Konica Minolta bizhub C353 User Manual
Page 2
C353
x-1
Contents
Contents
Introduction ........................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ................................................................................................1-2
Operating Precautions..............................................................................................................................1-2
INSTALLATION CHECKLIST ....................................................................................................................1-3
Precautions for Operation Control...................................................................................................... 1-6
Roles and Requirements of the Administrator..........................................................................................1-6
Password Usage Requirements ...............................................................................................................1-6
Operation and control of the machine......................................................................................................1-6
Network Connection Requirements for the Machine ...............................................................................1-7
Machine Maintenance Control..................................................................................................................1-7
Implementing digital signature properly ...................................................................................................1-7
Operating conditions for the IC card and IC card reader .........................................................................1-7
IC card owner requirements .....................................................................................................................1-7
Accessing the Administrator Settings ......................................................................................................2-2
Setting Prohibited Functions When Authentication Error .........................................................................2-7
Setting the HDD Lock Password ............................................................................................................2-18
Setting the Overwrite All Data function ..................................................................................................2-33