Extended Security Settings
Driver Encryption Key
This can be specified by the network administrator. Encrypt the password transmitted when specifying
user authentication. If you register the encryption key specified with the machine in the driver,
passwords are encrypted. For details about specifying the driver encryption key, see p.155
"Specifying a Driver Encryption Key".
Encrypt Address Book
This can be specified by the user administrator. Encrypt the data in the machine's Address Book.
For details on protecting data in the Address Book, see p.96 "Protecting the Address Book".
Default: [Off]
Restrict Use of Destinations
This can be specified by the user administrator.
The available scanner destinations are limited to the destinations registered in the Address Book.
A user cannot directly enter the destinations for transmission.
If you specify the setting to receive e-mails via SMTP, you cannot use "Restrict Use of Destinations".
The destinations searched by "LDAP Search" can be used.
For details about preventing unauthorized transmission, see p.87 "Preventing Information Leakage
Due to Unauthorized Transmission".
Default: [Off]
Restrict Adding of User Destinations
This can be specified by the user administrator.
If you set "Restrict Adding of User Destinations" to [Off], users will be able to register a scanner
destination in the Address Book simply by entering the destination and then pressing [Prg. Dest.]. If
you set these functions to [On], the [Prg. Dest.] key will not appear. Users will still be able to enter a
destination directly using the scanner screen, but cannot then register that destination in the Address
Book by pressing [Prg. Dest.]. Note too that if you set these functions to [On], only the user administrator
can register new users in the Address Book and change the passwords and other information of
existing registered users.
Default: [Off]
Restrict Display of User Information
This can be specified by the machine administrator.
This can be specified if user authentication is specified. When the job history is checked using a network
connection for which authentication is not available, all personal information can be displayed as
"********". Because information identifying registered users cannot be viewed, unauthorized users
are prevented from obtaining information about the registered files.
8. Specifying the Extended Security Functions
192