beautypg.com
bizhub PRESS C1100/C1085
Contents-1
Contents
1
Introduction
1.1
Welcome .......................................................................................................................................... 1-2
1.1.1
Composition and Usage of this Guide............................................................................................... 1-2
1.2
Conventions Used in This Guide ................................................................................................... 1-3
1.2.1
Symbols Used in This Guide.............................................................................................................. 1-3
1.2.2
Original and Paper Indications........................................................................................................... 1-4
2
Security Functions
2.1
Control Software ............................................................................................................................. 2-2
2.1.1
Control Software Version ................................................................................................................... 2-2
2.1.2
About the ROM Version Display Function ......................................................................................... 2-2
2.2
Security Functions .......................................................................................................................... 2-3
2.2.1
Security Mode.................................................................................................................................... 2-3
2.2.2
Environment ....................................................................................................................................... 2-3
2.2.3
Description of Enhanced Security Mode ........................................................................................... 2-4
2.2.4
Data Protected by the Enhanced Security Mode .............................................................................. 2-6
2.2.5
Protecting and Deleting of Remaining Data After Being Used .......................................................... 2-6
2.3
Administrator Security Functions.................................................................................................. 2-7
2.3.1
Turning the Enhanced Security Mode ON/OFF ................................................................................. 2-7
2.3.2
HDD Lock Password........................................................................................................................ 2-10
2.3.3
Deleting Temporary Data ................................................................................................................. 2-14
2.3.4
Deleting All Data............................................................................................................................... 2-17
2.3.5
Outputting Audit Log........................................................................................................................ 2-20
2.3.6
Analyzing Audit Log ......................................................................................................................... 2-23
2.4
User Authentication in Enhanced Security Mode ...................................................................... 2-26
2.4.1
Adding User Registration ................................................................................................................. 2-26
2.4.2
Changing User Registration ............................................................................................................. 2-34
2.4.3
Deleting User Data ........................................................................................................................... 2-42
2.4.4
Changing Password by User ........................................................................................................... 2-45
3
Index
3.1
Index by item ................................................................................................................................... 3-2
3.2
Index by button................................................................................................................................ 3-3