Konica Minolta bizhub C650 User Manual
Page 2
C650
x-1
Contents
Contents
Introduction ............................................................................................................................................ 1-2
Compliance with the ISO15408 Standard ............................................................................................... 1-2
Operating Precautions ............................................................................................................................. 1-2
INSTALLATION CHECKLIST.................................................................................................................... 1-3
Precautions for Operation Control ....................................................................................................... 1-6
Roles and Requirements of the Administrator ......................................................................................... 1-6
Password Usage Requirements .............................................................................................................. 1-6
Network Connection Requirements for the Machine............................................................................... 1-7
User information control server control requirements ............................................................................. 1-7
Security function operation setting operating requirements.................................................................... 1-7
Operation and control of the machine ..................................................................................................... 1-7
Machine Maintenance Control ................................................................................................................. 1-7
Miscellaneous......................................................................................................................................... 1-8
Password Rules ....................................................................................................................................... 1-8
Precautions for Use of Various Types of Applications............................................................................. 1-8
Encrypting communications .................................................................................................................... 1-8
IPP printing .............................................................................................................................................. 1-9
Types of Data Cleared by Overwrite All Data Function ......................................................................... 1-10
Accessing the Administrator Settings...................................................................................................... 2-2
Accessing the User Mode........................................................................................................................ 2-5
Setting Prohibited Functions When Authentication Error ...................................................................... 2-14
Making user setting................................................................................................................................ 2-27