Konica Minolta bizhub PRESS 1250P User Manual

Page 3

Advertising
background image

bizhub PRESS 1250P

Contents-1

Contents

1

Introduction

1.1

Welcome .......................................................................................................................................... 1-2

1.1.1

Composition of User's Guide............................................................................................................. 1-2

1.1.2

User's Guide ...................................................................................................................................... 1-2

1.2

Conventions Used in This Manual ................................................................................................. 1-3

1.2.1

Symbols Used in This Manual ........................................................................................................... 1-3

1.2.2

Paper Indications ............................................................................................................................... 1-4

2

Security Functions

2.1

Control Software ............................................................................................................................. 2-2

2.1.1

Control Software Version ................................................................................................................... 2-2

2.1.2

About the ROM Version Display Function ......................................................................................... 2-2

2.2

Security Functions .......................................................................................................................... 2-3

2.2.1

Security Mode.................................................................................................................................... 2-3

2.2.2

Environment ....................................................................................................................................... 2-3

2.2.3

Description of Enhanced Security Mode ........................................................................................... 2-4

2.2.4

Data Protected by the Enhanced Security Mode .............................................................................. 2-6

2.2.5

Protecting and Deleting of Remaining Data After Being Used .......................................................... 2-6

2.3

User Authentication in Enhanced Security Mode ........................................................................ 2-7

2.3.1

Adding User Registration ................................................................................................................... 2-7

2.3.2

Changing User Registration ............................................................................................................. 2-13

2.3.3

Deleting User Data ........................................................................................................................... 2-18

2.3.4

Changing Password by User ........................................................................................................... 2-20

2.4

HDD Recall Function in Enhanced Security Mode..................................................................... 2-24

2.4.1

Recalling and Deleting of Data......................................................................................................... 2-24

2.4.2

Output Data in the Secure Box ........................................................................................................ 2-28

2.5

Administrator Security Functions................................................................................................ 2-32

2.5.1

Turning the Enhanced Security Mode ON/OFF ............................................................................... 2-32

2.5.2

HDD Lock Password........................................................................................................................ 2-35

2.5.3

Deleting Temporary Data ................................................................................................................. 2-37

2.5.4

Deleting All Data............................................................................................................................... 2-40

2.5.5

Printing Audit Log ............................................................................................................................ 2-43

2.5.6

Analyzing Audit Log ......................................................................................................................... 2-45

3

Index

3.1

Index by item ................................................................................................................................... 3-2

3.2

Index by button................................................................................................................................ 3-3

Advertising