Specifying Passwords for Stored Files.....................................................................................................127
Unlocking Files...........................................................................................................................................129
Preventing Data Leaks Due to Unauthorized Transmission........................................................................132
Restrictions on Destinations.......................................................................................................................132
Using S/MIME to Protect Email Transmission.............................................................................................135
E-mail Encryption.......................................................................................................................................135
Attaching an Electronic Signature............................................................................................................137
Protecting the Address Book.........................................................................................................................143
Address Book Access Permission.............................................................................................................143
Encrypting Data in the Address Book......................................................................................................146
Encrypting Data on the Hard Disk................................................................................................................150
Enabling the Encryption Settings..............................................................................................................150
Printing the Encryption Key.......................................................................................................................153
Updating the Encryption Key....................................................................................................................155
Canceling Data Encryption......................................................................................................................158
Deleting Data on the Hard Disk....................................................................................................................162
Auto Erase Memory .................................................................................................................................162
Erase All Memory......................................................................................................................................166
4. Managing Access to the Machine
Preventing Modification of Machine Settings..............................................................................................171
Menu Protect..................................................................................................................................................173
Menu Protect..............................................................................................................................................173
Limiting Available Functions..........................................................................................................................177
Specifying Which Functions are Available.............................................................................................177
Managing Log Files.......................................................................................................................................180
Using The Control Panel to Specify Log File Settings.............................................................................180
Using Web SmartDeviceMonitor Professional IS/Standard to Manage Log Files.............................182
Using Web Image Monitor to Manage Log Files...................................................................................182
5. Enhanced Network Security
Preventing Unauthorized Access..................................................................................................................185
Access Control...........................................................................................................................................185
Enabling/Disabling Protocols..................................................................................................................186
Specifying Network Security Level..........................................................................................................194
5