the PC to be used in the condition registered in the machine. To access a Secured Job file, authentication is performed through an 8-digit password that verifies an authenticated user of the Secured Job file. The password entered is displayed as "*." A failure in authentication as a result of the entry of a wrong password is counted as unauthorized access. 3.
3.4 Secured Job Function 5 Enter the 8-digit Secured Job Password in the Password box. 6 Click [OK]. 7 Click [Authentication/Account Track]. 8 Enter the user name and password, and then click [OK]. 3 % If the user password does not correspond to the user name entered, the Secured Job file is discarded without being registered.
3.4 3.4.2 Secured Job Function 3 Accessing the Secured Job file 0 0 0 For the logon procedure, see page 3-2. Do not leave the machine while you are in the user operation mode. If it is absolutely necessary to leave the machine, be sure first to log off from the user operation mode. Enter the Secured Job password through the printer driver on the PC side. The password entered is displayed as "*." 1 Log on to the user operation mode through User Authentication from the control panel.
3.4 Secured Job Function 5 Select the desired Secured Job file and touch [Print]. 6 Touch [Password]. 7 Enter the 8-digit Secured Job Password from the keyboard or keypad. % % % % % 8 bizhub 42/36 3 For the Secured Job Password, enter the 8-digit one set on the printer driver side. Press the [C] key to clear all characters. Touch [Delete] to delete the last character entered. Touch [↑] to show the upper case screen. Touch [!#?/] to show the symbol screen. Touch [OK].
3.4 Secured Job Function 9 3 Touch [OK]. % If a wrong Secured Job Password is entered, a message that tells that the authentication has failed appears. Enter the correct Secured Job Password. % A failure in authentication as a result of the entry of a wrong password is counted as unauthorized access. If the cumulative number of unauthorized accesses reaches three during operation of the machine, the machine is set into an access lock state and prohibits any subsequent password entry operations.
3.5 3.5 Scan to HDD Function 3 Scan to HDD Function For all users who have been authenticated through User Authentication, the machine enables the operation of Scan to HDD function. It also enables operations for acquiring and printing image files stored in the HDD. Scan to HDD stores the image file scanned by the machine in the HDD together with user information. The image file can be stored as "Public" or "Personal".
3.5 Scan to HDD Function 4 Touch [Save Document]. 5 Select the destination to which the file is to be saved and touch [OK] or [Start]. 3 % The image file stored in [Personal] is protected. Select [Personal] whenever saving a highly confidential file.
3.5 3.5.2 Scan to HDD Function 3 Accessing the image file 0 0 For the logon procedure, see page 3-2. Do not leave the machine while you are in the user operation mode. If it is absolutely necessary to leave the machine, be sure first to log off from the user operation mode. 1 Log on to the user operation mode through User Authentication from the control panel. 2 Touch [Scan to Folder]. 3 Touch [Direct Input] tab and touch [HDD]. 4 Touch [File Document].
3.5 Scan to HDD Function 5 3 A list of documents saved will appear. % To delete image file, select the specific document and press [Delete].
3.5 Scan to HDD Function 3 0 0 For the logon procedure, see page 3-2. Do not leave the machine while you are in the user operation mode. If it is absolutely necessary to leave the machine, be sure first to log off from the user operation mode. 1 Log on to the user operation mode through User Authentication from the PageScope Web Connection. 2 Click the [Storage] tab and click [View] of the User Name by which the desired file is stored.
4 Application Software
4.1 PageScope Data Administrator 4 Application Software 4.1 PageScope Data Administrator 4 PageScope Data Administrator is an application for management purpose that allows the authentication and destination functions of the machine to be edited or registered from a PC connected over the network. It allows the authentication and destination list to be downloaded in your PC, the data in the list to be edited on the PC, and then the data to be written in the machine.
4.1 PageScope Data Administrator 3 Check the settings on the Import device information screen and click [Import]. 4 Type the 8-digit Administrator Password registered in the machine and click [OK]. 4 % If the "Save" check box has been selected, the Administrator Password entered is stored in the PC being used. If you do not want the Administrator Password stored, clear the "Save" check box.
4.1 4.1.2 PageScope Data Administrator 4 Setting the user authentication method 0 0 0 If the IC card function has been set, the user authentication method cannot be changed. For the procedure to access the machine, see steps 1 through 5 of page 4-2. Do not leave the site while you are gaining access to the machine through PageScope Data Administrator. If it is absolutely necessary to leave the site, be sure first to log off from the PageScope Data Administrator.
4.1 PageScope Data Administrator 4 4 From the pull-down menu of User authentication, select the user authentication method. % To change the user authentication method from "Device authentication" to "Network server authentication," it is necessary first to register the domain name of Active Directory on the machine side. % If "Network server authentication" is selected, "Active Directory" must invariably be selected. 5 Click [Export to the device].
4.1 4.1.3 PageScope Data Administrator 4 Changing the authentication mode 0 0 For the procedure to access the machine, see steps 1 through 5 of page 4-2. Do not leave the site while you are gaining access to the machine through PageScope Data Administrator. If it is absolutely necessary to leave the site, be sure first to log off from the PageScope Data Administrator. 1 Access the machine through [Authentication Settings/Address Settings] mode of PageScope Data Administrator.
4.1 PageScope Data Administrator 5 4 Select the specific [Authentication mode] to be changed and click [Next]. % If [User Authentication and Account Track] is selected, set [The allocation of the number of Users] and [The allocation of the number of Accounts]. 6 Verify the new authentication mode and click [Write]. % If there is a job being executed or a reserved job (timer TX, fax redial waiting, etc.
4.1 PageScope Data Administrator 7 4 Click [Finished]. % If [User Authentication and Account Track] is selected in step 5, [Synchronize] is set for "Synchronize user authentication and account track." If you want user authentication not synchronized with account track, click to deselect [Synchronize user authentication and account track] and execute [Export to the device] once again.
4.1 4.1.4 PageScope Data Administrator 4 Making the user settings 0 0 For the procedure to access the machine, see steps 1 through 5 of page 4-2. Do not leave the site while you are gaining access to the machine through PageScope Data Administrator. If it is absolutely necessary to leave the site, be sure first to log off from the PageScope Data Administrator. 1 Access the machine through [Authentication Settings/Address Settings] mode of PageScope Data Administrator.
4.1 4.1.5 PageScope Data Administrator 4 Setting the IC card information 0 0 0 The IC card driver (USB driver) of the IC card reader and the IC card plug-in must be installed in the PC of the Administrator of the machine in advance. For details, refer to the User’s Guide furnished with the machine. For the procedure to access the machine, see steps 1 through 5 of page 4-2. Do not leave the site while you are gaining access to the machine through PageScope Data Administrator.
4.1 PageScope Data Administrator 6 4 Place the IC card on the IC card reader, and click [Start reading]. % To delete a previously registered IC card information, click [Delete]. % A card ID may be registered through direct input. Select the [Input the card ID directly] radio button and then input the card ID. % The types of IC card that permit direct input are "Type A" and "Felica IDm". 7 Click [OK]. 8 Click [Export to the device]. 9 Click [Write]. 10 Click [OK].
4.2 4.2 TWAIN driver 4 TWAIN driver The TWAIN driver, which is to be installed in the PC of a general user, is a TWAIN driver used exclusively for allowing the machine to be recognized as a TWAIN device. It allows the image data read by the machine to be captured in the image processing application of the PC.
http://konicaminolta.