2-64
Installing and Setting up the Machine > Additional Preparations for the Administrator
Prevent the data stored in the machine
from being leaked.
Data Overwrite
*2
Refer to the
Data
Encryption/
Overwrite
Operation
Guide.
Encryption
*2
PDF Encryption Functions page 6-78
Completely delete the data on the machine
before disposing of the machine.
Data Sanitization page 8-69
Record the operation history of users. Login History Settings page 8-28
Device Log History Settings page 8-29
Secure Comm. Error Log page 8-30
Protect the transmission from interception
and wiretapping.
IPP over SSL page 8-58
HTTPS page 8-59
LDAP Security Refer to the
Command
Center RX User
Guide.
SMTP Security page 8-37
POP3 Security page 8-37
FTP Encrypted TX page 6-83
Enhanced WSD (SSL) page 8-59
IPSec page 8-62
SNMPv3 page 8-59
Verify the software in the machine. Software Verification page 8-67
*1 The optional Card Authentication Kit is required.
*2 It is necessary to activate the Data Security Function.
I want to... Function Reference page