Confidential information is handled by information devices everywhere, including computers and printers, and any of these devices may become a target for malicious third parties at anytime. Attackers may directly gain unauthorized access to your devices, or indirectly take advantage of negligence or improper use. Either way, you may incur unanticipated losses when your confidential information is leaked. To counter these risks, the machine is equipped with a variety of security functions. Set the necessary configuration depending on your network environment.
This site uses cookies to provide its contents and functions and improve their qualities etc. You can find out more about our use of the cookies here. If you select "Reject", only cookies necessary to provide the contents and functions of the site are recorded and stored.