Security

This machine is an information device that uses communication functions and handles various data. Therefore, it is important to provide measures to prevent unauthorized access when using the machine in a network environment and measures against security risks such as sending data by mistake and leaking information.
This machine is equipped with various functions and settings to reduce these threats and vulnerabilities. Configure the settings and use them appropriately according to your usage environment and conditions for safer operation of the machine.
Creating an Administrator System
Use an administrator account to manage the machine and configure the settings. Operate the machine using a system in which only a specific administrator(s) knows the ID and PIN.
Setting the Department ID and PIN for the Administrator
Managing Users and Groups
Managing the users and groups that use the machine and performing authentication of its use can prevent operation by third parties and unauthorized access.
Authenticating Users and Managing Groups
Network Settings
Applying the network security settings according to the usage environment can reduce the threat of unauthorized access and eavesdropping.
Protecting the Network
Managing Usage Status
When using the function to send a scanned data, measures are needed to prevent sending data by mistake or leaking information. In addition, using a PIN and setting usage restrictions can help prevent unauthorized use of the Address Book and Remote UI. Implementing measures that include operations according to usage status of the machine can improve security.
Preventing Sending Data by Mistake and Leaking Information
Preventing Unauthorized Use
Integrated Management Using a Security Policy
Applying a security policy that exists for other devices to this machine can allow for sharing of the information security level within your organization.
Applying a Security Policy
958J-074