Xerox WORKCENTRE 7435 Tamamlayıcı Kılavuz - Sayfa 2

Yazıcı Xerox WORKCENTRE 7435 için çevrimiçi göz atın veya pdf Tamamlayıcı Kılavuz indirin. Xerox WORKCENTRE 7435 49 sayfaları. Security function
Ayrıca Xerox WORKCENTRE 7435 için: Referans Kılavuzu (28 sayfalar), Broşür ve Teknik Özellikler (8 sayfalar), Teknik Özellikler (15 sayfalar), Değerlendirici El Kitabı (32 sayfalar), Teknik Özellikler (14 sayfalar), Yazılım Yükseltme (2 sayfalar), Hızlı Başlangıç Kılavuzu (7 sayfalar)

Xerox WORKCENTRE 7435 Tamamlayıcı Kılavuz

Table of Contents

Before Using the Security Function .................................................................. 5
Preface .......................................................................................................................................................5
Security Features...................................................................................................................................6
Settings for the Secure Operation ................................................................................................6
Data Restoration...................................................................................................................................7
Use of the Overwrite Hard Disk......................................................................................................8
Service Representative Restricted Operation ..........................................................................8
For Optimal Performance of the Security features ..............................................................9
Confirm the Machine ROM version and the System Clock ............................................ 10
How to check by Control Panel......................................................................................... 10
How to check by Print Report ............................................................................................ 10
How to check the Clock........................................................................................................ 10
Initial Settings Procedures Using Control Panel...................................... 11
Change the System Administrator's Passcode .................................................................... 11
Set Maximum Login Attempts..................................................................................................... 11
Set Service Rep. Restricted Operation...................................................................................... 12
Set Overwrite Hard Disk .................................................................................................................. 12
Set Scheduled Image Overwrite ................................................................................................. 12
Set Authentication ............................................................................................................................ 13
Set Access Control ............................................................................................................................. 13
Set Private Print .................................................................................................................................. 13
Set User Passcode Minimum Length ........................................................................................ 14
Set SMB................................................................................................................................................... 15
Set SSL/TSL ........................................................................................................................................... 16
Configuring Machine certificates............................................................................................... 16
Set IPSec ................................................................................................................................................ 17
Set IPSec Address .................................................................................................... 17
Set SNMPv3 .......................................................................................................................................... 18
Set S/MIME........................................................................................................................................... 19
Regular Review by Audit Log ............................................................................ 20
Set Audit Log........................................................................................................................................ 20
Import the Audit Log File............................................................................................................... 20
Authentication for the Secure Operation ................................................... 21
Overview of Authentication.......................................................................................................... 21
Users Controlled by Authentication ............................................................................... 21
Machine Administrator ........................................................................................................ 21
2