2-60
Installing and Setting up the Machine > Additional Preparations for the Administrator
I want to... Function Reference page
Prevent the data stored in the machine
from being leaked.
Data Overwrite
*1
*1 The optional Data Security Kit is required.
Refer to the Data
Security Kit (E)
Operation Guide.
Encryption
*1
PDF Encryption Functions page 6-79
Completely delete the data on the machine
before disposing of the machine.
Data Sanitization page 8-65
Record the operation history of users. Login History Settings page 8-45
Device Log History Settings page 8-46
Secure Comm. Error Log page 8-47
Protect the transmission from interception
and wiretapping.
IPP over SSL page 8-57
HTTPS page 8-57
LDAP Security Refer to the Command
Center RX User
Guide.
SMTP Security page 8-55
POP3 Security page 8-55
FTP Encrypted TX page 6-83
Enhanced WSD (SSL) page 8-58
IPSec page 8-55
SNMPv3 page 8-58
Verify the software in the machine. Software Verification page 8-65