Konica Minolta bizhub 652 User Manual
Here you can view all the pages of manual Konica Minolta bizhub 652 User Manual. The Konica manuals for Printer are available online for free. You can easily download all the documents as PDF.
Page 1
User’s Guide [Security Operations] 2011. 3 Ver. 1.02 Downloaded From ManualsPrinter.com Manuals
Page 2
bizhub 652/552Contents-1 Contents 1 Security 1.1 Introduction ..................................................................................................................................... 1-2 Compliance with the ISO15408 Standard ......................................................................................... 1-2 Operating Precautions ....................................................................................................................... 1-2 INSTALLATION...
Page 3
bizhub 652/552Contents-2 2.12 Protecting Data in the HDD .......................................................................................................... 2-50 2.12.1 Setting the Encryption Key (encryption word) ................................................................................. 2-50 2.12.2 Changing the Encryption Key .......................................................................................................... 2-56 2.13 Overwrite All Data Function...
Page 4
bizhub 652/552Contents-3 4.1.5 Making the account settings............................................................................................................ 4-11 4.1.6 Registering the certificate ................................................................................................................ 4-12 4.1.7 SNMP Setting Function ................................................................................................................... 4-14 4.1.8 DNS Server Setting Function...
Page 6
bizhub 652/5521-2 1.1 Introduction1 1 Security 1.1 Introduction Thank you for purchasing our product. This Users Guide contains the operating procedures and precautions to be used when using the security functions offered by the bizhub 652/552 machine. To ensure the best possible performance and effective use of the machine, read this manual thoroughly before using the security functions. The Administrator of the ma- chine should keep this manual for ready reference. The manual should be of great help...
Page 7
bizhub 652/5521-3 1.1 Introduction1 INSTALLATION CHECKLIST This Installation Checklist contains items that are to be check by the Service Engineer installing this machine. The Service Engineer should check the following items, then explain each checked item to the Administrator of the machine. To Service Engineer Make sure that each of these items is properly carried out by checking the box on the right of each item. When the above steps have been properly carried out, the Service Engineer should make a...
Page 8
bizhub 652/5521-4 1.2 Security Functions1 1.2 Security Functions Setting the Enhanced Security Mode to [ON] will validate the security function of this machine. For details of the settings of different security functions to be changed by turning [ON] the Enhanced Security Mode, see page 2-8. Setting the Enhanced Security Mode to [ON] will enhance the authentication function. Access control is then provided through password authentication for any access to the Administrator Settings, User...
Page 9
bizhub 652/5521-5 1.3 Data to be Protected1 1.3 Data to be Protected The underlying concept of this machine toward security is to protect data that can be disclosed against the intention of users. The following types of image files that have been saved in the machine and made available for use by its users are protected while the machine is being used. -Image files saved by Secure Print -Image files saved as ID & Print Document when print data is to be saved using the ID & Print Setting function...
Page 10
bizhub 652/5521-6 1.4 Precautions for Operation Control1 1.4 Precautions for Operation Control This machine and the data handled by this machine should be used in an office environment that meets the following conditions. The machine must be controlled for its operation under the following conditions to pro- tect the data that should be protected. Roles and Requirements of the Administrator The Administrator should take full responsibility for controlling the machine, thereby ensuring that no improp- er...