Skip header
 

Security Guide

Read This First
Getting Started

This chapter describes the precautions you need to take when using the machine's security features and how to configure the administrator settings.

Configuring User Authentication

This chapter describes how to specify user authentication and explains the functions that are enabled by user authentication.

Restricting Machine Usage

This chapter explains how to restrict use of the machine by the user.

Preventing Leakage of Information from Machines

This chapter explains how to protect information if it is stored in the machine's memory or on the hard disk.

Enhanced Network Security

This chapter describes the functions for enhancing security when the machine is connected to the network.

Preventing the Leaking of Documents

This chapter explains how to protect document data stored on the machine or printed using the machine.

Managing the Machine

This chapter describes the functions for enhancing the security of the machine and operating the machine effectively.

Troubleshooting

This chapter describes what to do if the machine does not function properly.

List of Operation Privileges for Settings

This chapter specifies a list of the administrator and user operation privileges for the machine settings when administrator authentication or user authentication is enabled.