User Guide
IM C530 series
User Guide Top
Top Page
>
Security
Security
Introduction
Taking Measures to Prevent Security Threats
Registering the Administrator Before Using the Machine
Preventing Unauthorized Accesses
Taking Measures to Prevent Unauthorized Access
Registering/Changing/Deleting User Codes
Verifying Users to Operate the Machine (User Authentication)
Preparing the Server to Use for User Authentication
Logging in to the Machine Using an IC Card or a Smart Device
Limiting Available Functions
Executing a Print Job with Authentication Information Only
Specifying the Policy on Login/Logout
Access Control
Encrypting Network Communication
Preventing Information Leaks
Taking Measures to Prevent Information Leaks
Preventing Information Leaks by Sending Data to a Wrong Destination
Preventing Information Leaks from the Media Slot
Preventing Printing Personal Information in Fax Reports
Controlling Access to Untrusted Websites from the Control Panel
Encrypting Data to Prevent Data Leaks Caused by a Stolen or Disposed Machine
Restricting Operations of the Customer Engineer without the Supervision of the Administrator