Konica Minolta bizhub 364e User Manual
Page 2

bizhub 554e/454e/364e/284e/224e
Contents-1
Contents
Introduction ..................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ......................................................................................... 1-2
Operating Precautions ....................................................................................................................... 1-2
INSTALLATION CHECKLIST.............................................................................................................. 1-3
Precautions for Operation Control ................................................................................................ 1-6
Roles and Requirements of the Administrator ................................................................................... 1-6
Password Usage Requirements ........................................................................................................ 1-6
Network Connection Requirements for the Machine......................................................................... 1-6
Security function operation setting operating requirements.............................................................. 1-6
Operation and control of the machine ............................................................................................... 1-7
Machine Maintenance Control ........................................................................................................... 1-7
Implementing digital signature properly............................................................................................. 1-7
Operating conditions for the IC card and IC card reader .................................................................. 1-7
IC card owner requirements .............................................................................................................. 1-8
Miscellaneous.................................................................................................................................. 1-9
Password Rules ................................................................................................................................. 1-9
Precautions for Use of Various Types of Applications....................................................................... 1-9
Encrypting communications .............................................................................................................. 1-9
Items of Data Cleared by Overwrite All Data Function ...................................................................... 1-9
Fax functions.................................................................................................................................... 1-10
General functions and operations.................................................................................................... 1-10