iii
TABLE OF CONTENTS
Manuals for This Machine ......................................................................................i
How to Read This Manual .....................................................................................1
1. Getting Started
Enhanced Security.................................................................................................3
Glossary .....................................................................................................................4
Security Measures Provided by this Machine.....................................................5
Preventing Information Leaks ....................................................................................5
Preventing Unauthorized Operation...........................................................................6
Enhanced Network Security.......................................................................................7
2. Preventing Information Leaks
Printing a Confidential Document ........................................................................9
Choosing a Locked Print file ......................................................................................9
Printing a Locked Print File ......................................................................................10
Specifying Access Permission for Stored Files ...............................................11
Assigning Users and Access Permission for Stored Files .......................................11
Assigning the User and the Access Permission for the User’s Stored Files ............13
Specifying Passwords for the Stored Files...............................................................15
Unlocking Files.........................................................................................................16
Preventing Data Leaks Due to Unauthorized Transmission............................17
Specifying Which Users Are Allowed to Send Files .................................................17
Restrictions on Destinations.....................................................................................17
Protecting the Address Book .............................................................................19
Address Book Access Permission ...........................................................................19
Encrypting the Data in the Address Book ................................................................21
Overwriting the Data on the Hard Disk ..............................................................23
“Auto Erase Memory Setting”...................................................................................23
“Erase All Memory” ..................................................................................................26
3. Preventing Unauthorized Use of Functions and Settings
Preventing Modification of Machine Settings ...................................................29
Limiting Available Functions ..............................................................................30
Specifying Which Functions are Available ...............................................................30
4. Enhanced Network Security
Preventing Unauthorized Access.......................................................................33
Network Settings ......................................................................................................33
Access Control.........................................................................................................34
Encrypting Transmitted Passwords...................................................................36
Driver Encryption Key ..............................................................................................36
Group Password for PDF files..................................................................................38
IPP Authentication Password...................................................................................39
MarC25_EN_SecRef_F_FM.book Page iii Monday, August 2, 2004 6:14 PM