<Data Management>

You can configure settings to utilize the machine settings or data such as address lists, or to manage the hard disk securely.
<Import from USB Memory>
  <Management Settings>  <Data Management>  <Import/Export>
You can import all the settings information from a USB memory device.
<Export to USB Memory>
  <Management Settings>  <Data Management>  <Import/Export>
You can export all the settings information into a USB memory device.
<Import Result Report>
  <Management Settings>  <Data Management>  <Import/Export>
Select to print a report of import results.
<Restrict Import/Export from Web Service>
  <Management Settings>  <Data Management>  <Import/Export>
Select whether to restrict import and export operations with Web applications other than the Remote UI.
<Hard Disk Data Complete Deletion>
  <Management Settings>  <Data Management>  <HDD Data Complete Deletion>
Select whether to automatically delete unnecessary data that remains in the hard disk. Removing Unnecessary Data from the Hard Disk
<Timing of Deletion>
  <Management Settings>  <Data Management>  <HDD Data Complete Deletion>
Select when to delete unnecessary data. Removing Unnecessary Data from the Hard Disk
<Overwrite Method for Deletion Mode>
  <Management Settings>  <Data Management>  <HDD Data Complete Deletion>
You can set the Deletion mode and how many times to erase the data. Removing Unnecessary Data from the Hard Disk
<Initialize All Data/Settings>
  <Management Settings>  <Data Management>
Select to restore all of the machine settings to the factory default values and completely erase the data stored in the machine. It is not normally necessary to use this setting, but it is useful to erase personal or confidential information when disposing of the machine. Initializing All Data/Settings
<TPM Settings>
  <Management Settings>  <Data Management>
If the TPM setting is activated, you can safely store in the TPM chip encryption key (TPM key) that encrypts confidential information such as the password, public key pair for TLS communication, and user certificate stored in the machine. Doing so, you can prevent important information for the machine from leaking. Also, you can recover the system if the TPM chip fails by restoring the TPM key.
2E8E-0HX