2-60
Installing and Setting up the Machine > Additional Preparations for the Administrator
I want to... Function Reference page
Prevent the data stored in the machine
from being leaked.
Data Overwrite
*1
*1 The optional Data Security Kit is required.
Refer to the Data
Security Kit (E)
Operation Guide.
Encryption
*1
PDF Encryption Functions page 6-72
Completely delete the data on the machine
before disposing of the machine.
Data Sanitization page 8-65
Record the operation history of users. Login History Settings page 8-44
Device Log History Settings page 8-45
Secure Comm. Error Log page 8-46
Protect the transmission from interception
and wiretapping.
IPP over SSL page 8-56
HTTPS page 8-56
LDAP Security Refer to the Command
Center RX User
Guide.
SMTP Security page 8-54
POP3 Security page 8-54
FTP Encrypted TX page 6-76
Enhanced WSD (SSL) page 8-57
IPSec page 8-54
SNMPv3 page 8-57
Verify the software in the machine. Software Verification page 8-65