bizhub PRESS C1100/C1085
Contents-1
Contents
1
Introduction
1.1
Welcome .......................................................................................................................................... 1-3
1.1.1
Composition and Usage of this Guide................................................................................................1-3
1.2
Conventions Used in This Guide ................................................................................................... 1-4
1.2.1
Symbols Used in This Guide...............................................................................................................1-4
1.2.2
Original and Paper Indications............................................................................................................1-5
2
Security Functions
2.1
Control Software ............................................................................................................................. 2-3
2.1.1
Control Software Version ....................................................................................................................2-3
2.1.2
About the ROM Version Display Function ..........................................................................................2-3
2.2
Security Functions .......................................................................................................................... 2-4
2.2.1
Security Mode.....................................................................................................................................2-4
2.2.2
Environment ........................................................................................................................................2-5
2.2.3
Description of Enhanced Security Mode ............................................................................................2-6
2.2.4
Data Protected by the Enhanced Security Mode ...............................................................................2-8
2.2.5
Protecting and Deleting of Remaining Data After Being Used ...........................................................2-8
2.3
Administrator Security Functions.................................................................................................. 2-9
2.3.1
Turning the Enhanced Security Mode ON/OFF ..................................................................................2-9
2.3.2
HDD Lock Password.........................................................................................................................2-13
2.3.3
Deleting Temporary Data ..................................................................................................................2-17
2.3.4
Deleting All Data................................................................................................................................2-21
2.3.5
Outputting Audit Log.........................................................................................................................2-25
2.3.6
Analyzing Audit Log ..........................................................................................................................2-28
2.4
User Authentication in Enhanced Security Mode ...................................................................... 2-31
2.4.1
Adding User Registration ..................................................................................................................2-32
2.4.2
Changing User Registration ..............................................................................................................2-41
2.4.3
Deleting User Data ............................................................................................................................2-50
2.4.4
Changing Password by User ............................................................................................................2-54
3
Index
3.1
Index by item ................................................................................................................................... 3-3
3.2
Index by button................................................................................................................................ 3-4