EasyManua.ls Logo

Ricoh IM 8000

Ricoh IM 8000
148 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
2023/05/01 14:48
Taking Measures to Prevent Security Threats | User Guide | IM 7000, IM 8000, IM 9000
https://support.ricoh.com/services/device/ccmanual/IM_7000-8000-9000-re/en-GB/security/int/prevent.htm
2/3
When login is continuously fails due to an incorrect Login Password, login will be blocked.
If the machine is not used for a specified period after logging in, the user is forcibly logged out.
Specifying the Policy on Login/Logout
Restrict the range of the IP addresses that are allowed to access the machine to block access to the
machine from unauthorized computers. Also, specify the unused protocols to reduce the risk of intrusion.
Access Control
/ Prevent the leak or falsification of information by encrypting communication.
Encrypting Network Communication
Preventing the leak of information by handling files
Restrict browsing of files stored in the machine or the Address Book to protect the leak of information by
unauthorized persons.
Preventing Information Leaks by Sending Data to a Wrong Destination
Restrict the manual input of the destination to avoid wrong transmission by careless mistake.
Preventing Information Leaks by Sending Data to a Wrong Destination
Restrict the connection of external media to avoid the data being removed.
Preventing Information Leaks from the Media Slot
/ Prevent unauthorized copying or printed paper stolen by embedding a pattern on the printed surface
or restricting normal printing.
Preventing Data Leaks from Printed Sheets
Prevent the leak of information when the machine is stolen or disposed by encrypting data.
Encrypting Data to Prevent Data Leaks Caused by a Stolen or Disposed Machine
Restrict the operation in Service Mode used for maintenance and repair by a customer engineer to
prevent the leak of information.
Restricting Operations of the Customer Engineer without the Supervision of the Machine Administrator
To prevent this machine from being stolen or willfully damaged, install it in a secure location.
If the security settings are not configured, the data in the machine may be vulnerable to attack.
Select a person who can responsibly use the machine as the machine administrator, and use the machine
appropriately.

Related product manuals