Owner manual

C353P x-1
Contents
Contents
1 Security
1.1 Introduction........................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ................................................................................................1-2
Operating Precautions..............................................................................................................................1-2
INSTALLATION CHECKLIST ....................................................................................................................1-3
1.2 Security Functions................................................................................................................................ 1-4
1.2.1 Check Count Clear Conditions.................................................................................................................1-4
1.3 Data to be Protected ............................................................................................................................ 1-5
1.4 Precautions for Operation Control...................................................................................................... 1-6
Roles and Requirements of the Administrator..........................................................................................1-6
Password Usage Requirements ...............................................................................................................1-6
Network Connection Requirements for the Machine ...............................................................................1-6
Security function operation setting operating requirements ....................................................................1-6
Operation and control of the machine......................................................................................................1-7
Machine Maintenance Control..................................................................................................................1-7
1.5 Miscellaneous ....................................................................................................................................... 1-8
Password Rules........................................................................................................................................1-8
Precautions for Use of Various Types of Applications .............................................................................1-8
Encrypting communications .....................................................................................................................1-8
IPP printing ...............................................................................................................................................1-9
Types of Data Cleared by Overwrite All Area Function ..........................................................................1-10
2 Administrator Operations
2.1 Accessing the Admin. Settings ........................................................................................................... 2-2
2.1.1 Accessing the Admin. Settings.................................................................................................................2-2
<From the Control Panel> ........................................................................................................................2-3
<From PageScope Web Connection>......................................................................................................2-4
2.2 Enhancing the Security Function ........................................................................................................ 2-6
2.2.1 Items cleared by HDD Format ..................................................................................................................2-7
2.2.2 Setting the EnhancedSecurity ..................................................................................................................2-8
<Setting can be made only from the control panel> ................................................................................2-8
2.3 Preventing Unauthorized Access...................................................................................................... 2-10
2.3.1 Setting ProhibitFunctions .......................................................................................................................2-10
<Setting can be made only from the control panel> ..............................................................................2-11
2.4 Canceling the Operation Prohibited State ....................................................................................... 2-13
2.4.1 Performing Release Setting....................................................................................................................2-13
<Setting can be made only from the control panel> ..............................................................................2-13
2.5 User Box Function .............................................................................................................................. 2-14
2.5.1 Setting the User Box ..............................................................................................................................2-14
<Setting can be made only from PageScope Web Connection>...........................................................2-14
2.5.2 Using User Box Attribute Change ..........................................................................................................2-16
<Setting can be made only from the PageScope Web Connection> ....................................................2-16
2.6 Changing the Administrator Password ............................................................................................ 2-18
2.6.1 Changing the Administrator Password...................................................................................................2-18
<Setting can be made only from the control panel> ..............................................................................2-18
2.7 Protecting Data in the HDD ............................................................................................................... 2-20
2.7.1 Setting the HDD Lock Password............................................................................................................2-21
<Setting can be made only from the control panel> ..............................................................................2-21
2.7.2 Changing the HDD Lock Password........................................................................................................2-23
<Setting can be made only from the control panel> ..............................................................................2-23
2.7.3 Setting the Encryption Key (encryption word) ........................................................................................2-25
<Setting can be made only from the control panel> ..............................................................................2-25
2.7.4 Changing the Encryption Key.................................................................................................................2-28