beautypg.com

Security, Security(p. 356) – Canon imageCLASS MF753Cdw Multifunction Wireless Color Laser Printer User Manual

Page 366

background image

Security

84CU-00Y

This machine is an information device that uses communication functions and handles various data. Therefore, it is

important to provide measures to prevent unauthorized access when using the machine in a network environment

and measures against security risks such as sending data by mistake and leaking information.

This machine is equipped with various functions and settings to reduce these threats and vulnerabilities. Configure the

settings and use them appropriately according to your usage environment and conditions for safer operation of the

machine.

Creating an Administrator System

Use an administrator account to manage the machine and configure the settings. Operate the machine using

a system in which only a specific administrator(s) knows the ID and PIN.

Setting the Department ID and PIN for the Administrator(P. 357)

Managing Users and Groups

Managing the users and groups that use the machine and performing authentication of its use can prevent

operation by third parties and unauthorized access.

Authenticating Users and Managing Groups(P. 359)

Network Settings

Applying the network security settings according to the usage environment can reduce the threat of

unauthorized access and eavesdropping.

Protecting the Network(P. 373)

Managing Usage Status

When using the function to send a fax or scanned data, measures are needed to prevent sending data by

mistake or leaking information. In addition, using a PIN and setting usage restrictions can help prevent

unauthorized use of the Address Book and Remote UI. Implementing measures that include operations

according to usage status of the machine can improve security.

Preventing Sending Data by Mistake and Leaking Information(P. 404)

Preventing Unauthorized Use(P. 419)

Integrated Management Using a Security Policy

Applying a security policy that exists for other devices to this machine can allow for sharing of the

information security level within your organization.

Applying a Security Policy(P. 428)

Security

356