3 overview of security strengthen mode, Overview of security strengthen mode – Konica Minolta bizhub PRO 1200P User Manual

Page 9

Advertising
background image

Security Functions

1

bizhub PRO 1200P

3

1.3

Overview of Security Strengthen Mode

Protect and delete used data in memory and on the HDD

There are three kinds of image data that will be saved in memory and on the
HDD: AHA compressed data and uncompressed data (TIFF, PDF and PS for-
mats). Memory and HDD areas containing the AHA compressed data is freed
up when data is deleted. However in normal mode data is not completely de-
leted so it could be read through illicit means. In the Security functions, data
will be completely cleared before freeing up image areas.

Regardless of the data type (compressed or uncompressed), the image area
in memory and on the HDD where the data has been saved will be freed up
after it is completely overwritten by the data unrelated to the image data.

Enhanced password

The password is made up of 8 to 64 alphanumerical characters (case sensi-
tive).
If a wrong password is entered, attempts to re-try cannot be made for five
seconds.

Machine NIC setting

When the Security Strengthen mode is ON, the Machine NIC cannot be used.

Access to the Box with a password

Set up a system that requires users to input an enhanced password as de-
scribed above, to save data or to print data saved in the Box on the HDD.
If an enhanced password is set up as above, security will be improved when
saving scanned data in the Box. No one other than the administrator can de-
lete the Box or Personal Folder in which scanned data is saved, and chang-
ing the Box's attributes requires authentication with the enhanced password.
In addition, authentication will be required to use scanned data saved in the
Box.

External access prohibited

No access is allowed over telephone lines other than CS Remote Care.

Create, save and analyze an audit log

A history of security function operations will be created and saved. Date and
time, information identifying the person who made the operation, details of
the operation, and results of the operation will be saved, enabling analysis of
unauthorized access. This log will be overwritten if the audit area is depleted.

Advertising