Various Security Functions

Document number: AE9R-0F2
Do you feel uneasy about the following problems?
Unattended output
Unauthorized access
Forgetting to erase confidential data on the machine
The machine provides various security functions for minimize the risk of information leakage and unauthorized access.
This section describes functions that are effective in certain situations.
Implementing security measures does not guarantee that all information will be protected.
Using the Import All function enables multiple devices to be managed with the same settings. Importing/Exporting the Setting Data

Preventing Documents Leaks and Modification

When managing confidential documents, it is necessary to handle problems such as leaks, loss, and modification. The machine is equipped with security functions designed to prevent paper and electronic documents from leakage and tampering, such as embedding invisible text in output, not starting printing until the user logs in at the device, and attaching a signature to PDF documents.
Use the following functions as security measures for preventing document leaks and modification, etc.
Forced Print of Recognition Information
You can configure the machine to always print information such as the name of the logged in user on printed documents. This enables you to identify the user responsible for the output of each document. Printing User Information on Documents

Preventing Unauthorized Access to the Network

Although Cloud services have made it easier to exchange data via the Internet, communication can still be intercepted or modified by malicious third parties due to network vulnerabilities. The machine provides various measures for increasing network security, such as only allowing communication with specific IP addresses and encrypting data for communication.
Use the following functions as security measures for preventing unauthorized network access, etc.
Firewall Settings
Unauthorized access by third parties, as well as network attacks and breaches, can be blocked by only allowing communication with devices that have a specific IP address. For information on the firewall settings, see the manual of the imagePRESS Server.
Proxy Settings
You can provide greater security by using a proxy server for connections outside the network, such as when browsing websites. Setting a Proxy
TLS Settings
TLS is a protocol for encryption for data sent over a network and is often used for communication via a Web browser or an e-mail application. TLS enables secure network communication when accessing the machine in a variety of situations, such as when using the Remote UI or distributing device information. Configuring the Key and Certificate for TLS
IPSec Settings
While TLS only encrypts data used on a specific application, such as a Web browser or an e-mail application, IPSec encrypts the whole (or payloads of) IP packets. This enables IPSec to offer a more versatile security system than TLS. For information on the IPSec settings, see the manual of the imagePRESS Server.
IEEE 802.1X Settings
If a device tries to connect and start communicating on an 802.1X network, the device must go through user authentication in order to prove that the connection is made by an authorized user. Authentication information is sent to and checked by a RADIUS server, which permits or rejects communication to the network depending on the authentication result. If authentication fails, a LAN switch (or an access point) blocks access from the outside of the network. The machine can connect to an 802.1X network as a client device. For information on the IEEE 802.1X settings, see the manual of the imagePRESS Server.

Preventing Leaks of Confidential Information during Operation of the Machine

The machine generates value as an information asset by storing important data. Preventing confidential information from remaining on the machine after disposal is another important security measure. The machine provides various measures for increasing security of operation, such as preventing unregistered users from operating the machine, encrypting the data on the storage device, and completely erasing temporary job data when the machine is started.
Use the following functions as security measures for preventing leaks of confidential information during operation of the machine.
Verify System at Startup
The integrity of the firmware, system, and MEAP applications in the machine are verified during startup. <System Verification Settings>
Trellix Embedded Control
When the machine is operating, the Trellix Embedded Control function is used to prevent unauthorized program modification and the execution of unauthorized programs, for improved system reliability. <System Verification Settings>
Personal Authentication Management
A user name and password can be used to perform personal authentication of users. Preventing unauthorized access by third parties and setting usage restrictions can maintain a higher level of security and enable more efficient operation of the machine. Managing Users
Storage Device Data Encryption
You can prevent leakage due to removal of the storage device by automatically encrypting data on the storage device. Managing Storage Device Data
Initialize All Data/Settings
You can restore all of the machine settings to the factory default values. All of the data that remains on the storage device is overwritten with 0 (null) data, which prevents the leakage of sensitive data when replacing or disposing of the storage device. Initializing All Data/Settings
Security Policy Settings
A security policy describes company-wide rules regarding information security. With this machine, multiple settings related to a security policy can be set together. For information on the security policy settings, see the manual of the imagePRESS Server.
Allow Use of Default Password for Remote Access
You can set the machine to not allow users to log in to the Remote UI using the default password (7654321) of the "Administrator" user for security reasons. <Allow Use of Default Password for Remote Access>

Find manuals for other products
imagePRESS V1350
User's Guide (Product Manual)
USRMA-7554-032024-07Copyright CANON INC. 2024