Auto Registration to the Address Book........................................................................................................... 44
Automatically Registered Address Book Items.......................................................................................... 44
User Lockout Function...................................................................................................................................... 45
Specifying the User Lockout Function.........................................................................................................46
Canceling Password Lockout......................................................................................................................46
Auto Logout.......................................................................................................................................................47
3. Restricting Machine Usage
Preventing Changes to Administrator Settings............................................................................................... 49
Limiting the Settings that Can Be Changed by Each Administrator..........................................................49
Prohibiting Users from Making Changes to Settings.................................................................................49
Limiting Available Functions............................................................................................................................ 50
4. Preventing Leakage of Information from Machines
Protecting the Address Book........................................................................................................................... 51
Specifying Address Book Access Permissions........................................................................................... 51
Encrypting Data in the Address Book.........................................................................................................53
Encrypting Data on the Machine.................................................................................................................... 55
Enabling the Encryption Settings.................................................................................................................56
Backing Up the Encryption Key.................................................................................................................. 58
Updating the Encryption Key......................................................................................................................59
Canceling Data Encryption.........................................................................................................................61
Deleting Data on the Machine........................................................................................................................63
Auto Erase Memory.....................................................................................................................................63
Erase All Memory........................................................................................................................................ 66
5. Enhanced Network Security
Access Control..................................................................................................................................................71
Enabling and Disabling Protocols...................................................................................................................72
Enabling and Disabling Protocols Using the Control Panel......................................................................75
Enabling and Disabling Protocols Using Web Image Monitor................................................................75
Specifying Network Security Levels................................................................................................................77
Specifying Network Security Levels Using the Control Panel.................................................................. 77
Specifying Network Security Level Using Web Image Monitor.............................................................. 78
Status of Functions under Each Network Security Level........................................................................... 78
Protecting Communication Paths via a Device Certificate............................................................................ 81
2