Printing a List of Print Volume Use Counters...............................................................................................89
Clearing Print Volume Use Counters..........................................................................................................91
Configuring the Auto-Reset Function..........................................................................................................92
4. Preventing Leakage of Information from Machines
Protecting the Address Book...........................................................................................................................95
Specifying Address Book Access Permissions...........................................................................................95
Encrypting Data in the Address Book.........................................................................................................97
Encrypting Data on the Hard Disk..................................................................................................................99
Enabling the Encryption Settings..............................................................................................................101
Backing Up the Encryption Key................................................................................................................103
Updating the Encryption Key....................................................................................................................103
Canceling Data Encryption......................................................................................................................104
Deleting Data on the Hard Disk....................................................................................................................106
Conditions for Use.....................................................................................................................................106
Instructions for Use....................................................................................................................................106
Auto Erase Memory..................................................................................................................................106
Erase All Memory......................................................................................................................................111
5. Enhanced Network Security
Access Control...............................................................................................................................................115
Enabling and Disabling Protocols................................................................................................................116
Enabling and Disabling Protocols Using the Control Panel...................................................................123
Enabling and Disabling Protocols Using Web Image Monitor.............................................................123
Specifying Network Security Level...............................................................................................................125
Specifying Network Security Level Using the Control Panel.................................................................125
Specifying Network Security Level Using Web Image Monitor............................................................126
Status of Functions under Each Network Security Level.........................................................................126
Protecting the Communication Path via a Device Certificate.....................................................................130
Creating and Installing a Device Certificate from the Control Panel (Self-Signed Certificate)...........130
Creating and Installing a Device Certificate from Web Image Monitor (Self-Signed Certificate).....131
Creating the Device Certificate (Issued by a Certificate Authority).......................................................132
Installing the Device Certificate (Issued by a Certificate Authority)......................................................133
Installing an Intermediate Certificate (Issued by a Certificate Authority)..............................................134
Configuring SSL/TLS.....................................................................................................................................135
3