2-59
Installing and Setting up the Machine > Additional Preparations for the Administrator
I want to... Function Reference page
Prevent the data stored in the machine
from being leaked.
Data Overwrite
*1
*1 The optional Data Security Kit is required.
Refer to the Data
Security Kit (E)
Operation Guide.
Encryption
*1
PDF Encryption Functions page 6-70
Completely delete the data on the machine
before disposing of the machine.
Data Sanitization page 8-64
Record the operation history of users. Login History Settings page 8-44
Device Log History Settings page 8-45
Secure Comm. Error Log page 8-46
Protect the transmission from interception
and wiretapping.
IPP over SSL page 8-55
HTTPS page 8-55
LDAP Security Refer to the Command
Center RX User
Guide.
SMTP Security page 8-53
POP3 Security page 8-53
FTP Encrypted TX page 6-75
Enhanced WSD (SSL) page 8-56
IPSec page 8-53
SNMPv3 page 8-56
Verify the software in the machine. Software Verification page 8-64