Security

This machine is an information device that uses communication functions and handles various data. Therefore, it is important to provide measures to prevent unauthorized access when using the machine in a network environment and measures against security risks such as leaking information.
This machine is equipped with various functions and settings to reduce these threats and vulnerabilities. Configure the settings and use them appropriately according to your usage environment and conditions for safer operation of the machine.
Managing Users and Groups
Managing the users and groups that use the machine and performing authentication of its use can prevent operation by third parties and unauthorized access.
Configuring Settings According to the Environment
Applying the network security settings according to the usage environment can reduce the threat of unauthorized access and eavesdropping.
The machine is equipped with functions for collectively configuring the security settings and notifying you of changes in the environment.
Managing Usage Status
When using the function to send a fax or scanned data, measures are needed to prevent sending data by mistake or leaking information. In addition, using a PIN and setting usage restrictions can help prevent unauthorized use of the Address Book and Remote UI. Implementing measures that include operations according to usage status of the machine can improve security.
Protecting Data Saved to the Machine
The various data saved to the storage space of the machine is encrypted. In addition, encryption of confidential information and system validation and protection help ensure more secure data management.
Integrated Management Using a Security Policy
The machine can collectively configure and manage multiple security settings according to a policy.
Using the Log to Monitor Usage
When log collection is started, the machine records detailed information on the usage of the machine. This enables you to track the machine operations in the event of trouble, and can also help you quickly detect unauthorized use of the machine.

See Also

Compliant with Information Security Standards  
This machine complies with the Protection Profile for Hardcopy Devices (HCD PP) v1.0., an international standard for information security on multifunction machines and printers.
Compliance with HCD PP Information Security Standards  [Asia/Oceania][Americas]
A08C-1L9