Measures to Prevent Unauthorized Access

Please read this section before using the machine in a network environment.
You can use various functions on the machine when the machine is connected to a network. However, because this also creates risks of unauthorized access and eavesdropping over the network, measures against security risks are essential.
This section provides examples of measures against unauthorized access that you should consider and implement during setup when using the machine in a network environment.
NOTE
In addition to these measures, there are other measures against security risks you can implement on the machine, such as restricting communication with a firewall and using TLS encrypted communication to prevent eavesdropping and tampering. Take the necessary measures according to your usage environment. Security

Using a Private IP Address

There are two types of IP addresses: a global IP address, which is used for connecting to the Internet, and a private IP address, which is used in a local area network such as a company LAN.
If a global IP address is set to the machine, the machine can be accessed by users on the Internet. Thus, the risk of information leakage due to unauthorized access from external network increases.
On the other hand, if a private IP address is set to the machine, access to the machine is restricted to only users on your local area network. Therefore, it reduces the risk of unauthorized access compared to a set global IP address.
Basically, set a private IP address to the machine.
A private IP address is used in one of the following ranges.
Ranges for Private IP Addresses
From 10.0.0.0 to 10.255.255.255
From 172.16.0.0 to 172.31.255.255
From 192.168.0.0 to 192.168.255.255
For details about how to set and confirm the IP address, see the following:
 
If you want to set a global IP address to the machine, you can create an environment to prevent outside access, such as by using a firewall, to reduce the risk of unauthorized access. Contact your network administrator about how to implement network security.

Protecting Your Information with a Password, PIN, or Pattern

By protecting the information on the machine with a password, PIN, or pattern, you can reduce the risk of information leaks or unauthorized use even if the machine is subject to unauthorized access by a malicious third party.
You can use the following functions to configure a password, PIN, or pattern on the machine. These functions restrict access to information to only those users who know the password, PIN, or pattern.
User Authentication
The user name and password/pattern registered for each user must be entered to use the machine.
Privilege levels called “Roles” can be configured for each user to allow only administrators to view and change important settings.
User Authentication can also be applied when using Advanced Box. Preparations for Using Advanced Box
Address Book
Requires entry of the address book PIN when registering or editing the address book.

Precautions When Using Remote UI

Do not access other websites when using Remote UI.
After using Remote UI, be sure to log out and close your Web browser.
A0YC-00X