Konica Minolta bizhub 500 User Manual
Page 2
Contents
500/420
x-1
Contents
Compliance with the ISO15408 Standard ..................................... 1-2
Operating Precautions ................................................................... 1-2
INSTALLATION CHECKLIST .......................................................... 1-3
Security Functions ............................................................................ 1-5
Check Count Clear Conditions ...................................................... 1-6
Data to be Protected ........................................................................ 1-7
Precautions for Operation Control .................................................. 1-8
Roles and Requirements of the Administrator ............................... 1-8
Password Usage Requirements ..................................................... 1-8
Network Connection Requirements for the Machine ..................... 1-9
User information control server control requirements ................... 1-9
Security function operation setting operating requirements .......... 1-9
Operation and control of the machine ......................................... 1-10
Machine Maintenance Control ..................................................... 1-10
Miscellaneous ................................................................................. 1-11
Password Rules ........................................................................... 1-11
Precautions for Use of Various Types of Applications ................. 1-11
Types of Data Cleared by Overwrite All Data Function ................ 1-12
Accessing the Administrator Setting Mode ................................... 2-2
Accessing the Administrator Setting mode ................................... 2-2
Enhancing the Security Function .................................................... 2-9
Items cleared by HDD Format ..................................................... 2-11
Setting the Enhanced Security mode .......................................... 2-11
Preventing Unauthorized Access .................................................. 2-15
Canceling the Operation Prohibited State ................................... 2-17
420_security_E.book 1 ページ 2007年3月7日 水曜日 午後3時15分