beautypg.com

Konica Minolta bizhub C650 User Manual

Page 2

background image

C650

x-1

Contents

Contents

1

Security

1.1

Introduction ............................................................................................................................................ 1-2
Compliance with the ISO15408 Standard ............................................................................................... 1-2
Operating Precautions ............................................................................................................................. 1-2
INSTALLATION CHECKLIST.................................................................................................................... 1-3

1.2

Security Functions ................................................................................................................................. 1-4

1.2.1

Check Count Clear Conditions ................................................................................................................ 1-4

1.3

Data to be Protected ............................................................................................................................. 1-5

1.4

Precautions for Operation Control ....................................................................................................... 1-6
Roles and Requirements of the Administrator ......................................................................................... 1-6
Password Usage Requirements .............................................................................................................. 1-6
Network Connection Requirements for the Machine............................................................................... 1-7
User information control server control requirements ............................................................................. 1-7
Security function operation setting operating requirements.................................................................... 1-7
Operation and control of the machine ..................................................................................................... 1-7
Machine Maintenance Control ................................................................................................................. 1-7

1.5

Miscellaneous......................................................................................................................................... 1-8
Password Rules ....................................................................................................................................... 1-8
Precautions for Use of Various Types of Applications............................................................................. 1-8
Encrypting communications .................................................................................................................... 1-8
IPP printing .............................................................................................................................................. 1-9
Types of Data Cleared by Overwrite All Data Function ......................................................................... 1-10

2

Administrator Operations

2.1

Accessing the Administrator Settings ................................................................................................. 2-2

2.1.1

Accessing the Administrator Settings...................................................................................................... 2-2
........................................................................................................................ 2-3

2.1.2

Accessing the User Mode........................................................................................................................ 2-5
........................................................................................................................ 2-5
..................................................................................................... 2-7

2.2

Enhancing the Security Function.......................................................................................................... 2-9

2.2.1

Items cleared by HDD Format ............................................................................................................... 2-10

2.2.2

Setting the Enhanced Security Mode .................................................................................................... 2-11
............................................................................. 2-11

2.3

Preventing Unauthorized Access ....................................................................................................... 2-14

2.3.1

Setting Prohibited Functions When Authentication Error ...................................................................... 2-14
............................................................................. 2-15

2.4

Canceling the Operation Prohibited State......................................................................................... 2-17

2.4.1

Performing Release Setting ................................................................................................................... 2-17
............................................................................. 2-17

2.5

Setting the Authentication Method .................................................................................................... 2-19

2.5.1

Setting the Authentication Method ........................................................................................................ 2-19
............................................................................. 2-19

2.5.2

Setting the External Server .................................................................................................................... 2-22
............................................................................. 2-22

2.6

System Auto Reset Function .............................................................................................................. 2-24

2.6.1

Setting the System Auto Reset function ................................................................................................ 2-24
............................................................................. 2-24

2.7

User Setting Function .......................................................................................................................... 2-26

2.7.1

Making user setting................................................................................................................................ 2-27
...................................................................................................................... 2-27
................................................................................................... 2-32

2.8

Account Track Setting Function ......................................................................................................... 2-34