4 precautions for operation control, Roles and requirements of the administrator, Password usage requirements – Konica Minolta bizhub 360 User Manual

Page 15: Precautions for operation control -8

Advertising
background image

1

Security

1-8

360

Security

Chapter 1

1.4

Precautions for Operation Control

This machine and the data handled by this machine should be used in an of-
fice environment that meets the following conditions.

Roles and Requirements of the Administrator

The Administrator should take full responsibility for controlling the machine,
thereby ensuring that no improper operations are performed.

<To Achieve Effective Security>
-

A person who is capable of taking full responsibility for controlling the
machine should be appointed as the Administrator to make sure that no
improper operations are performed.

-

When using an SMTP server (mail server) or an DNS server, each server
should be appropriately managed by the Administrator and should be pe-
riodically checked to confirm that settings have not been changed with-
out permission.

Password Usage Requirements

The Administrator must control the Administrator Password, HDD Lock
Password, Encryption Key, auth-Password, and priv-Password appropriate-
ly so that they may not be leaked. These passwords should not be ones that
can be easily guessed. The user, on the other hand, should control the User
Box Password, Secure Print Password, and Administrator Password appro-
priately so that they may not be leaked. Again, these passwords should not
be ones that can be easily guessed. For the Public User Box shared among
a number of users, the User Box Password should be appropriately con-
trolled so that it may not be leaked to anyone who is not the user of the Public
User Box.

<To Achieve Effective Security>
-

Make absolutely sure that only the Administrator knows the Administrator
Password, HDD Lock Password, Encryption Key, auth-Password, and
priv-Password.

-

The Administrator must change the Administrator Password, HDD Lock
Password, Encryption Key, auth-Password, and priv-Password at regular
intervals.

-

The Administrator should make sure that any number that can easily be
guessed from birthdays, employee identification numbers, and the like is
not set for the Administrator Password, HDD Lock Password, Encryption
Key, auth-Password, and priv-Password.

-

If a User Password or User Box Password has been changed, the Admin-
istrator should have the corresponding user change the password as
soon as possible.

-

If the Administrator Password has been changed by the Service Engi-
neer, the Administrator should change the Administrator Password as
soon as possible.

360_security_E.book 8 ページ 2007年3月7日 水曜日 午後2時50分

Advertising