Xerox WORKCENTRE 7435 보충 설명서 - 페이지 2

{카테고리_이름} Xerox WORKCENTRE 7435에 대한 보충 설명서을 온라인으로 검색하거나 PDF를 다운로드하세요. Xerox WORKCENTRE 7435 49 페이지. Security function
Xerox WORKCENTRE 7435에 대해서도 마찬가지입니다: 참조 매뉴얼 (28 페이지), 브로셔 및 사양 (8 페이지), 사양 (15 페이지), 평가자 매뉴얼 (32 페이지), 사양 (14 페이지), 소프트웨어 업그레이드 (2 페이지), 빠른 시작 매뉴얼 (7 페이지)

Xerox WORKCENTRE 7435 보충 설명서

Table of Contents

Before Using the Security Function .................................................................. 5
Preface .......................................................................................................................................................5
Security Features...................................................................................................................................6
Settings for the Secure Operation ................................................................................................6
Data Restoration...................................................................................................................................7
Use of the Overwrite Hard Disk......................................................................................................8
Service Representative Restricted Operation ..........................................................................8
For Optimal Performance of the Security features ..............................................................9
Confirm the Machine ROM version and the System Clock ............................................ 10
How to check by Control Panel......................................................................................... 10
How to check by Print Report ............................................................................................ 10
How to check the Clock........................................................................................................ 10
Initial Settings Procedures Using Control Panel...................................... 11
Change the System Administrator's Passcode .................................................................... 11
Set Maximum Login Attempts..................................................................................................... 11
Set Service Rep. Restricted Operation...................................................................................... 12
Set Overwrite Hard Disk .................................................................................................................. 12
Set Scheduled Image Overwrite ................................................................................................. 12
Set Authentication ............................................................................................................................ 13
Set Access Control ............................................................................................................................. 13
Set Private Print .................................................................................................................................. 13
Set User Passcode Minimum Length ........................................................................................ 14
Set SMB................................................................................................................................................... 15
Set SSL/TSL ........................................................................................................................................... 16
Configuring Machine certificates............................................................................................... 16
Set IPSec ................................................................................................................................................ 17
Set IPSec Address .................................................................................................... 17
Set SNMPv3 .......................................................................................................................................... 18
Set S/MIME........................................................................................................................................... 19
Regular Review by Audit Log ............................................................................ 20
Set Audit Log........................................................................................................................................ 20
Import the Audit Log File............................................................................................................... 20
Authentication for the Secure Operation ................................................... 21
Overview of Authentication.......................................................................................................... 21
Users Controlled by Authentication ............................................................................... 21
Machine Administrator ........................................................................................................ 21
2