Skip header
 

Security Options

This describes the parameters that can be set on [Security Options].

Extended Security

Specify whether or not to use the extended security functions. For details about the extended security functions, see Security Guide.

Service Mode Lock

You can specify whether or not to prohibit entering service mode. This setting appears only when the user has logged in as the machine administrator.

Default: [Off]

  • On

  • Off

Firmware Version

You can display the firmware version of the printer.

Network Security Level

You can specify the network security level.

Default: [Level 0]

  • Level 0

  • Level 1

  • Level 2

  • FIPS 140

Auto Erase Memory Setting

You can specify whether or not to automatically delete the memory. When set to [On], specify the overwrite times. To specify the number of memory overwrites, select [Random Numbers]. This setting appears only when the optional hard disk is installed.

Default: [Off]

  • On

    HDDErase

    • NSA

    • DoD

    • Random Numbers

      Number of Erase: Between 1 to 9

  • Off

Erase All Memory

You can delete all data inside the memory. When deleting memory, specify the overwrite times. To specify the number of memory overwrites, select [Random Numbers]. This setting appears only when the optional hard disk is installed.

Default: [Random Numbers]

HDDErase

  • NSA

  • DoD

  • Random Numbers

    Number of Erase: Between 1 to 9

Extend Auth.Mng.

For details about this function, see Security Guide.

Transfer Log Setting

You can specify whether or not to send log information to the log collection server.

Default: [Off]

  • On (Only available from the log collection server.)

  • Off

Machine Data Encryption

You can encrypt data stored on the hard disk. Select the data to be carried over to the hard disk and not be reset.

  • Format All Data

  • CarryOver FileSys DataOnly

  • Carry Over All Data

Collect Logs

You can specify whether or not to collect job logs, access logs, and eco-friendly logs.

Default: [Inactive]

  • Job Log

  • Access Log

  • Eco-friendly Logs

Note

  • For details, see Security Guide.