[Security Settings]
Configure and manage the security settings of the machine, such as the authentication functions and system verification.
* Values in red text indicate the default setting for each item.
[
Settings/Registration]
[Management Settings]
[Security Settings]
Configure the settings for the authentication functions and password policy of the machine.
[
Settings/Registration]
[Management Settings]
[Security Settings]
Configure the encryption settings for the machine.
[
Settings/Registration]
[Management Settings]
[Security Settings]
Set whether to use the system verification and protection functions.
When you set [Verify System at Startup] to [On], the integrity of the firmware and MEAP applications is verified when the machine is started. When this setting is enabled, you can also set [Trellix Embedded Control] to [On] to prevent the unauthorized modification of programs and the execution of unauthorized programs, for improved system reliability.
[Verify System at Startup] [On], [Off] [Trellix Embedded Control] [On], [Off] |
IMPORTANT
If you press [OK] when [Verify System at Startup] is set to [On], the machine restarts regardless of whether you changed the setting. To keep the [On] setting without restarting the machine, press [No] on the confirmation screen, and then press [Cancel] on the [System Verification Settings] screen.
NOTE
When [Verify System at Startup] Is Set to [On]
Startup takes longer than when [Off] is selected, because system verification is performed.
The following events and results are recorded in the machine management log.
Management of LogsEvents | Firmware verification, MEAP application verification |
Results | Success, Failure |
If an error code appears on the screen when you start the machine, contact your dealer or service representative.
When [Trellix Embedded Control] Is Set to [On]
It takes a few minutes longer than normal for the machine to start the first time after you enable this setting.
[Trellix System Monitor] is displayed on the functions and setting buttons on the [Home] screen. You can press [Trellix System Monitor] to check the log of an invalid operation.
[
Settings/Registration]
[Management Settings]
[Security Settings]
Configure the security settings according to the environment in which the machine is used.
[Usage Environment Settings]:
You can change to the recommended security settings simply by selecting the usage environment that matches the environment of the machine. If you do not know which type of usage environment is applicable, press [Check Recommendation] or see "Security Settings Navigator." You can also check the details of the various usage environments in "Security Settings Navigator."
Security Settings Navigator[Security-Related Notification Settings]:
Set whether to display a message on the control panel to notify the user if a security issue is detected in the settings or installation environment of the machine.
Configuring Security Notification[Usage Environment Settings] [1. Intranet And Internet Connection] [2. Direct Internet Connection] [3. Internet Connection Prohibited] [4. Private (Home) Network] [5. Public Network] [6. Highly Confidential Info. Environment] [Check Recommendation] [Clear] [Security-Related Notification Settings] [When Recommended Usage Environment Is Updated] [On], [Off] [When Internet Security Issue Is Detected] [On], [Off] [When Encryption Method Vuln. Is Found for Selected Wireless LAN]*1 [On], [Off] |
*1This is displayed only when the optional Wireless LAN Board is installed.
IMPORTANT
If a security policy is applied to the machine, you cannot configure this setting.
NOTE
When Changing to the Recommended Security Settings
In situations such as when a required function no longer works, you can press [Clear] to cancel the setting changes and restore the original settings.
* If you manually changed any settings for items that were changed in [Usage Environment Settings], the changed settings are not retained. The settings are reset to the values before [Usage Environment Settings] was executed.
You can press [Print Set.Changes] to check the values of items that were changed.