Security
Getting Started
This chapter describes the precautions you need to take when using the machine's security features and how to configure the administrator settings.
Configuring User Authentication
This chapter describes how to specify user authentication and explains the functions that are enabled by user authentication.
Restricting Machine Usage
This chapter explains how to restrict use of the machine by the user.
Preventing Leakage of Information from Machines
This chapter explains how to protect information if it is stored in the machine's memory or on the hard disk.
Enhanced Network Security
This chapter describes the functions for enhancing security when the machine is connected to the network.
Protecting Communication Paths via a Device Certificate
Protecting Communication Paths via a Device Certificate
Creating and Installing a Device Certificate from the Control Panel (Self-Signed Certificate)
Creating and Installing a Device Certificate from a Web Browser (Self-Signed Certificate)
Creating a Device Certificate (Issued by a Certificate Authority)
Installing a Device Certificate (Issued by a Certificate Authority)
Installing an Intermediate Certificate (Issued by a Certificate Authority)
Preventing the Leaking of Documents
This chapter explains how to protect document data stored on the machine or printed using the machine.
Managing the Machine
This chapter describes the functions for enhancing the security of the machine and operating the machine effectively.
Troubleshooting
This chapter describes what to do if the machine does not function properly.
List of Operation Privileges for Settings
This chapter specifies a list of the administrator and user operation privileges for the machine settings when administrator authentication or user authentication is enabled.