92JJ-00H

Changing to the Recommended Security Settings

After checking the environment type of your machine, change the machine to the recommended settings for that type.
The procedure described here uses the control panel.
You can also configure the settings using the Remote UI from a computer.
Administrator, DeviceAdmin, or NetworkAdmin privileges are required. The machine must be restarted to apply the settings.
1
Check whether any jobs are currently executing.
You can press <Status Monitor> on the control panel of the machine, select <Copy/Print>, <Send>, <Receive>, or <Store>, and press <Job Status> to check whether there are any jobs currently executing.
2
Press <Settings/Registration> on the control panel of the machine.
3
Press <Management Settings> → <Security Settings> → <Recommended Security Settings for Usage Environment>.
The <Recommended Security Set. for Usage Environment> screen appears.
4
Select the environment type confirmed with the Security Settings Navigator, and press <Start>.
A message confirming whether you want to execute appears.
5
Confirm the message, and press <Yes>.
The machine restarts, and the security settings for the selected environment type are reflected.
<Recommended Security Set. for Usage Environment> is available with the latest platform version.
If it is not available, you can manually change the security settings. Effect and Impact of Security Settings
<Recommended Security Set. for Usage Environment> is not available if any security policy settings are set.
If Functions You Want to Use Become Unavailable
You can undo the changes to revert the machine to its previous state.
Restoring the Security Settings
For details on the effect and impact of the security settings for each environment type, see the following.
Effect and Impact of Security Settings