<Security Settings>

Specify the settings for enhancing the machine's security.

<Authentication/Password Settings>

 (Settings/Register)  <Management Settings>  <Security Settings>
Specify the settings for enhancing the effective security of the password and the authentication function.

<Encryption Settings>

 (Settings/Register)  <Management Settings>  <Security Settings>
Specify the settings for enhancing the effective encryption security.

<System Verification Settings>

 (Settings/Register)  <Management Settings>  <Security Settings>
Specify whether to use the system verification and protection functions.
<Verify System at Startup>: Verifies the integrity of the firmware and AddOn applications when the machine starts up.
<Trellix Embedded Control>: Improves system reliability while the machine is running by using the Trellix Embedded Control to prevent unauthorized program modification or execution. This is only available when <Verify System at Startup> is <On>.
 
Item
Setting Description
DeviceAdmin
NetworkAdmin
Can be set in Remote UI
Import All Function
Name of Item When Exporting with the Remote UI
<System Verification Settings>
<Verify System at Startup>: <On>, <Off>
No
No
Yes
C
Settings/Registration Basic Information
<Trellix Embedded Control>: <On>, <Off>
No
No
Yes
C
Settings/Registration Basic Information
With <Verify System at Startup>, the machine is restarted when you change the setting from <Off>  <On> or when you press <OK> without changing the setting from <On>. To maintain the <On> setting without restarting the machine, press <No> in the confirmation screen, and then press <Cancel> in the <System Verification Settings> screen.
When <Verify System at Startup> is set to <On>
Startup takes longer than when it is set to <Off> because system verification is performed.
The following events and results are recorded to the device management log. Managing the Logs
Event
Firmware verification, AddOn application verification
Result
Success, Failure
If an error code appears on the screen when you switch the machine on, contact your dealer or service representative.
When <Trellix Embedded Control> is set to <On>
The machine takes several minutes to restart after you specify this setting for the first time.
<Trellix System Monitor> appears in the <Home> screen and you can check the monitor log if there has been an unauthorized operation.

<Recommended Security Set. for Usage Environment>

 (Settings/Register)  <Management Settings>  <Security Settings>
You can now specify all the recommended security settings for your usage environment simply by selecting the machine's environment type.
See "Security Settings Navigator" for the available environment types. Security Settings Navigator
If any of the machine's security policy settings have been specified, <Recommended Security Set. for Usage Environment> cannot be used.
Item
Setting Description
DeviceAdmin
NetworkAdmin
Can be set in Remote UI
Import All Function
Name of Item When Exporting with the Remote UI
<Recommended Security Set. for Usage Environment>
<1. Intranet And Internet Connection>
<2. Direct Internet Connection>
<3. Internet Connection Prohibited>
<4. Private (Home) Network>
<5. Public Network>
<6. Highly Confidential Info. Environment>
<Clear>
<Print Set.Changes>
Yes
Yes
Yes
No
Settings/Registration Basic Information
If you change the machine to the recommended security settings for each type, functions you want to use may become unavailable or other problems may occur. In this case, you can undo the changes and restore the previous security settings.
If you manually changed settings that were changed with <Recommended Security Set. for Usage Environment>, the changes are not retained. The machine returns to the state before executing <Recommended Security Set. for Usage Environment>.
You can press <Print Set.Changes> to check the values of the changed items.
A9H4-0LJ