bizhub PRESS 1250P Contents-1
Contents
1 Introduction
1.1 Welcome .......................................................................................................................................... 1-2
1.1.1 Composition of User's Guide............................................................................................................. 1-2
1.1.2 User's Guide ...................................................................................................................................... 1-2
1.2 Conventions Used in This Manual ................................................................................................. 1-3
1.2.1 Symbols Used in This Manual ........................................................................................................... 1-3
1.2.2 Paper Indications ............................................................................................................................... 1-4
2 Security Functions
2.1 Control Software ............................................................................................................................. 2-2
2.1.1 Control Software Version ................................................................................................................... 2-2
2.1.2 About the ROM Version Display Function ......................................................................................... 2-2
2.2 Security Functions .......................................................................................................................... 2-3
2.2.1 Security Mode.................................................................................................................................... 2-3
2.2.2 Environment ....................................................................................................................................... 2-3
2.2.3 Description of Enhanced Security Mode ........................................................................................... 2-4
2.2.4 Data Protected by the Enhanced Security Mode .............................................................................. 2-5
2.2.5 Protecting and Deleting of Remaining Data After Being Used .......................................................... 2-6
2.3 User Authentication in Enhanced Security Mode ........................................................................ 2-7
2.3.1 Adding User Registration................................................................................................................... 2-7
2.3.2 Changing User Registration............................................................................................................. 2-13
2.3.3 Deleting User Data........................................................................................................................... 2-18
2.3.4 Changing Password by User ........................................................................................................... 2-20
2.4 HDD Recall Function in Enhanced Security Mode..................................................................... 2-24
2.4.1 Recalling and Deleting of Data......................................................................................................... 2-24
2.4.2 Output Data in the Secure Box........................................................................................................ 2-28
2.5 Administrator Security Functions................................................................................................ 2-32
2.5.1 Turning the Enhanced Security Mode ON/OFF ............................................................................... 2-32
2.5.2 HDD Lock Password........................................................................................................................ 2-35
2.5.3 Deleting Temporary Data .................................................................................................................
2-37
2.5.4 Deleting All Data............................................................................................................................... 2-40
2.5.5 Printing Audit Log ............................................................................................................................ 2-43
2.5.6 Analyzing Audit Log ......................................................................................................................... 2-45
3Index
3.1 Index by item ................................................................................................................................... 3-2
3.2 Index by button................................................................................................................................ 3-3