<Security Settings>

Specify the settings for enhancing the machine's security.

<Authentication/Password Settings>

 (Settings/Registration)  <Management Settings>  <Security Settings>
Specify the settings for enhancing the effective security of the password and the authentication function.

<Encryption Settings>

 (Settings/Registration)  <Management Settings>  <Security Settings>
Specify the settings for enhancing the effective encryption security.

<System Verification Settings>

 (Settings/Registration)  <Management Settings>  <Security Settings>
Specify whether to use the system verification and protection functions.
<Verify System at Startup>: Verifies the integrity of the firmware and MEAP applications when the machine starts up.
<Trellix Embedded Control>: Improves system reliability while the machine is running by using the Trellix Embedded Control to prevent unauthorized program modification or execution. This is only available when <Verify System at Startup> is <On>.
 
Item
Setting Description
DeviceAdmin
NetworkAdmin
Can be set in Remote UI
Device Information Delivery Available
Import All Function
Name of Item When Exporting with the Remote UI
<System Verification Settings>
<Verify System at Startup>: <On>, <Off>
No
No
Yes
No
C
Settings/Registration Basic Information
<Trellix Embedded Control>: <On>, <Off>
No
No
Yes
No
C
Settings/Registration Basic Information
With <Verify System at Startup>, the machine is restarted when you change the setting from <Off>  <On> or when you press <OK> without changing the setting from <On>. To maintain the <On> setting without restarting the machine, press <No> in the confirmation screen, and then press <Cancel> in the <System Verification Settings> screen.
When <Verify System at Startup> is set to <On>
Startup takes longer than when it is set to <Off> because system verification is performed.
The following events and results are recorded to the device management log. Managing the Logs
Event
Firmware verification, MEAP application verification
Result
Success, Failure
If an error code appears on the screen when you switch the machine on, contact your dealer or service representative.
When <Trellix Embedded Control> is set to <On>
The machine takes several minutes to restart after you specify this setting for the first time.
<Trellix System Monitor> appears in the <Home> screen, and you can use this to check the log entries for unauthorized operation, etc.

<Recommended Security Set. for Usage Environment>

 (Settings/Registration)  <Management Settings>  <Security Settings>
You can now specify all the recommended security settings for your usage environment simply by selecting the machine's environment type. See "Security Settings Navigator" for the available environment types. Security Settings Navigator
If any of the machine's security policy settings have been specified, <Recommended Security Set. for Usage Environment> cannot be used.
Item
Setting Description
DeviceAdmin
NetworkAdmin
Can be set in Remote UI
Device Information Delivery Available
Import All Function
Name of Item When Exporting with the Remote UI
<Recommended Security Set. for Usage Environment>
<1. Intranet And Internet Connection>
<2. Direct Internet Connection>
<3. Internet Connection Prohibited>
<4. Private (Home) Network>
<5. Public Network>
<6. Highly Confidential Info. Environment>
<Clear>
<Print Set.Changes>
No
No
Yes
No
No
-
If you change the machine to the recommended security settings for each type, functions you want to use may become unavailable or other problems may occur. In this case, you can undo the changes and restore the previous security settings.
If you manually changed settings that were changed with <Recommended Security Set. for Usage Environment>, the changes are not retained. The machine returns to the state before executing <Recommended Security Set. for Usage Environment>.
You can press <Print Set.Changes> to check the values of the changed settings.
A6A8-0UR