Skip header
 

Specifying the Extended Security Functions

In addition to providing basic security through user authentication and each administrator's specified limits to access the machine, security can also be increased by encrypting transmitted data and data in the Address Book.

1Log in from the control panel as an administrator with privileges.

2Press [System Settings].

3Press [Administrator Tools].

4Press [Down arrow key] 3 times.

5Press [Extended Security].

6Press [Driver Encryption Key:Encryption Strength], and change the settings.

Operation panel screen illustration

7Press [OK].

8Log out.

Note

  • The operation privileges of an administrator differ depending on the setting.

Driver Encryption Key:Encryption Strength

The network administrator can specify this.

Specify encryption strength for sending jobs from the driver to the machine.

The machine checks the encryption strength of the password appended to a job and processes it.

If [Simple Encryption] is specified, all jobs that are verified by user authentication are accepted.

If [DES] is specified, jobs encrypted with DES or AES are accepted.

If [AES] is specified, jobs encrypted with AES are accepted.

If you select [AES] or [DES], specify the encryption settings using the printer driver. For details about specifying the printer driver, see the printer driver Help.

Default: [Simple Encryption]

Restrict Display of User Information

The machine administrator can specify this if user authentication is specified.

When the job history is checked using a network connection for which authentication is not provided, all personal information can be displayed as "********". For example, when a user without administrator privileges checks the job history using SNMP in Web Image Monitor, personal information can be displayed as "********" so that users cannot be identified. Because information identifying registered users cannot be viewed, unauthorized users are prevented from obtaining information about the registered files.

Default: [Off]

Restrict Use of Destinations (Fax), Restrict Use of Destinations (Scanner)

The user administrator can specify this.

The available fax and scanner destinations are limited to the destinations registered in the Address Book.

No user can directly enter the destinations for transmission.

If "Restrict Use of Destinations (Scanner)" is set to [On], you can register fax numbers only.

If you specify the setting to receive e-mails via SMTP, you cannot use "Restrict Use of Destinations (Fax)" and "Restrict Use of Destinations (Scanner)".

The destinations searched by "LDAP Search" can be used.

For details, see Restricting Usage of the Destination List.

Default: [Off]

Restrict Adding of User Destinations (Fax), Restrict Adding of User Destinations (Scanner)

The user administrator can specify this.

If you set "Restrict Adding of User Destinations (Fax)" and/or "Restrict Adding of User Destinations (Scanner)" to [Off], users will be able to register a fax or scanner destination in the Address Book simply by entering the destination and pressing [Prg. Dest.]. If you set these functions to [On], [Prg. Dest.] will not appear. Despite this, users can enter a destination directly using the fax or scanner screen while they cannot register that destination in the Address Book by pressing [Prg. Dest.].

Also, note that even if you set these functions to [On], users registered in the Address Book can change their passwords. Only the user administrator can change items other than the password.

Default: [Off]

Transfer to Fax Receiver

The machine administrator can specify this.

If you use [Forwarding] or [Transfer Box] under the fax function, files stored on the machine can be transferred or delivered.

To prevent stored files being transferred by mistake, select [Prohibit] for this setting.

Default: [Do not Prohibit]

If you select [Prohibit] for this setting, the following functions are disabled:

  • Forwarding

  • Transfer Box

  • Delivery from Personal Box

  • Information Box

  • Delivery of Mail Received via SMTP

  • Routing Received Documents

For details, see "Reception Functions", Fax.

Authenticate Current Job

The machine administrator can specify this.

This setting allows you to specify whether or not authentication is required for operations such as canceling jobs under the copier and printer functions.

If you select [Login Privilege], authorized users and the machine administrator can operate the machine. When this is selected, authentication is not required for users who logged in to the machine before [Login Privilege] was selected.

If [Access Privilege] is specified, any user who performed a copy or print job can cancel the job. Also, the machine administrator can cancel the user's copy or print job.

Even if you select [Login Privilege] and log on to the machine, you cannot cancel a copy or print job that is being processed if you are not privileged to use the copy and printer functions.

You can specify "Authenticate Current Job" only if "User Authentication Management" was specified.

Default: [Off]

@Remote Service

The machine administrator can specify this.

Communication via HTTPS for RICOH @Remote Service is disabled if you select [Prohibit].

When setting it to [Prohibit], consult with your service representative.

If it is set to [Proh. Some Services], it becomes impossible to change settings via a remote connection, providing optimally secure operation.

Default: [Do not Prohibit]

Update Firmware

The machine administrator can specify this.

This setting is to specify whether or not to allow firmware updates on the machine. A service representative updates the firmware, or firmware updates are performed via the network.

If you select [Prohibit], the machine's firmware cannot be updated.

If you select [Do not Prohibit], there are no restrictions on firmware updates.

Default: [Do not Prohibit]

Password Policy

The user administrator can specify this.

This setting allows you to specify [Complexity Setting] and [Minimum Character No.] for the password. By making this setting, you can only use passwords that meet the conditions specified in "Complexity Setting" and "Minimum Character No.".

If you select [Level 1], specify a password using a combination of 2 types of characters selected from upper-case letters, lower-case letters, decimal numbers, and symbols such as #.

If you select [Level 2], specify a password using a combination of 3 types of characters selected from upper-case letters, lower-case letters, decimal numbers, and symbols such as #.

Default: [Off]. There are no restrictions on the number of characters, and the types of characters are not specified.

Settings by SNMPv1, v2

The network administrator can specify this.

If SNMPv1 or SNMPv2 protocols are used to access the machine, authentication cannot be performed, so that paper settings or other settings that the machine administrator specifies can be changed. If you select [Prohibit], the setting can be viewed but not specified with SNMPv1, v2.

Default: [Do not Prohibit]

Security Setting for Access Violation

The machine administrator can specify this.

When logging in to the machine via a network application, a user may be locked out by mistake because the number of authentication attempts by the user does not match the number of the attempts specified on the machine.

For example, access may be denied when a print job for multiple sets of pages is sent from an application.

If you select [On] under "Security Setting for Access Violation", you can prevent such authentication errors.

  • On

    • Denial Durtn. for Accs. Viol.

      Specify how many user accesses are allowed.

      Use the number keys to specify the value between "0" and "60", and then press [Sharp].

      Default: [15]

    • Managed User Host Limit

      Specify how many user accounts can be managed under "Security Setting for Access Violation".

      Use the number keys to specify the value between "50" and "200", and then press [Sharp].

      Default: [200]

    • Password Entry Host Limit

      Specify how many passwords can be managed under "Security Setting for Access Violation".

      Use the number keys to specify the value between "50" and "200", and then press [Sharp].

      Default: [200]

    • Status Monitor Interval

      Specify the monitoring interval of "Managed User Host Limit" and "Password Entry Host Limit".

      Use the number keys to specify the value between "1" and "10", and then press [Sharp].

      Default: [3]

  • Off

Default: [Off]

Password Entry Violation

The machine administrator can specify this.

If the number of authentication requests exceeds the number specified by the setting, the system recognizes the access as a password attack. The access is recorded in the Access Log and the log data is sent to the machine administrator by e-mail.

If the "Max. Allowed No. of Access" is set to [0], password attacks are not detected.

  • Max. Allowed No. of Access

    Specify the maximum number of allowable authentication attempts.

    Use the number keys to specify the value between "0" and "100", and then press [Sharp].

    Default: [30]

  • Measurement Time

    Specify the interval between repeated authentication attempts that result in authentication failures. When the measurement time elapses, the records of authentication attempts are cleared.

    Use the number keys to specify the value between "1" and "10", and then press [Sharp].

    Default: [5]

Note

  • Depending on the values specified for the settings for [Max. Allowed No. of Access] and [Measurement Time], you may receive violation detection e-mails frequently.

  • If you receive violation detection e-mail s frequently, check the content and review the setting values.

Device Access Violation

The machine administrator can specify this.

If the number of login requests exceeds the number specified by the setting, the system recognizes the access as an access violation. The access is recorded in the Access Log and the log data is sent to the machine administrator by e-mail. Also, a message is displayed on the control panel and on Web Image Monitor.

If the "Max. Allowed No. of Access" is set to [0], access violations are not detected.

In "Authentication Delay Time", you can specify response delay time for login requests to prevent the system from becoming unresponsive when an access violation is detected.

In "Simultns. Access Host Limit", you can specify the maximum number of hosts that access the machine at one time. If the number of simultaneous accesses exceeds the number specified by the setting, monitoring becomes unavailable and the machine's monitoring status is recorded in the Log.

  • Max. Allowed No. of Access

    Specify the maximum number of allowable access attempts.

    Use the number keys to specify the value between "0" and "500", and then press [Sharp].

    Default: [100]

  • Measurement Time

    Specify the interval between excessive accesses. When the measurement time elapses, the records of excessive accesses are cleared.

    Use the number keys to specify the value between "10" and "30", and then press [Sharp].

    Default: [10]

  • Authentication Delay Time

    Specify authentication delay time when an access violation is detected.

    Use the number keys to specify the value between "0" and "9", and then press [Sharp].

    Default: [3]

  • Simultns. Access Host Limit

    Specify the number of acceptable authentication attempts when authentications are delayed due to an access violation.

    Use the number keys to specify the value between "50" and "200", and then press [Sharp].

    Default: [200]

Note

  • Depending on the values specified for the settings for [Max. Allowed No. of Access] and [Measurement Time], you may receive violation detection e-mails frequently.

  • If you receive violation detection e-mails frequently, check the content and review the setting values.