Managing Log Files
The logs record failed access attempts and the names of users who accessed the machine
successfully. You can use this information to help prevent data leaks.
To transfer the log data, Remote Communication Gate S is required. For details about managing
log files, see "Managing Log Files".
Encrypting Data on the Hard Disk
Encrypt data stored on the hard disk to prevent information leakage. For details, see "Encrypting
Data on the Hard Disk".
Overwriting the Data on the Hard Disk
To prevent data leaks, you can set the machine to automatically overwrite temporary data. We
recommend that before disposing of the machine, you overwrite all the data on the hard disk.
For details about overwriting the data on the hard disk, see "Deleting Data on the Hard Disk".
• p.99 "Printing a Confidential Document"
•
p.105 "Configuring Access Permissions for Stored Files"
• p.117 "Preventing Information Leakage Due to Unauthorized Transmission"
• p.120 "Using S/MIME to Protect E-mail Transmission"
• p.129 "Protecting the Address Book"
• p.174 "Managing Log Files"
• p.133 "Encrypting Data on the Hard Disk"
• p.141 "Deleting Data on the Hard Disk"
Limiting and Controlling Access
Preventing Modification or Deletion of Stored Data
You can allow selected users to access stored scan files and files stored in Document Server.
You can permit selected users who are allowed to access stored files to modify or delete the files.
For details about limiting and controlling access, see "Configuring Access Permissions for Stored
Files".
Preventing Modification of Machine Settings
The machine settings that can be modified depend on the type of administrator account.
Register the administrators so that users cannot change the administrator settings. For details about
preventing modification of machine settings, see "Preventing Changes to Machine Settings".
1. Getting Started
22