[Security Settings]

Specify and manage security settings such as the machine's authentication functions and system verification.
* Values in bold red text are the default settings for each item.

[Authentication/Password Settings]

[Menu] [Management Settings] [Security Settings]
Configure the authentication functions for the machine.
[Authentication/Password Settings]

[Encryption Settings]

[Menu] [Management Settings] [Security Settings]
Specify whether to restrict the use of weak encryption or keys and certificates that use weak encryption.
[Prohibit Use of Weak Encryption]
[Off]
[On]
[Prohibit Key/Cert. with Weak Encryption]*1
[Off]
[On]
*1 May not be displayed or available depending on the model, and other settings.

[Verify System at Startup]

[Menu] [Management Settings] [Security Settings]
Verify that the system when starting up the machine.
If Tampering is Detected
The machine switches to update standby mode. You need to update the firmware. Updating the Firmware
If the screen remains blank after some time, system recovery may not be possible. Contact your dealer or service representative. If the Problem Persists
 
[Off]
[On]

[Recommended Security Set. for Usage Env.]

[Menu] [Management Settings] [Security Settings]
You can now specify all the recommended security settings for your usage environment simply by selecting the machine's environment type. See "Security Settings Navigator" for the available environment types. Security Settings Navigator
If you change the machine to the recommended security settings for each type, functions you want to use may become unavailable or other problems may occur. In this case, you can undo the changes and restore the previous security settings.
If you manually changed settings that were changed with [Recommended Security Set. for Usage Env.], the changes are not retained. The machine returns to the state before executing [Recommended Security Set. for Usage Env.].
A19S-0A2