- ページ 2

プリンター Xerox WORKCENTRE 7435のPDF 補足マニュアルをオンラインで閲覧またはダウンロードできます。Xerox WORKCENTRE 7435 49 ページ。 Security function
Xerox WORKCENTRE 7435 にも: リファレンス・マニュアル (28 ページ), パンフレット&スペック (8 ページ), 仕様 (15 ページ), 評価者マニュアル (32 ページ), 仕様 (14 ページ), ソフトウェアのアップグレード (2 ページ), クイック・スタート・マニュアル (7 ページ)

Xerox WORKCENTRE 7435 補足マニュアル

Table of Contents

Before Using the Security Function .................................................................. 5
Preface .......................................................................................................................................................5
Security Features...................................................................................................................................6
Settings for the Secure Operation ................................................................................................6
Data Restoration...................................................................................................................................7
Use of the Overwrite Hard Disk......................................................................................................8
Service Representative Restricted Operation ..........................................................................8
For Optimal Performance of the Security features ..............................................................9
Confirm the Machine ROM version and the System Clock ............................................ 10
How to check by Control Panel......................................................................................... 10
How to check by Print Report ............................................................................................ 10
How to check the Clock........................................................................................................ 10
Initial Settings Procedures Using Control Panel...................................... 11
Change the System Administrator's Passcode .................................................................... 11
Set Maximum Login Attempts..................................................................................................... 11
Set Service Rep. Restricted Operation...................................................................................... 12
Set Overwrite Hard Disk .................................................................................................................. 12
Set Scheduled Image Overwrite ................................................................................................. 12
Set Authentication ............................................................................................................................ 13
Set Access Control ............................................................................................................................. 13
Set Private Print .................................................................................................................................. 13
Set User Passcode Minimum Length ........................................................................................ 14
Set SMB................................................................................................................................................... 15
Set SSL/TSL ........................................................................................................................................... 16
Configuring Machine certificates............................................................................................... 16
Set IPSec ................................................................................................................................................ 17
Set IPSec Address .................................................................................................... 17
Set SNMPv3 .......................................................................................................................................... 18
Set S/MIME........................................................................................................................................... 19
Regular Review by Audit Log ............................................................................ 20
Set Audit Log........................................................................................................................................ 20
Import the Audit Log File............................................................................................................... 20
Authentication for the Secure Operation ................................................... 21
Overview of Authentication.......................................................................................................... 21
Users Controlled by Authentication ............................................................................... 21
Machine Administrator ........................................................................................................ 21
2