• p.132 "Preventing Data Leaks Due to Unauthorized Transmission"
• p.135 "Using S/MIME to Protect Email Transmission"
• p.143 "Protecting the Address Book"
• p.180 "Managing Log Files"
• p.150 "Encrypting Data on the Hard Disk"
• p.162 "Deleting Data on the Hard Disk"
Limiting and Controlling Access
Preventing Modification or Deletion of Stored Data
You can allow selected users to access stored scan files and files stored in Document Server.
You can permit selected users who are allowed to access stored files to modify or delete the files. For
details about limiting and controlling access, see “Specifying Access Permission for Stored Files”.
Preventing Modification of Machine Settings
The machine settings that can be modified depend on the type of administrator account.
Register the administrators so that users cannot change the administrator settings. For details about
preventing modification of machine settings, see “Preventing Modification of Machine Settings”.
Limiting Available Functions
To prevent unauthorized operation, you can specify who is allowed to access each of the machine's
functions. For details about limiting available functions for users and groups, see “Limiting Available
Functions”.
• p.117 "Specifying Access Permission for Stored Files"
• p.171 "Preventing Modification of Machine Settings"
• p.177 "Limiting Available Functions"
Enhanced Network Security
Preventing Unauthorized Access
You can limit IP addresses or disable ports to prevent unauthorized access over the network and
protect the Address Book, stored files, and default settings. For details about preventing unauthorized
access, see “Preventing Unauthorized Access”.
Encrypting Transmitted Passwords
Prevent login passwords, group passwords for PDF files, and IPP authentication passwords from being
revealed by encrypting them for transmission.
1. Getting Started
18