Konica Minolta bizhub PRO 951 User Manual

Page 3

Advertising
background image

bizhub PRO 951

Contents-1

Contents

1

Introduction

1.1

Welcome .......................................................................................................................................... 1-2

1.1.1

Composition of User's Guide............................................................................................................. 1-2

1.1.2

User's Guide ...................................................................................................................................... 1-3

1.2

Conventions Used in This Manual ................................................................................................. 1-4

1.2.1

Symbols Used in This Manual ........................................................................................................... 1-4

1.2.2

Original and Paper Indications........................................................................................................... 1-5

2

Security Functions

2.1

Control Software ............................................................................................................................. 2-2

2.1.1

Control Software Version ................................................................................................................... 2-2

2.1.2

About the ROM Version Display Function ......................................................................................... 2-2

2.2

Security Functions .......................................................................................................................... 2-3

2.2.1

Security Mode.................................................................................................................................... 2-3

2.2.2

Environment ....................................................................................................................................... 2-3

2.2.3

Description of Enhanced Security Mode ........................................................................................... 2-4

2.2.4

Data Protected by the Enhanced Security Mode .............................................................................. 2-6

2.2.5

Protecting and Deleting of Remaining Data After Being Used .......................................................... 2-6

2.3

User Authentication in Enhanced Security Mode ........................................................................ 2-7

2.3.1

Adding User Registration ................................................................................................................... 2-7

2.3.2

Changing User Registration ............................................................................................................. 2-13

2.3.3

Deleting User Data ........................................................................................................................... 2-18

2.3.4

Changing Password by User ........................................................................................................... 2-20

2.4

HDD Store Function in Enhanced Security Mode ...................................................................... 2-24

2.4.1

Saving Data While Copying ............................................................................................................. 2-24

2.4.2

Saving Data in User Box .................................................................................................................. 2-27

2.4.3

Recalling and Deleting of Data......................................................................................................... 2-31

2.4.4

Output Data in the Secure Box ........................................................................................................ 2-35

2.5

Administrator Security Functions................................................................................................ 2-39

2.5.1

Turning the Enhanced Security Mode ON/OFF ............................................................................... 2-39

2.5.2

HDD Lock Password........................................................................................................................ 2-42

2.5.3

Deleting Temporary Data ................................................................................................................. 2-44

2.5.4

Deleting All Data............................................................................................................................... 2-47

2.5.5

Printing Audit Log ............................................................................................................................ 2-50

2.5.6

Analyzing Audit Log ......................................................................................................................... 2-52

3

Index

3.1

Index by item ................................................................................................................................... 3-2

3.2

Index by button................................................................................................................................ 3-3

Advertising