beautypg.com

Konica Minolta bizhub C353P User Manual

Page 2

background image

C353P

x-1

Contents

Contents

1

Security

1.1

Introduction ........................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ................................................................................................1-2
Operating Precautions..............................................................................................................................1-2
INSTALLATION CHECKLIST ....................................................................................................................1-3

1.2

Security Functions ................................................................................................................................ 1-4

1.2.1

Check Count Clear Conditions .................................................................................................................1-4

1.3

Data to be Protected ............................................................................................................................ 1-5

1.4

Precautions for Operation Control...................................................................................................... 1-6
Roles and Requirements of the Administrator..........................................................................................1-6
Password Usage Requirements ...............................................................................................................1-6
Network Connection Requirements for the Machine ...............................................................................1-6
Security function operation setting operating requirements ....................................................................1-6
Operation and control of the machine......................................................................................................1-7
Machine Maintenance Control..................................................................................................................1-7

1.5

Miscellaneous ....................................................................................................................................... 1-8
Password Rules ........................................................................................................................................1-8
Precautions for Use of Various Types of Applications .............................................................................1-8
Encrypting communications .....................................................................................................................1-8
IPP printing ...............................................................................................................................................1-9
Types of Data Cleared by Overwrite All Area Function ..........................................................................1-10

2

Administrator Operations

2.1

Accessing the Admin. Settings ........................................................................................................... 2-2

2.1.1

Accessing the Admin. Settings.................................................................................................................2-2
........................................................................................................................2-3
......................................................................................................2-4

2.2

Enhancing the Security Function ........................................................................................................ 2-6

2.2.1

Items cleared by HDD Format ..................................................................................................................2-7

2.2.2

Setting the EnhancedSecurity ..................................................................................................................2-8
................................................................................2-8

2.3

Preventing Unauthorized Access ...................................................................................................... 2-10

2.3.1

Setting ProhibitFunctions .......................................................................................................................2-10
..............................................................................2-11

2.4

Canceling the Operation Prohibited State ....................................................................................... 2-13

2.4.1

Performing Release Setting ....................................................................................................................2-13
..............................................................................2-13

2.5

User Box Function .............................................................................................................................. 2-14

2.5.1

Setting the User Box ..............................................................................................................................2-14
...........................................................2-14

2.5.2

Using User Box Attribute Change ..........................................................................................................2-16
....................................................2-16

2.6

Changing the Administrator Password ............................................................................................ 2-18

2.6.1

Changing the Administrator Password...................................................................................................2-18
..............................................................................2-18

2.7

Protecting Data in the HDD ............................................................................................................... 2-20

2.7.1

Setting the HDD Lock Password ............................................................................................................2-21
..............................................................................2-21

2.7.2

Changing the HDD Lock Password........................................................................................................2-23
..............................................................................2-23

2.7.3

Setting the Encryption Key (encryption word) ........................................................................................2-25
..............................................................................2-25

2.7.4

Changing the Encryption Key .................................................................................................................2-28