Konica Minolta bizhub 363 User Manual
Here you can view all the pages of manual Konica Minolta bizhub 363 User Manual. The Konica manuals for Printer are available online for free. You can easily download all the documents as PDF.
Page 1
User’s Guide [Security Operations] http://konicaminolta.com Copyright 2010A1UD-9610B-00 2010. 6 Ver. 1.00 A1UD-9610B-00 BK Downloaded From ManualsPrinter.com Manuals
Page 2
bizhub 423/363/283/223Contents-1 Contents 1 Security 1.1 Introduction ..................................................................................................................................... 1-2 Compliance with the ISO15408 Standard ......................................................................................... 1-2 Operating Precautions ....................................................................................................................... 1-2 INSTALLATION...
Page 3
bizhub 423/363/283/223Contents-2 2.12.1 Setting the Encryption Key (encryption word) ................................................................................. 2-50 2.12.2 Changing the Encryption Key .......................................................................................................... 2-56 2.13 Overwrite All Data Function ......................................................................................................... 2-58 Setting the Overwrite All Data function...
Page 4
bizhub 423/363/283/223Contents-3 4.1.6 Registering the certificate ................................................................................................................ 4-12 4.1.7 SNMP Setting Function ................................................................................................................... 4-14 4.1.8 DNS Server Setting Function ........................................................................................................... 4-16 4.1.9 NetWare Setting...
Page 6
bizhub 423/363/283/2231-2 1.1 Introduction1 1 Security 1.1 Introduction Thank you for purchasing our product. This Users Guide contains the operating procedures and precautions to be used when using the security functions offered by the bizhub 423/363/283/223 machine. To ensure the best possible performance and ef- fective use of the machine, read this manual thoroughly before using the security functions. The Administrator of the machine should keep this manual for ready reference. The manual should...
Page 7
bizhub 423/363/283/2231-3 1.1 Introduction1 INSTALLATION CHECKLIST This Installation Checklist contains items that are to be check by the Service Engineer installing this machine. The Service Engineer should check the following items, then explain each checked item to the Administrator of the machine. To Service Engineer Make sure that each of these items is properly carried out by checking the box on the right of each item. When the above steps have been properly carried out, the Service Engineer...
Page 8
bizhub 423/363/283/2231-4 1.2 Security Functions1 1.2 Security Functions Setting the Enhanced Security Mode to [ON] will validate the security function of this machine. For details of the settings of different security functions to be changed by turning [ON] the Enhanced Security Mode, see page 2-8. Setting the Enhanced Security Mode to [ON] will enhance the authentication function. Access control is then provided through password authentication for any access to the Administrator Settings, User...
Page 9
bizhub 423/363/283/2231-5 1.3 Data to be Protected1 1.3 Data to be Protected The underlying concept of this machine toward security is to protect data that can be disclosed against the intention of users. The following types of image files that have been saved in the machine and made available for use by its users are protected while the machine is being used. -Image files saved by Secure Print -Image files saved as ID & Print Document when print data is to be saved using the ID & Print Setting...
Page 10
bizhub 423/363/283/2231-6 1.4 Precautions for Operation Control1 1.4 Precautions for Operation Control This machine and the data handled by this machine should be used in an office environment that meets the following conditions. The machine must be controlled for its operation under the following conditions to pro- tect the data that should be protected. Roles and Requirements of the Administrator The Administrator should take full responsibility for controlling the machine, thereby ensuring that no...