Xerox WORKCENTRE 7435 Panduan Tambahan - Halaman 2

Jelajahi secara online atau unduh pdf Panduan Tambahan untuk Printer Xerox WORKCENTRE 7435. Xerox WORKCENTRE 7435 49 halaman. Security function
Juga untuk Xerox WORKCENTRE 7435: Panduan Referensi (28 halaman), Brosur & Spesifikasi (8 halaman), Spesifikasi (15 halaman), Panduan Evaluator (32 halaman), Spesifikasi (14 halaman), Peningkatan Perangkat Lunak (2 halaman), Panduan Memulai Cepat (7 halaman)

Xerox WORKCENTRE 7435 Panduan Tambahan

Table of Contents

Before Using the Security Function .................................................................. 5
Preface .......................................................................................................................................................5
Security Features...................................................................................................................................6
Settings for the Secure Operation ................................................................................................6
Data Restoration...................................................................................................................................7
Use of the Overwrite Hard Disk......................................................................................................8
Service Representative Restricted Operation ..........................................................................8
For Optimal Performance of the Security features ..............................................................9
Confirm the Machine ROM version and the System Clock ............................................ 10
How to check by Control Panel......................................................................................... 10
How to check by Print Report ............................................................................................ 10
How to check the Clock........................................................................................................ 10
Initial Settings Procedures Using Control Panel...................................... 11
Change the System Administrator's Passcode .................................................................... 11
Set Maximum Login Attempts..................................................................................................... 11
Set Service Rep. Restricted Operation...................................................................................... 12
Set Overwrite Hard Disk .................................................................................................................. 12
Set Scheduled Image Overwrite ................................................................................................. 12
Set Authentication ............................................................................................................................ 13
Set Access Control ............................................................................................................................. 13
Set Private Print .................................................................................................................................. 13
Set User Passcode Minimum Length ........................................................................................ 14
Set SMB................................................................................................................................................... 15
Set SSL/TSL ........................................................................................................................................... 16
Configuring Machine certificates............................................................................................... 16
Set IPSec ................................................................................................................................................ 17
Set IPSec Address .................................................................................................... 17
Set SNMPv3 .......................................................................................................................................... 18
Set S/MIME........................................................................................................................................... 19
Regular Review by Audit Log ............................................................................ 20
Set Audit Log........................................................................................................................................ 20
Import the Audit Log File............................................................................................................... 20
Authentication for the Secure Operation ................................................... 21
Overview of Authentication.......................................................................................................... 21
Users Controlled by Authentication ............................................................................... 21
Machine Administrator ........................................................................................................ 21
2