Xerox WORKCENTRE 7435 Podręcznik uzupełniający - Strona 2

Przeglądaj online lub pobierz pdf Podręcznik uzupełniający dla Drukarka Xerox WORKCENTRE 7435. Xerox WORKCENTRE 7435 49 stron. Security function
Również dla Xerox WORKCENTRE 7435: Podręcznik referencyjny (28 strony), Broszura i specyfikacje (8 strony), Specyfikacje (15 strony), Podręcznik oceniającego (32 strony), Specyfikacje (14 strony), Aktualizacja oprogramowania (2 strony), Skrócona instrukcja obsługi (7 strony)

Xerox WORKCENTRE 7435 Podręcznik uzupełniający

Table of Contents

Before Using the Security Function .................................................................. 5
Preface .......................................................................................................................................................5
Security Features...................................................................................................................................6
Settings for the Secure Operation ................................................................................................6
Data Restoration...................................................................................................................................7
Use of the Overwrite Hard Disk......................................................................................................8
Service Representative Restricted Operation ..........................................................................8
For Optimal Performance of the Security features ..............................................................9
Confirm the Machine ROM version and the System Clock ............................................ 10
How to check by Control Panel......................................................................................... 10
How to check by Print Report ............................................................................................ 10
How to check the Clock........................................................................................................ 10
Initial Settings Procedures Using Control Panel...................................... 11
Change the System Administrator's Passcode .................................................................... 11
Set Maximum Login Attempts..................................................................................................... 11
Set Service Rep. Restricted Operation...................................................................................... 12
Set Overwrite Hard Disk .................................................................................................................. 12
Set Scheduled Image Overwrite ................................................................................................. 12
Set Authentication ............................................................................................................................ 13
Set Access Control ............................................................................................................................. 13
Set Private Print .................................................................................................................................. 13
Set User Passcode Minimum Length ........................................................................................ 14
Set SMB................................................................................................................................................... 15
Set SSL/TSL ........................................................................................................................................... 16
Configuring Machine certificates............................................................................................... 16
Set IPSec ................................................................................................................................................ 17
Set IPSec Address .................................................................................................... 17
Set SNMPv3 .......................................................................................................................................... 18
Set S/MIME........................................................................................................................................... 19
Regular Review by Audit Log ............................................................................ 20
Set Audit Log........................................................................................................................................ 20
Import the Audit Log File............................................................................................................... 20
Authentication for the Secure Operation ................................................... 21
Overview of Authentication.......................................................................................................... 21
Users Controlled by Authentication ............................................................................... 21
Machine Administrator ........................................................................................................ 21
2