beautypg.com

Konica Minolta bizhub C364e User Manual

Page 2

background image

bizhub C554e/C454e/C364e/C284e/C224e

Contents-1

Contents

1

Security

1.1

Introduction ..................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ......................................................................................... 1-2
Operating Precautions ....................................................................................................................... 1-2
INSTALLATION CHECKLIST.............................................................................................................. 1-3

1.2

Security Functions .......................................................................................................................... 1-4
Check Count Clear Conditions .......................................................................................................... 1-4

1.3

Data to be Protected ...................................................................................................................... 1-5

1.4

Precautions for Operation Control ................................................................................................ 1-6
Roles and Requirements of the Administrator ................................................................................... 1-6
Password Usage Requirements ........................................................................................................ 1-6
Network Connection Requirements for the Machine......................................................................... 1-6
Security function operation setting operating requirements.............................................................. 1-6
Operation and control of the machine ............................................................................................... 1-6
Machine Maintenance Control ........................................................................................................... 1-7
Implementing digital signature properly............................................................................................. 1-7
Operating conditions for the IC card and IC card reader .................................................................. 1-7
IC card owner requirements .............................................................................................................. 1-7

1.5

Miscellaneous.................................................................................................................................. 1-8
Password Rules ................................................................................................................................. 1-8
Precautions for Use of Various Types of Applications....................................................................... 1-8
Encrypting communications .............................................................................................................. 1-8
Items of Data Cleared by Overwrite All Data Function ...................................................................... 1-8
Fax functions...................................................................................................................................... 1-9
General functions and operations...................................................................................................... 1-9

2

Administrator Operations

2.1

Accessing the Administrator Settings .......................................................................................... 2-2

2.1.1

Accessing the Administrator Settings................................................................................................ 2-2

2.1.2

Accessing the User Mode.................................................................................................................. 2-4

2.2

Enhancing the Security Function................................................................................................... 2-6

2.2.1

Items cleared by HDD Format ........................................................................................................... 2-7

2.2.2

Setting the Password Rules............................................................................................................... 2-8

2.2.3

Setting the Enhanced Security Mode .............................................................................................. 2-10

2.3

Preventing Unauthorized Access ................................................................................................ 2-12
Setting Prohibited Functions When Authentication Error ................................................................ 2-12

2.4

Setting the External Server .......................................................................................................... 2-14
Setting the External Server .............................................................................................................. 2-14

2.5

System Auto Reset Function ....................................................................................................... 2-17
Setting the System Auto Reset function .......................................................................................... 2-17

2.6

Changing the Administrator Password....................................................................................... 2-19
Changing the Administrator Password ............................................................................................ 2-19

2.7

Protecting Data in the HDD.......................................................................................................... 2-21

2.7.1

Setting the Encryption Key (encryption word) ................................................................................. 2-21

2.7.2

Changing the Encryption Key .......................................................................................................... 2-25

2.8

Overwrite All Data Function ......................................................................................................... 2-27
Setting the Overwrite All Data function............................................................................................ 2-27

2.9

S/MIME Communication Setting Function ................................................................................. 2-29
Setting the S/MIME Communication ............................................................................................... 2-29

2.10

PC-Fax RX Setting Function ........................................................................................................ 2-32
PC-Fax RX Setting ........................................................................................................................... 2-32

2.11

TSI User Box Setting Function..................................................................................................... 2-34
TSI User Box Setting........................................................................................................................ 2-34

This manual is related to the following products: