Table of Contents
Preface .......................................................................................................................................................5
Security Features...................................................................................................................................6
Data Restoration...................................................................................................................................7
How to check the Clock........................................................................................................ 10
Set Maximum Login Attempts..................................................................................................... 11
Set Overwrite Hard Disk .................................................................................................................. 12
Set Authentication ............................................................................................................................ 13
Set Access Control ............................................................................................................................. 13
Set Private Print .................................................................................................................................. 13
Set SMB................................................................................................................................................... 15
Set SSL/TSL ........................................................................................................................................... 16
Set IPSec ................................................................................................................................................ 17
Set IPSec Address .................................................................................................... 17
Set SNMPv3 .......................................................................................................................................... 18
Set S/MIME........................................................................................................................................... 19
Set Audit Log........................................................................................................................................ 20
Import the Audit Log File............................................................................................................... 20
Overview of Authentication.......................................................................................................... 21
Machine Administrator ........................................................................................................ 21
2