Konica Minolta bizhub C353 User Manual
Page 2
C353
x-1
Contents
Contents
Introduction ........................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ................................................................................................1-2
Operating Precautions..............................................................................................................................1-2
INSTALLATION CHECKLIST ....................................................................................................................1-3
Precautions for Operation Control...................................................................................................... 1-6
Roles and Requirements of the Administrator..........................................................................................1-6
Password Usage Requirements ...............................................................................................................1-6
Operation and control of the machine......................................................................................................1-6
Network Connection Requirements for the Machine ...............................................................................1-7
Machine Maintenance Control..................................................................................................................1-7
Implementing digital signature properly ...................................................................................................1-7
Operating conditions for the IC card and IC card reader .........................................................................1-7
IC card owner requirements .....................................................................................................................1-7
Accessing the Administrator Settings ......................................................................................................2-2
<Setting can be made only from the control panel> ................................................................................2-3
Setting Prohibited Functions When Authentication Error .........................................................................2-7
<Setting can be made only from the control panel> ................................................................................2-8
Setting the HDD Lock Password ............................................................................................................2-18
<Setting can be made only from the control panel> ..............................................................................2-19
Setting the Overwrite All Data function ..................................................................................................2-33
<Setting can be made only from the control panel> ..............................................................................2-34