Clearing Print Volume Use Counters..........................................................................................................90
Configuring the Auto-Reset Function..........................................................................................................91
4. Preventing Leakage of Information from Machines
Protecting the Address Book...........................................................................................................................93
Specifying Address Book Access Permissions...........................................................................................93
Encrypting Data in the Address Book.........................................................................................................95
Encrypting Data on the Hard Disk
..................................................................................................................98
Enabling the Encryption Settings..............................................................................................................100
Backing Up the Encryption Key................................................................................................................102
Updating the Encryption Key....................................................................................................................103
Canceling Data Encryption......................................................................................................................104
Deleting Data on the Hard Disk....................................................................................................................105
Conditions for Use.....................................................................................................................................105
Instructions for Use....................................................................................................................................105
Auto Erase Memory..................................................................................................................................105
Erase All Memory......................................................................................................................................110
5. Enhanced Network Security
Access Control...............................................................................................................................................113
Enabling and Disabling Protocols................................................................................................................114
Enabling and Disabling Protocols Using the Control Panel...................................................................120
Enabling and Disabling Protocols Using Web Image Monitor.............................................................121
Specifying Network Security Level...............................................................................................................122
Specifying Network Security Level Using the Control Panel.................................................................122
Specifying Network Security Level Using Web Image Monitor............................................................123
Status of Functions under Each Network Security Level
.........................................................................124
Protecting the Communication Path via a Device Certificate.....................................................................127
Creating and Installing a Device Certificate from the Control Panel (Self-Signed Certificate)...........127
Creating and Installing a Device Certificate from Web Image Monitor (Self-Signed Certificate).....128
Creating the Device Certificate (Issued by a Certificate Authority).......................................................129
Installing the Device Certificate (Issued by a Certificate Authority)......................................................130
Installing an Intermediate Certificate (Issued by a Certificate Authority)..............................................131
Configuring SSL/TLS.....................................................................................................................................132
Enabling SSL/TLS......................................................................................................................................133
3