Security, Security(p. 356) – Canon imageCLASS MF753Cdw Multifunction Wireless Color Laser Printer User Manual
Page 366
Security
84CU-00Y
This machine is an information device that uses communication functions and handles various data. Therefore, it is
important to provide measures to prevent unauthorized access when using the machine in a network environment
and measures against security risks such as sending data by mistake and leaking information.
This machine is equipped with various functions and settings to reduce these threats and vulnerabilities. Configure the
settings and use them appropriately according to your usage environment and conditions for safer operation of the
machine.
Creating an Administrator System
Use an administrator account to manage the machine and configure the settings. Operate the machine using
a system in which only a specific administrator(s) knows the ID and PIN.
Setting the Department ID and PIN for the Administrator(P. 357)
Managing Users and Groups
Managing the users and groups that use the machine and performing authentication of its use can prevent
operation by third parties and unauthorized access.
Authenticating Users and Managing Groups(P. 359)
Network Settings
Applying the network security settings according to the usage environment can reduce the threat of
unauthorized access and eavesdropping.
Protecting the Network(P. 373)
Managing Usage Status
When using the function to send a fax or scanned data, measures are needed to prevent sending data by
mistake or leaking information. In addition, using a PIN and setting usage restrictions can help prevent
unauthorized use of the Address Book and Remote UI. Implementing measures that include operations
according to usage status of the machine can improve security.
Preventing Sending Data by Mistake and Leaking Information(P. 404)
Preventing Unauthorized Use(P. 419)
Integrated Management Using a Security Policy
Applying a security policy that exists for other devices to this machine can allow for sharing of the
information security level within your organization.
Applying a Security Policy(P. 428)
Security
356