2-42
Installing and Setting up the Machine > Additional Preparations for the Administrator
Strengthening the Security
Access rights for configuring important settings are set for the machine administrator and administrator only.
Change the login user name and password for the machine administrator and administrator from the factory
default settings to ensure that only users with access rights can operate the device properly.
In addition, this machine is equipped with user authentication function, which can be configured to limit the
access to this machine to only those who have a registered login name and password.
User Authentication and Accounting (User Login, Job Accounting) (page 9-1)
This product has an optional security chip called TPM (UG-50) (Trusted Platform Module). The encryption key
used to encrypt confidential information on this machine is stored in a dedicated storage area on the TPM chip.
Since this storage area cannot be read from outside the TPM, confidential information can be safely protected.
I want to... Function Reference
page
Restrict the users of the machine. User Login page 9-2
Auto Panel Reset page 8-34
ID Card Settings
*1
*1 The optional Card Authentication Kit is required.
page 9-14
Prevent another user from handling the
documents stored in the machine.
Custom Box
*2
*2 The optional SSD is required.
page 5-4
Output the document stored in the machine
at the time when user operates the device via
operation panel.
Remote Printing page 8-37
Prevent the data stored in the machine from
being leaked.
Data Overwrite
*3
*3 It is necessary to activate the Data Security Function.
Data
Encryption/
Overwrite
OPERATION
GUIDE
Encryption
*3
Completely delete the data on the machine
before disposing of the machine.
DataSanitization page 8-41
Protect the transmission from interception
and wiretapping.
IPP over TLS page 8-23
HTTPS page 8-23
SMTP Security
Command
Center RX User
Guide
POP3 Security
Command
Center RX User
Guide
Enhanced WSD (TLS) page 8-25
IPSec page 8-30
SNMPv3 page 8-21
Verify the software in the machine. SW Verification page 8-41
Preventing from execution of the
unauthorized programs
Allowlisting
page 8-43