Konica Minolta bizhub PRESS 2250P User Manual

Page 3

Advertising
background image

bizhub PRESS 2250P

Contents-1

Contents

1

Introduction

1.1

Welcome .......................................................................................................................................... 1-2

1.1.1

Composition of User's Guide............................................................................................................. 1-2

1.1.2

User's Guide ...................................................................................................................................... 1-2

1.2

Conventions Used in This Manual ................................................................................................. 1-3

1.2.1

Symbols Used in This Manual ........................................................................................................... 1-3

1.2.2

Original and Paper Indications........................................................................................................... 1-4

2

Security Functions

2.1

Control Software ............................................................................................................................. 2-2

2.1.1

Control Software Version ................................................................................................................... 2-2

2.1.2

About the ROM Version Display Function ......................................................................................... 2-2

2.2

Security Functions .......................................................................................................................... 2-3

2.2.1

Security Mode.................................................................................................................................... 2-3

2.2.2

Environment ....................................................................................................................................... 2-3

2.2.3

Description of Enhanced Security Mode ........................................................................................... 2-4

2.2.4

Data Protected by the Enhanced Security Mode .............................................................................. 2-5

2.2.5

Protecting and Deleting of Remaining Data After Being Used .......................................................... 2-6

2.3

Administrator Security Functions.................................................................................................. 2-7

2.3.1

Turning the Enhanced Security Mode ON/OFF ................................................................................. 2-7

2.3.2

HDD Lock Password........................................................................................................................ 2-10

2.3.3

Deleting Temporary Data ................................................................................................................. 2-13

2.3.4

Deleting All Data............................................................................................................................... 2-16

2.4

User Authentication in Enhanced Security Mode ...................................................................... 2-20

2.4.1

Adding User Registration ................................................................................................................. 2-20

2.4.2

Changing User Registration ............................................................................................................. 2-26

2.4.3

Deleting User Data ........................................................................................................................... 2-32

2.4.4

Changing Password by User ........................................................................................................... 2-34

2.5

HDD Store Function in Enhanced Security Mode ...................................................................... 2-38

2.5.1

Recalling and Deleting of Data......................................................................................................... 2-38

2.5.2

Output Data in the Secure Box ........................................................................................................ 2-42

3

Index

3.1

Index by item ................................................................................................................................... 3-2

3.2

Index by button................................................................................................................................ 3-3

Advertising