beautypg.com
bizhub PRO 951
Contents-1
Contents
1
Introduction
1.1
Welcome .......................................................................................................................................... 1-2
1.1.1
Composition of User's Guide............................................................................................................. 1-2
1.1.2
User's Guide ...................................................................................................................................... 1-3
1.2
Conventions Used in This Manual ................................................................................................. 1-4
1.2.1
Symbols Used in This Manual ........................................................................................................... 1-4
1.2.2
Original and Paper Indications........................................................................................................... 1-5
2
Security Functions
2.1
Control Software ............................................................................................................................. 2-2
2.1.1
Control Software Version ................................................................................................................... 2-2
2.1.2
About the ROM Version Display Function ......................................................................................... 2-2
2.2
Security Functions .......................................................................................................................... 2-3
2.2.1
Security Mode.................................................................................................................................... 2-3
2.2.2
Environment ....................................................................................................................................... 2-3
2.2.3
Description of Enhanced Security Mode ........................................................................................... 2-4
2.2.4
Data Protected by the Enhanced Security Mode .............................................................................. 2-6
2.2.5
Protecting and Deleting of Remaining Data After Being Used .......................................................... 2-6
2.3
User Authentication in Enhanced Security Mode ........................................................................ 2-7
2.3.1
Adding User Registration ................................................................................................................... 2-7
2.3.2
Changing User Registration ............................................................................................................. 2-13
2.3.3
Deleting User Data ........................................................................................................................... 2-18
2.3.4
Changing Password by User ........................................................................................................... 2-20
2.4
HDD Store Function in Enhanced Security Mode ...................................................................... 2-24
2.4.1
Saving Data While Copying ............................................................................................................. 2-24
2.4.2
Saving Data in User Box .................................................................................................................. 2-27
2.4.3
Recalling and Deleting of Data......................................................................................................... 2-31
2.4.4
Output Data in the Secure Box ........................................................................................................ 2-35
2.5
Administrator Security Functions................................................................................................ 2-39
2.5.1
Turning the Enhanced Security Mode ON/OFF ............................................................................... 2-39
2.5.2
HDD Lock Password........................................................................................................................ 2-42
2.5.3
Deleting Temporary Data ................................................................................................................. 2-44
2.5.4
Deleting All Data............................................................................................................................... 2-47
2.5.5
Printing Audit Log ............................................................................................................................ 2-50
2.5.6
Analyzing Audit Log ......................................................................................................................... 2-52
3
Index
3.1
Index by item ................................................................................................................................... 3-2
3.2
Index by button................................................................................................................................ 3-3