Konica Minolta BIZHUB C253 User Manual
Page 2
C253/C203
x-1
Contents
Contents
Introduction ........................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ................................................................................................1-2
Operating Precautions..............................................................................................................................1-2
INSTALLATION CHECKLIST ....................................................................................................................1-3
Precautions for Operation Control...................................................................................................... 1-6
Roles and Requirements of the Administrator..........................................................................................1-6
Password Usage Requirements ...............................................................................................................1-6
Network Connection Requirements for the Machine ...............................................................................1-7
User information control server control requirements ..............................................................................1-7
Security function operation setting operating requirements ....................................................................1-7
Operation and control of the machine......................................................................................................1-7
Machine Maintenance Control..................................................................................................................1-7
Miscellaneous ....................................................................................................................................... 1-8
Password Rules ........................................................................................................................................1-8
Precautions for Use of Various Types of Applications .............................................................................1-8
Encrypting communications .....................................................................................................................1-8
IPP printing ...............................................................................................................................................1-9
Types of Data Cleared by Overwrite All Data Function ..........................................................................1-10
Accessing the Administrator Settings ......................................................................................................2-2
Accessing the User Mode ........................................................................................................................2-5
Setting Prohibited Functions When Authentication Error .......................................................................2-14
Making user setting ................................................................................................................................2-27