beautypg.com
bizhub PRESS C1070/C1070P/C1060, bizhub PRO C1060L
Contents-1
Contents
1
Introduction
1.1
Welcome .......................................................................................................................................... 1-2
1.1.1
Composition and Usage of this Guide............................................................................................... 1-2
1.2
Conventions Used in This Guide ................................................................................................... 1-3
1.2.1
Symbols Used in This Guide.............................................................................................................. 1-3
1.2.2
Original and Paper Indications........................................................................................................... 1-4
2
Security Functions
2.1
Security Functions .......................................................................................................................... 2-2
2.1.1
Security Mode.................................................................................................................................... 2-2
2.1.2
Environment ....................................................................................................................................... 2-2
2.1.3
Description of Enhanced Security Mode ........................................................................................... 2-3
2.1.4
Data Protected by the Enhanced Security Mode .............................................................................. 2-5
2.1.5
Protecting and Deleting of Remaining Data After Being Used .......................................................... 2-5
2.2
Administrator Security Functions.................................................................................................. 2-6
2.2.1
Turning the Enhanced Security Mode ON/OFF ................................................................................. 2-6
2.2.2
HDD Lock Password.......................................................................................................................... 2-9
2.2.3
Deleting Temporary Data ................................................................................................................. 2-13
2.2.4
Deleting All Data............................................................................................................................... 2-16
2.2.5
Outputting Audit Log........................................................................................................................ 2-19
2.2.6
Analyzing Audit Log ......................................................................................................................... 2-22
2.3
User Authentication in Enhanced Security Mode ...................................................................... 2-25
2.3.1
Adding User Registration ................................................................................................................. 2-25
2.3.2
Changing User Registration ............................................................................................................. 2-33
2.3.3
Deleting User Data ........................................................................................................................... 2-41
2.3.4
Changing Password by User ........................................................................................................... 2-44
3
Index
3.1
Index by item ................................................................................................................................... 3-2
3.2
Index by button................................................................................................................................ 3-3