beautypg.com

Konica Minolta BIZHUB C253 User Manual

Page 2

background image

C253/C203

x-1

Contents

Contents

1

Security

1.1

Introduction ........................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ................................................................................................1-2
Operating Precautions..............................................................................................................................1-2
INSTALLATION CHECKLIST ....................................................................................................................1-3

1.2

Security Functions ................................................................................................................................ 1-4

1.2.1

Check Count Clear Conditions .................................................................................................................1-4

1.3

Data to be Protected ............................................................................................................................ 1-5

1.4

Precautions for Operation Control...................................................................................................... 1-6
Roles and Requirements of the Administrator..........................................................................................1-6
Password Usage Requirements ...............................................................................................................1-6
Network Connection Requirements for the Machine ...............................................................................1-7
User information control server control requirements ..............................................................................1-7
Security function operation setting operating requirements ....................................................................1-7
Operation and control of the machine......................................................................................................1-7
Machine Maintenance Control..................................................................................................................1-7

1.5

Miscellaneous ....................................................................................................................................... 1-8
Password Rules ........................................................................................................................................1-8
Precautions for Use of Various Types of Applications .............................................................................1-8
Encrypting communications .....................................................................................................................1-8
IPP printing ...............................................................................................................................................1-9
Types of Data Cleared by Overwrite All Data Function ..........................................................................1-10

2

Administrator Operations

2.1

Accessing the Administrator Settings ................................................................................................ 2-2

2.1.1

Accessing the Administrator Settings ......................................................................................................2-2
........................................................................................................................2-3

2.1.2

Accessing the User Mode ........................................................................................................................2-5
........................................................................................................................2-5
......................................................................................................2-7

2.2

Enhancing the Security Function ........................................................................................................ 2-9

2.2.1

Items cleared by HDD Format ................................................................................................................2-10

2.2.2

Setting the Enhanced Security Mode .....................................................................................................2-11
..............................................................................2-11

2.3

Preventing Unauthorized Access ...................................................................................................... 2-14

2.3.1

Setting Prohibited Functions When Authentication Error .......................................................................2-14
..............................................................................2-15

2.4

Canceling the Operation Prohibited State ....................................................................................... 2-17

2.4.1

Performing Release Setting ....................................................................................................................2-17
..............................................................................2-17

2.5

Setting the Authentication Method ................................................................................................... 2-19

2.5.1

Setting the Authentication Method.........................................................................................................2-19
..............................................................................2-19

2.5.2

Setting the External Server .....................................................................................................................2-22
..............................................................................2-22

2.6

System Auto Reset Function ............................................................................................................. 2-24

2.6.1

Setting the System Auto Reset function.................................................................................................2-24
..............................................................................2-24

2.7

User Setting Function......................................................................................................................... 2-26

2.7.1

Making user setting ................................................................................................................................2-27
......................................................................................................................2-27
....................................................................................................2-32

2.8

Account Track Setting Function........................................................................................................ 2-34

This manual is related to the following products: