beautypg.com

5hdd store function in enhanced security mode, 6administrator security functions, 7index – Konica Minolta bizhub PRO 920 User Manual

Page 7

background image

Contents

1

Security Functions ............................................................ 1

2

Enhanced Security Mode ................................................. 3

2.1

Description of Enhanced Security mode ............................................3

2.2

Data protected by Enhanced Security mode .....................................4

2.3

Display when Enhanced Security mode is ON ...................................5

3

Protect and Delete Data After Use .................................. 7

4

User Authentication in Enhanced Security Mode .......... 8

4.1

Description of user authentication .....................................................8

4.2

To register a new user .........................................................................9

4.3

To change a user data ........................................................................ 14

4.4

To delete a user .................................................................................. 18

4.5

To change password by user ............................................................ 21

5

HDD Store Function in Enhanced Security Mode ........ 26

5.1

Store the data in a Box while Copying .............................................. 26

5.2

Store scanned data in a Box .............................................................. 30

5.3

Recall/Delete data in a Box ............................................................... 35

5.4

Output data in the Secure Box .......................................................... 41

6

Administrator Security Functions.................................. 46

6.1

Turn Enhanced Security mode ON/OFF ........................................... 46

6.2

HDD lock password ............................................................................ 49

6.3

Print audit log ...................................................................................... 55

6.4

Analyze audit log ................................................................................ 59

6.5

Table of items saved in audit log ...................................................... 60

7

Index ................................................................................. 63