[Security Settings]

Specify and manage security settings such as the machine’s authentication functions and system verification.
* Values in bold red text are the default settings for each item.

[Authentication/Password Settings]

[Menu] [Management Settings] [Security Settings]
Configure the authentication functions for the machine.
[Authentication/Password Settings]

[Encryption Settings]

[Menu] [Management Settings] [Security Settings]
Specify whether to restrict the use of weak encryption or keys and certificates that use weak encryption.
[Prohibit Use of Weak Encrypt.]
[Off]
[On]
[Prohibit Weak Encryp. Key/Cert.]
[Off]
[On]

[Verify System at Startup]

[Menu] [Management Settings] [Security Settings]
Verify that the system and the applications have not been tampered with when starting up the machine or running applications (Application Library).
If Tampering is Detected
The machine switches to update standby mode. You need to update the firmware. Updating the Firmware
If applications added to the machine have been tampered with, the affected applications must be re-installed.
If the screen remains blank after some time, system recovery may not be possible. Contact your dealer or service representative. If the Problem Persists
 
[Off]
[On]

[Recommended Security Settings for Usage Environment]

[Menu] [Management Settings] [Security Settings]
You can now specify all the recommended security settings for your usage environment simply by selecting the machine's environment type. See "Security Settings Navigator" for the available environment types. Security Settings Navigator
If you change the machine to the recommended security settings for each type, functions you want to use may become unavailable or other problems may occur. In this case, you can undo the changes and restore the previous security settings.
If you manually changed settings that were changed with [Recommended Security Settings for Usage Environment], the changes are not retained. The machine returns to the state before executing [Recommended Security Settings for Usage Environment].
ASKJ-0CJ