Security Measures Provided by this Machine
Using Authentication and Managing Users
Enabling Authentication
To control administrators' and users' access to the machine, perform administrator authentication and
user authentication using login user names and login passwords. To perform authentication, the
authentication function must be enabled. For details about authentication settings, see p.37
"Configuring User Authentication".
Specifying Authentication Information to Log in
Users are managed using the personal information managed in the machine's Address Book.
By enabling user authentication, you can allow only people registered in the Address Book to use the
machine. Users can be managed in the Address Book by the user administrator. For information on
specifying information to log in, see p.41 "Basic Authentication".
Specifying Which Functions are Available
This can be specified by the user administrator. Specify the functions available to registered users. By
making this setting, you can limit the functions available to users. For information on how to specify
which functions are available, see p.122 "Limiting Available Functions".
Ensuring Information Security
Protecting Stored Files from Unauthorized Access
You can specify who is allowed to use and access scanned files and the files in the Document Server.
You can prevent activities such as the printing of stored files by unauthorized users. For details about
protecting stored files from unauthorized access, see p.75 "Configuring Access Permissions for
Stored Files".
Protecting Stored Files from Theft
You can specify who is allowed to use and access scanned files and the files in the Document Server.
You can prevent activities such as the sending and downloading of stored files by unauthorized users.
For details about protecting stored files from theft, see p.75 "Configuring Access Permissions for
Stored Files".
Preventing Data Leaks Due to Unauthorized Transmission
You can specify in the Address Book which users are allowed to send files using the scanner function.
You can also limit the direct entry of destinations to prevent files from being sent to destinations not
registered in the Address Book. For details about preventing data leaks due to unauthorized
transmission, see p.87 "Preventing Information Leakage Due to Unauthorized Transmission".
Security Measures Provided by this Machine
19