Konica Minolta bizhub 751 User Manual
Page 2
751/601
x-1
Contents
Contents
Introduction ........................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ................................................................................................1-2
Operating Precautions..............................................................................................................................1-2
INSTALLATION CHECKLIST ....................................................................................................................1-3
Precautions for Operation Control...................................................................................................... 1-7
Roles and Requirements of the Administrator..........................................................................................1-7
Password Usage Requirements ...............................................................................................................1-7
Network Connection Requirements for the Machine ...............................................................................1-8
User information control server control requirements ..............................................................................1-8
Security function operation setting operating requirements ....................................................................1-8
Operation and control of the machine......................................................................................................1-8
Machine Maintenance Control..................................................................................................................1-8
Miscellaneous ....................................................................................................................................... 1-9
Password Rules ........................................................................................................................................1-9
Precautions for Use of Various Types of Applications .............................................................................1-9
Encrypting communications .....................................................................................................................1-9
IPP printing .............................................................................................................................................1-10
Types of Data Cleared by Overwrite All Data Function ..........................................................................1-11
Accessing the Administrator Settings ......................................................................................................2-2
Accessing the User Mode ........................................................................................................................2-5
Setting Prohibited Functions When Authentication Error .......................................................................2-14