Item | Setting Description | DeviceAdmin | NetworkAdmin | Can be set in Remote UI | Import All Function | Name of Item When Exporting with the Remote UI |
<System Verification Settings> | <Verify System at Startup>: <On>, <Off> | No | No | Yes | C | Settings/Registration Basic Information |
<Trellix Embedded Control>: <On>, <Off> | No | No | Yes | C | Settings/Registration Basic Information |
With <Verify System at Startup>, the machine is restarted when you change the setting from <Off> <On> or when you press <OK> without changing the setting from <On>. To maintain the <On> setting without restarting the machine, press <No> in the confirmation screen, and then press <Cancel> in the <System Verification Settings> screen. |
When <Verify System at Startup> is set to <On>Startup takes longer than when it is set to <Off> because system verification is performed. The following events and results are recorded to the device management log. Managing the Logs
If an error code appears on the screen when you switch the machine on, contact your dealer or service representative. When <Trellix Embedded Control> is set to <On>The machine takes several minutes to restart after you specify this setting for the first time. <System Verif. Mntr.> appears in the <Home> screen and you can check the monitor log if there has been an unauthorized operation. |
If any of the machine's security policy settings have been specified, <Recommended Security Settings for Usage Environment> cannot be used. |
Item | Setting Description | DeviceAdmin | NetworkAdmin | Can be set in Remote UI | Import All Function | Name of Item When Exporting with the Remote UI |
<Recommended Security Settings for Usage Environment> | <Usage Environment Settings>: <1. Intranet And Internet Connection> <2. Direct Internet Connection> <3. Internet Connection Prohibited> <4. Private (Home) Network> <5. Public Network> <6. Highly Confidential Info. Environment> <Check Recommendation> <Clear> <Print Set.Changes> <Security-Related Notification Settings>: <When Recommended Usage Environment Is Updated>: <On>, <Off> <When Internet Security Issue Is Detected>: <On>, <Off> <When Encryption Method Vuln. Is Found for Selected Wireless LAN>: <On>, <Off> | No | No | Yes | No | - |
If you change the machine to the recommended security settings for each type, functions you want to use may become unavailable or other problems may occur. In this case, you can undo the changes and restore the previous security settings. If you manually changed settings that were changed with <Recommended Security Settings for Usage Environment>, the changes are not retained. The machine returns to the state before executing <Recommended Security Settings for Usage Environment>. You can press <Print Set.Changes> to check the values of the changed settings. |