Items of Data Cleared by Data Erase Function.................................................................................. 1-9
General functions and operations.................................................................................................... 1-10
HDD Format ..................................................................................................................................... 1-10
Upgrading of the firmware ............................................................................................................... 1-10
Software used in the machine ......................................................................................................... 1-10
2Administrator Operations
2.1Accessing the Administrator Settings .......................................................................................... 2-2
2.1.1Accessing the Administrator Settings................................................................................................ 2-2
2.1.2Accessing the User Mode.................................................................................................................. 2-5
2.2Enhancing the Security Function................................................................................................... 2-6
2.2.1Setting the Password Rules............................................................................................................... 2-8
2.2.2Setting the Enhanced Security Mode .............................................................................................. 2-10
2.3Setting the External Server .......................................................................................................... 2-12
Setting the External Server .............................................................................................................. 2-12
2.4System Auto Reset Function ....................................................................................................... 2-14
2.5Changing the Administrator Password....................................................................................... 2-16
2.6Protecting Data in the HDD.......................................................................................................... 2-19
2.6.1Setting the Encryption Key (encryption word) ................................................................................. 2-19
2.6.2Deleting the encryption key ............................................................................................................. 2-22
2.7Erasing data when the machine is to be discarded or use of a leased machine is
2.7.1Setting the Overwrite All Data.......................................................................................................... 2-23
2.7.2Setting the Restore All ..................................................................................................................... 2-26
2.8S/MIME Communication Setting Function ................................................................................. 2-28
2.8.1Setting the S/MIME Communication ............................................................................................... 2-28
2.8.2Registering the certificate ................................................................................................................ 2-29
Setting the System Auto Reset function.......................................................................................... 2-14
Changing the Administrator Password ............................................................................................ 2-16
Accessing the Encrypted document.................................................................................................. 3-4
3.3Scan to Me Function....................................................................................................................... 3-5
Scan to Me procedure ....................................................................................................................... 3-5
bizhub 4750/4050Contents-2
1
Security
1.1Introduction
1Security
1.1Introduction
Thank you for purchasing our product.
This User's Guide contains the operating procedures and precautions to be used when using the security
functions offered by the bizhub 4750/4050 machine. To ensure the best possible performance and effective
use of the machine, read this manual thoroughly before using the security functions. The Administrator of the
machine should keep this manual for ready reference. The manual should be of great help in finding solutions
to operating problems and questions.
This User's Guide (Ver. 1.04) covers the following.
TOE Namebizhub 4750/bizhub 4050 PKI Card System Control Software
Controller FirmwareA6F730G0273999P
Compliance with the ISO15408 Standard
When the Enhanced Security Mode on this machine is set to [ON], more enhanced security functions are
available.
The security functions offered by the bizhub 4750/4050 machine comply with ISO/IEC15408 (level: EAL3).
1
Operating Precautions
The machine gives an alarm message or an alarm sound (peep) when a wrong operation is performed or a
wrong entry is made during operation of the machine. (No "peep" alarm sound is issued if a specific sound
setting in Sound Setting of Accessibility Setting is set to [OFF].) If the alarm message or alarm sound is given,
perform the correct operation or make the correct entry according to the instructions given by the message
or other means.
The Administrator of the machine should not leave the machine with the setting screen left displayed after
the access to that mode is completed or in the middle of the mode. If it is absolutely necessary to leave the
machine, the Administrator of the machine should log off from the mode.
The Administrator of the machine should make sure that each individual general user logs off from the current
mode whenever the access to that mode is completed or if the user leaves the machine in the middle of the
mode with the mode screen left displayed.
If an error message appears during operation of the machine, perform steps as instructed by the message.
For details of the error messages, refer to the User’s Guide furnished with the machine and that furnished
with the Authentication Unit. If the error cannot be remedied, contact your service representative.
NOTICE
This machine permits duplicate login operations performed by the service engineer, the Administrator of the
machine, and the user.
-The Administrator of the machine should make sure that, when the service engineer changes the settings, neither the Administrator of the machine nor the user performs the login operation.
-The Administrator of the machine should make sure that no user is allowed to perform the login operation when the Administrator of the machine changes or deletes user information or user data.
-To prevent settings of the machine from being duplicated, the Administrator of the machine should not
attempt to change the settings in a condition of having logged onto a mode simultaneously from the
control panel and the client PC.
bizhub 4750/40501-2
1.1Introduction
INSTALLATION CHECKLIST
This Installation Checklist contains items that are to be check by the Service Engineer installing this machine.
The Service Engineer should check the following items, then explain each checked item to the Administrator
of the machine.
To Service Engineer
Make sure that each of these items is properly carried out by checking the box on the right of each item.
1.Perform the following steps before installing this machine.
2.After this machine is installed, refer to the Service Manual and perform the following steps.
3.After this machine is installed, refer to this User’s Guide and perform the following steps.
1
Check with the Administrator to determine if the security functions of this machine should
be enhanced. If the functions should be enhanced, check the following.
If the security functions are not to be enhanced, quit the operation without checking the following.
I swear that I would never disclose information as it relates to the settings of this machine
to anybody, or perform malicious or intentional act during setup and service procedures for
the machine.
When giving a copy of the User's Guide, explain the following to the administrator
A digital signature is assigned to the data certified by ISO15408. To ensure integrity of the
file, have the administrator of the machine confirm the digital signature using the property
of the provided data file in the user's PC environment.
When giving the User’s Guide Security Operations to the Administrator of the machine,
check that the User’s Guide is the security-compatible version and explain to the Administrator that it is security-compatible.
Check that the Firmware version of [Controller F/W] and [Boot F/W] checked with the Service Manual match the values shown in the Firmware Version screen.
If the version of the [Controller F/W] does not match, explain to the Administrator of the machine that the firmware requires rewriting and rewrite the firmware.
If the version of the [Boot F/W] does not match, suspend the installation procedure and
contact Konica Minolta.
Check that the PKI function has been properly set up in accordance with the PKI card system setup instructions.
Check that the Administrator Password has been set by the Administrator of the machine.
Check that the Encryption Key has been set by the administrator of the machine.
Check that external server (Active Directory only) has been set by the administrator of the
machine.
Check that Password Rules has been set to [ON] by the Administrator of the machine.
Check that the various functions to be disabled manually have been properly disabled by
the administrator of the machine.
Let the Administrator of the machine set Enhanced Security Mode to [ON].
Explain to the administrator that the settings for the security functions for this machine have
been specified.
When the above steps have been properly carried out, the Service Engineer should make a copy of this page
and give the original of this page to the Administrator of the machine. The copy should be kept at the corresponding Service Representative for filing.
Product NameCompany NameUser Division NamePerson in charge
Customer (Administrator of Machine)
Service Representative-
bizhub 4750/40501-3
1.2Security Functions
1.2Security Functions
Setting the Enhanced Security Mode to [ON] will validate the security function of this machine. For details of
the settings of different security functions to be changed by turning [ON] the Enhanced Security Mode, see
page 2-6.
A password that can be set must meet the requirements of the Password Rules. The machine does not accept setting of an easily decipherable password. For details of the Password Rules, see page 1-9.
If a wrong password has been entered three cumulative times during password authentication, the machine
determines that it is unauthorized access through Prohibited Functions When Authentication Error, prohibiting any further entry of the password. By prohibiting the password entry operation, the machine prevents unauthorized use or removal of data, thereby ensuring secured used of the machine. This function is not,
however, governed by authentication by the ISO15408.
When the machine is to be discarded, or use of a leased machine is terminated at the end of the leasing contract, the data erase function overwrites and erases all data stored in all spaces of the HDD. The function also
resets all passwords saved in the memory area on the MFP board to factory settings, preventing leak of data.
For details of items to be cleared by data erase function, see page 1-9.
Check Count Clear Conditions
The following are the conditions for clearing or resetting the check count of the number of wrong entries at
the time of authentication.
NOTICE
The check count is cleared or reset by restarting the machine. If there is any user who frequently turns ON
and OFF the machine, warn him or her of the fact or take necessary steps.
<Administrator Settings>
-Authentication of Administrator Settings is successful.
-The machine is restarted
1
bizhub 4750/40501-4
1.3Data to be Protected
1.3Data to be Protected
The underlying concept of this machine toward security is "to protect data that can be disclosed against the
intention of users."
The following types of image files that have been saved in the machine and made available for use by its users
are protected while the machine is being used.
-Encrypted document transmitted to the machine using a dedicated printer driver and an IC card from
the client PC and saved in the machine
-Image files which have been scanned for transmission to a user mail address through e-mail (S/MIME)
The following types of data saved in the HDD are protected when use of a leased machine is terminated at
the end of the leasing contract, the machine is to be discarded, or when the HDD is stolen.
-Encrypted document
-Scanned image files
-Image files other than Encrypted document
-Image files of jobs in the queue state other than Scanned image files
-Data files left in the HDD data space, used as image files and not deleted through the general deletion
operation
-Temporary data files generated during print image file processing
1
bizhub 4750/40501-5
1.4Precautions for Operation Control
1.4Precautions for Operation Control
This machine and the data handled by this machine should be used in an office environment that meets the
following conditions. The machine must be controlled for its operation under the following conditions to protect the data that should be protected.
Roles and Requirements of the Administrator
The Administrator should take full responsibility for controlling the machine, thereby ensuring that no improper operations are performed.
<To Achieve Effective Security>
-A single individual person who is capable of taking full responsibility for controlling the machine should
be appointed as the Administrator to make sure that no improper operations are performed.
-When an SMTP server (mail server), a DNS server, a user information control system, or a WebDAV
server is to be used, the Administrator of the machine should periodically check that the corresponding
administrator of the server appropriately manages the server to allow no settings to be changed without
permission.
Password Usage Requirements
The administrator must control the Administrator Password and Encryption Key appropriately so that they
may not be leaked. These passwords should not be ones that can be easily guessed.
<To Achieve Effective Security>
-Make absolutely sure that only the administrator knows the Administrator Password and Encryption
Key.
-The administrator must change the Administrator Password and Encryption Key at regular intervals.
-The administrator should make sure that any number that can easily be guessed from birthdays, em-
ployee identification numbers, and the like is not set for the Administrator Password and Encryption
Key.
-If the Administrator Password has been changed by the Service Engineer, the administrator should
change the Administrator Password as soon as possible.
-Upon change of the Administrators, the old Administrator of the machine should promptly have the new
one change the Administrator password.
1
Network Connection Requirements for the Machine
If the LAN is to be connected to an outside network, no unauthorized attempt to establish connection from
the external network should be permitted.
<To Achieve Effective Security>
-If the LAN, in which the machine is installed, is connected to an outside network, install a firewall or
similar network device to block any access to the machine from the outside network and make the necessary settings.
-Provide an appropriate network control at all times to make sure that no other copying machine is connected without prior notice to the office LAN to which this machine is connected.
User information control system control requirements
The administrator of the machine and the server administrator are required to apply patches to, or perform
account control for, this machine and the user information control system connected to the office LAN in
which the machine is installed to ensure operation control that achieves appropriate access control.
<To Achieve Effective Security>
-Apply patches so that the user information management system is always up-to-date.
-Change the corresponding account information promptly as soon as user authorities are changed.
-Delete the corresponding account information promptly as soon as the specific user is transferred.
bizhub 4750/40501-6
1.4Precautions for Operation Control
Security function operation setting operating requirements
The administrator of the machine should observe the following operating conditions.
-The administrator should make sure that the machine is operated with the settings described in the installation checklist made properly in advance.
-The administrator should make sure of correct operation control so that the machine is used with the
Enhanced Security Mode set to [ON].
-When the Enhanced Security Mode is turned [OFF], the administrator is to make various settings according to the installation checklist and then set the Enhanced Security Mode to [ON] again. For details
of settings made by the service engineer, contact your service representative.
-When the machine is to be discarded or use of a leased machine is terminated at the end of the leasing
contract, the administrator should use the Overwrite All Data function to thereby prevent data to be protected from leaking.
Operation and control of the machine
The administrator of the machine should perform the following operation control.
-The administrator of the machine should log off from the Administrator Settings whenever the operation
in the Administrator Settings is completed. The administrator of the machine should also make sure that
each individual user logs off from the User Authentication mode after the operation in the User Authentication mode is completed, including operation of the Encrypted document.
-The administrator of the machine should set the Encryption Key according to the environment, in which
this machine is used.
-The administrator of the machine should make sure that each individual user updates the OS of the user’s terminal and applications installed in it to eliminate any vulnerabilities.
1
The administrator of the machine disables the following functions and operates and manages the machine
under a condition in which those functions are disabled.
ö [External Memory Function Settings], set [Print Document] to [OFF].
Machine Maintenance Control
The Administrator of the machine should perform the following maintenance control activities.
-Provide adequate control over the machine to ensure that only the Service Engineer is able to perform
physical service operations on the machine.
-Provide adequate control over the machine to ensure that any physical service operations performed
on the machine by the Service Engineer are overseen by the Administrator of the machine.
-Some options require that Enhanced Security Mode be turned [OFF] before they can be used on the
machine. If you are not sure whether a particular option to be additionally purchased is fully operational
with the Enhanced Security Mode turned [ON], contact your Service Representative.
Implementing digital signature properly
The administrator of the machine should make the setting for adding a digital signature by selecting either
[Always add signature] or [Select when sending]. He or she should make sure that the digital signature is added whenever an IC card owner sends highly confidential image data to the client PC.
bizhub 4750/40501-7
1.4Precautions for Operation Control
Operating conditions for the IC card and IC card reader
The machine supports the following types of IC card and IC card reader.
-The types of IC cards supported by the machine are the Common Access Card (CAC) and Personal
Identity Verification (PIV).
-The type of IC card reader supported by the machine is AU-211P/Identive SCR-3310/SCR-3310v2. Be
sure to use the IC card reader provided by the Service Representative. For details, contact your Service
Representative.
The service representative is to install the IC card reader to the USB port on the front side of the machine.
The administrator of the machine should make sure that the user will not relocate the IC card reader to any
other USB port. Operation through any other USB port is not guaranteed.
The administrator of the machine should also make sure that no inadequate device is connected to the
connector of the IC card reader.
IC card owner requirements
The administrator of the machine should make sure that operating rules that specify the following operations
exist within the organization and that the operations are implemented according to the rules.
-The person responsible within the organization that uses the machine should distribute the IC card issued for use by the organization to a specific person who is authorized to own the IC card.
-The person responsible within the organization that uses the machine should prohibit the user from
transferring or lending the IC card to any third person and make sure that the user reports any lost IC
card. If the IC card is lost, the system is at risk of being illegally accessed. In such cases, the registered
user in question should be deleted from the external server, so that the lost IC card is disabled for authentication.
-The person responsible within the organization that uses the machine should make sure that each IC
card user removes his or her IC card from the card reader and never leaves the card in the card reader
after he or she completes the operation of the machine.
1
bizhub 4750/40501-8
1.5Miscellaneous
1.5Miscellaneous
Password Rules
According to certain Password Rules, registration of a password consisting of a string of a single character
or change of a password to one consisting of a string of a single character is rejected for the Administrator
Password. For the Administrator Password, the same password as that currently set is not accepted.
Study the following table for more details of the number of digits and characters that can be used for each
password.
NOTICE
Before setting the Enhanced Security Mode, be sure to enable the Password Rules. For details of the settings
of the Password Rules, see page 2-8
Types of passwordsNo. of digitsCharacters
Administrator Password8 to 16 digits *• Numeric characters: 0 to 9
*
: The minimum number of characters set in [Set Minimum Password Length] must be set for the password.
Precautions for Use of Various Types of Applications
When the Encrypted document function is to be used, be sure to install the dedicated printer driver in the
client PC.
Encrypting communications
Effective 2014, do not use the 1024-bit RSA and SHA-1. Or, an increased risk results of falsification and leakage of data to be protected.
Items of Data Cleared by Data Erase Function
The data erase function clears the following items of data.
NOTICE
Perform "Restore All" from the control panel of the machine, and not via the network.
The encryption key is not deleted even if Restore All or Overwrite All Data is performed. For the detailed deleting procedure, see page 2-22.
Items of Data ClearedDescriptionMethod
Enhanced Security ModeSet to [OFF]Overwrite All Data
HDD Format
Restore All
Password RulesSets [OFF] and disables [Set Minimum
Password Length]
Encrypted documentDeletes all Encrypted document saved in
Encrypted document User Box
Image files• Image files other than Encrypted docu-
ment
• Image files of jobs in the queue state
other than Scanned image files
• Data files left in the HDD data space,
used as image files and not deleted
through the general deletion operation
• Temporary data files generated during
print image file processing
Administrator PasswordClears the currently set password, reset-
ting it to the factory setting
Restore All
Overwrite All Data
HDD Format
Overwrite All Data
HDD Format
Overwrite All Data
Restore All
bizhub 4750/40501-9
1.5Miscellaneous
Items of Data ClearedDescriptionMethod
S/MIME certificateDeletes the currently set S/MIME certifi-
External ServerDeletes the currently set external serverOverwrite All Data
Time Adjustment Setting
(NTP)
General functions and operations
For details of general functions and settings of this machine, refer to the User's Guide furnished with the machine.
HDD Format
Execute HDD format when, for example, to initialize the HDD (to be reset to the default state) or when the
HDD is replaced with a referent one. Executing HDD format deletes data saved in the machine’s HDD.
-For details of items that are cleared by HDD Format, see page 1-9.
-HDD formatting turns [OFF] the Enhanced Security Mode. So, it must be turned [ON] again. For details
of settings, see page 2-6.
Overwrite All Data
cate
Set to [Disable]Restore All
HDD Format
HDD Format
Restore All
1
Upgrading of the firmware
If upgrading of the firmware has been performed by the service engineer, the Administrator of the machine
must execute [Restore All]. Execute [Restore All] after the firmware has been upgraded. For details of the execution of [Restore All], see page 2-26.
-For details of items of data to be cleared by [Restore All], see page 1-9.
-The execution of [Restore All] will turn [OFF] the Enhanced Security Mode. So, it must be turned [ON]
again. For details of settings, see page 2-6.
Software used in the machine
The following lists the types of software and their versions used for the ISO15408 evaluation for this machine.
The user should appropriately manage the software used with the machine on his or her own responsibility.
SoftwareVersion, etc.
OS (Operating System)Windows 7 Professional SP1
Internet ExplorerVer. 11
Printer DriverKONICA MINOLTA 4750 Series
• PCL 6 v1.1.5.0
ActivClientv7.0.2.25
IC card reader driverA6F70Y0-A401-G00-00
bizhub 4750/40501-10
2
Administrator Operations
2.1Accessing the Administrator Settings
2Administrator Operations
2.1Accessing the Administrator Settings
This machine implements authentication of the user of the Administrator Settings function through the Administrator Password that verifies the identity as the Administrator of the person who accesses the function.
During the authentication procedure, the Administrator Password entered for the authentication purpose appears as "*" or "●" on the display. A failure in authentication as a result of the entry of a wrong password is
counted as unauthorized access.
NOTICE
Make sure that none of the general users of the machine will know the Administrator Password.
If the Administrator Password is forgotten, it must be set again by the Service Engineer. Contact your Service
Representative.
2.1.1Accessing the Administrator Settings
The machine does not accept access to the Administrator Settings under any of the following conditions.
Wait for some while before attempting to gain access to the Administrator Settings again.
-There is a job being executed by the machine.
-There is a reserved job (timer TX, fax redial waiting, etc.) in the machine.
-Immediately after the power switch has been turned ON.
-A malfunction code is displayed on the machine.
2
<From the Control Panel>
0Do not leave the machine with the setting screen of Administrator Settings left shown on the display. If
it is absolutely necessary to leave the machine, be sure first to log off from the Administrator Settings.
1Touch [Utility].
2Touch [Administrator Settings].
bizhub 4750/40502-2
2.1Accessing the Administrator Settings
3Enter the Administrator Password from the keyboard.
% Touch [C] to clear all characters.
% Touch [] to delete the last character entered.
% Touch [Shift] to show the upper case/symbol screen.
% Touch [Cancel] to go back to the previous screen.
4Touch [OK].
% If a wrong Administrator Password is entered, a message that tells that the Administrator Password
does not match appears. Enter the correct Administrator Password.
% A failure in authentication as a result of the entry of a wrong password is counted as unauthorized
access. If the cumulative number of unauthorized accesses reaches three during operation of the
machine, the machine is set into an access lock state and prohibits any subsequent password entry
operations. To cancel the access lock state, turn off, then on, the power switch of the machine.
When the power switch is turned off, then on again, wait at least 10 seconds to turn it on after turning it off. This interval is necessary to ensure that the machine functions properly.
2
5Press the [Reset] key to log off from the Administrator Settings.
bizhub 4750/40502-3
Loading...
+ 36 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.