1security functions 2 enhanced security mode, 5hdd store function in enhanced security mode, 6administrator security functions – Konica Minolta 920 User Manual

Page 71

Advertising
background image

1

Security Functions ............................................................ 1

2

Enhanced Security Mode ................................................. 3

2.1

Description of Enhanced Security mode ............................................3

2.2

Data protected by Enhanced Security mode .....................................4

2.3

Display when Enhanced Security mode is ON ...................................5

3

Protect and Delete Data After Use .................................. 7

4

User Authentication in Enhanced Security Mode .......... 8

4.1

Description of user authentication .....................................................8

4.2

To register a new user .........................................................................9

4.3

To change a user data ........................................................................14

4.4

To delete a user ..................................................................................18

4.5

To change password by user ............................................................21

5

HDD Store Function in Enhanced Security Mode ........ 26

5.1

Store the data in a Box while Copying ..............................................26

5.2

Store scanned data in a Box ..............................................................30

5.3

Recall/Delete data in a Box ...............................................................35

5.4

Output data in the Secure Box ..........................................................40

6

Administrator Security Functions.................................. 44

6.1

Turn Enhanced Security mode ON/OFF ...........................................44

6.2

HDD lock password ............................................................................47

6.3

Print audit log ......................................................................................53

6.4

Analyze audit log ................................................................................57

6.5

Table of items saved in audit log ......................................................58

Advertising