2-62
Installing and Setting up the Machine > Additional Preparations for the Administrator
I want to... Function Reference page
Prevent another user from handling the
documents stored in the machine.
Custom Box page 5-51
Output the document stored in the
machine at the time when user operates
the device via operation panel.
Remote Printing page 8-33
Prevent the data stored in the machine
from being leaked.
Data Overwrite
*1
*1 It is necessary to activate the Data Security Function.
Refer to the Data
Encryption/Overwrite
Operation Guide.
Encryption
*1
PDF Encryption Functions page 6-82
Completely delete the data on the machine
before disposing of the machine.
Data Sanitization page 8-73
Record the operation history of users. Login History Settings page 8-50
Device Log History Settings page 8-51
Secure Comm. Error Log page 8-52
Protect the transmission from interception
and wiretapping.
IPP over SSL page 8-62
HTTPS page 8-62
LDAP Security Refer to the Command
Center RX User
Guide.
SMTP Security page 8-60
POP3 Security page 8-60
FTP Encrypted TX page 6-87
Enhanced WSD (SSL) page 8-63
IPSec page 8-60
SNMPv3 page 8-63
Verify the software in the machine. Software Verification page 8-73