beautypg.com

Contents 1 security functions, 4hdd store function in security strengthen mode, 5administrator security functions – Konica Minolta bizhub PRO 950 User Manual

Page 7: 6index

background image

Contents

1

Security Functions ............................................................ 1

1.1

Data protected by Security Strengthen mode ...................................4

2

Protect and Delete Data After Use .................................. 5

3

User Authentication in Security Functions ..................... 6

3.1

Description of user authentication .....................................................6

3.2

To register a new user .........................................................................7

3.3

To change a user data ........................................................................ 13

3.4

To delete a user .................................................................................. 18

3.5

To change password by user ............................................................ 22

4

HDD Store Function in Security Strengthen Mode ...... 26

4.1

Store the data in a Box while Copying .............................................. 26

4.2

Store scanned data in a Box .............................................................. 31

4.3

Recall/Delete data in a Box ............................................................... 36

4.4

Output data in the Secure Box .......................................................... 41

5

Administrator Security Functions.................................. 46

5.1

Turn Security Strengthen mode ON/OFF ......................................... 46

5.2

HDD lock password ............................................................................ 52

5.3

Delete Temporary Data ...................................................................... 56

5.4

Delete All Data .................................................................................... 60

5.5

Print audit log ...................................................................................... 64

5.6

Analyze audit log ................................................................................ 67

5.7

Table of items saved in audit log ...................................................... 68

6

Index ................................................................................. 70