Clearing Print Volume Use Counters..........................................................................................................92
Configuring the Auto-Reset Function..........................................................................................................94
4. Preventing Leakage of Information from Machines
Protecting the Address Book...........................................................................................................................97
Specifying Address Book Access Permissions...........................................................................................97
Encrypting Data in the Address Book.........................................................................................................
99
Encrypting Data on the Hard Disk................................................................................................................101
Enabling the Encryption Settings..............................................................................................................103
Backing Up the Encryption Key................................................................................................................105
Updating the Encryption Key....................................................................................................................106
Canceling Data Encryption......................................................................................................................107
Deleting Data on the Hard Disk....................................................................................................................108
Conditions for Use.....................................................................................................................................108
Instructions for Use....................................................................................................................................108
Auto Erase Memory..................................................................................................................................109
Erase All Memory......................................................................................................................................113
5. Enhanced Network Security
Access Control...............................................................................................................................................117
Enabling and Disabling Protocols................................................................................................................118
Enabling and Disabling Protocols Using the Control Panel...................................................................124
Enabling and Disabling Protocols Using Web Image Monitor.............................................................125
Specifying Network Security Level...............................................................................................................126
Specifying Network Security Level Using the Control Panel.................................................................126
Specifying Network Security Level Using Web Image Monitor............................................................
127
Status of Functions under Each Network Security Level.........................................................................128
Protecting the Communication Path via a Device Certificate.....................................................................131
Creating and Installing a Device Certificate from the Control Panel (Self-Signed Certificate)...........131
Creating and Installing a Device Certificate from Web Image Monitor (Self-Signed Certificate).....132
Creating the Device Certificate (Issued by a Certificate Authority).......................................................133
Installing the Device Certificate (Issued by a Certificate Authority)......................................................134
Installing an Intermediate Certificate (Issued by a Certificate Authority)..............................................135
Configuring SSL/TLS.....................................................................................................................................136
Enabling SSL/TLS......................................................................................................................................137
3