beautypg.com

Konica Minolta magicolor 8650 User Manual

Page 2

background image

8650

x-1

Contents

Contents

1

Security

1.1

Introduction ........................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ................................................................................................1-2
Operating Precautions..............................................................................................................................1-2
INSTALLATION CHECKLIST ....................................................................................................................1-3

1.2

Security Functions ................................................................................................................................ 1-4

1.2.1

Check Count Clear Conditions .................................................................................................................1-4

1.3

Data to be Protected ............................................................................................................................ 1-5

1.4

Precautions for Operation Control...................................................................................................... 1-6
Roles and Requirements of the Administrator..........................................................................................1-6
Password Usage Requirements ...............................................................................................................1-6
Network Connection Requirements for the Machine ...............................................................................1-6
Security function operation setting operating requirements ....................................................................1-6
Operation and control of the machine......................................................................................................1-7
Machine Maintenance Control..................................................................................................................1-7

1.5

Miscellaneous ....................................................................................................................................... 1-8
Password Rules ........................................................................................................................................1-8
Precautions for Use of Various Types of Applications .............................................................................1-8
Encrypting communications .....................................................................................................................1-8
IPP printing ...............................................................................................................................................1-9
Types of Data Cleared by Overwrite All Area Function ..........................................................................1-10

2

Administrator Operations

2.1

Accessing the Admin. Settings ........................................................................................................... 2-2

2.1.1

Accessing the Admin. Settings.................................................................................................................2-2
........................................................................................................................2-3
......................................................................................................2-4

2.2

Enhancing the Security Function ........................................................................................................ 2-6

2.2.1

Items cleared by HDD Format ..................................................................................................................2-7

2.2.2

Setting the EnhancedSecurity ..................................................................................................................2-8
................................................................................2-8

2.3

HDD Installation .................................................................................................................................. 2-10

2.3.1

Setting HDD Installation .........................................................................................................................2-10
..............................................................................2-10

2.4

Preventing Unauthorized Access ...................................................................................................... 2-12

2.4.1

Setting ProhibitFunctions .......................................................................................................................2-12
..............................................................................2-13

2.5

Canceling the Operation Prohibited State ....................................................................................... 2-15

2.5.1

Performing Release Setting ....................................................................................................................2-15
..............................................................................2-15

2.6

User Box Function .............................................................................................................................. 2-16

2.6.1

Setting the User Box ..............................................................................................................................2-16
...........................................................2-16

2.6.2

Using User Box Attribute Change ..........................................................................................................2-18
....................................................2-18

2.7

Changing the Administrator Password ............................................................................................ 2-20

2.7.1

Changing the Administrator Password...................................................................................................2-20
..............................................................................2-20

2.8

Protecting Data in the HDD ............................................................................................................... 2-22

2.8.1

Setting the HDD Lock Password ............................................................................................................2-23
..............................................................................2-23

2.8.2

Changing the HDD Lock Password........................................................................................................2-25
..............................................................................2-25