[Security Settings]
Specify and manage security settings such as the machine’s authentication functions and system verification.
* Values in bold red text are the default settings for each item.
[Authentication/Password Settings]
[Menu]
[Management Settings]
[Security Settings]
[Encryption Settings]
[Menu]
[Management Settings]
[Security Settings]
Specify whether to restrict the use of weak encryption or keys and certificates that use weak encryption.
[Prohibit Use of Weak Encryption] [Off] [On] [Prohibit Key/Cert. with Weak Encryption] [Off] [On] |
[Verify System at Startup]
[Menu]
[Management Settings]
[Security Settings]
Verify that the system has not been tampered with when starting up the machine.
If Tampering is Detected
If the screen remains blank after some time, system recovery may not be possible. Contact your dealer or service representative.
If the Problem Persists
[Recommended Security Set. for Usage Env.]
[Menu]
[Management Settings]
[Security Settings]
You can now specify all the recommended security settings for your usage environment simply by selecting the machine's environment type. See "Security Settings Navigator" for the available environment types.
Security Settings Navigator |
If you change the machine to the recommended security settings for each type, functions you want to use may become unavailable or other problems may occur. In this case, you can undo the changes and restore the previous security settings.If you manually changed settings that were changed with [Recommended Security Set. for Usage Env.], the changes are not retained. The machine returns to the state before executing [Recommended Security Set. for Usage Env.]. |