bizhub PRO 951 Contents-1
Contents
1 Introduction
1.1 Welcome .......................................................................................................................................... 1-2
1.1.1 Composition of User's Guide............................................................................................................. 1-2
1.1.2 User's Guide ...................................................................................................................................... 1-3
1.2 Conventions Used in This Manual................................................................................................. 1-4
1.2.1 Symbols Used in This Manual ........................................................................................................... 1-4
1.2.2 Original and Paper Indications........................................................................................................... 1-5
2 Security Functions
2.1 Control Software............................................................................................................................. 2-2
2.1.1 Control Software Version ................................................................................................................... 2-2
2.1.2 About the ROM Version Display Function ......................................................................................... 2-2
2.2 Security Functions .......................................................................................................................... 2-3
2.2.1 Security Mode.................................................................................................................................... 2-3
2.2.2 Environment ....................................................................................................................................... 2-3
2.2.3 Description of Enhanced Security Mode ........................................................................................... 2-4
2.2.4 Data Protected by the Enhanced Security Mode .............................................................................. 2-5
2.2.5 Protecting and Deleting of Remaining Data After Being Used .......................................................... 2-6
2.3 User Authentication in Enhanced Security Mode........................................................................ 2-7
2.3.1 Adding User Registration................................................................................................................... 2-7
2.3.2 Changing User Registration............................................................................................................. 2-13
2.3.3 Deleting User Data........................................................................................................................... 2-18
2.3.4 Changing Password by User ........................................................................................................... 2-20
2.4 HDD Store Function in Enhanced Security Mode...................................................................... 2-24
2.4.1 Saving Data While Copying ............................................................................................................. 2-24
2.4.2 Saving Data in User Box.................................................................................................................. 2-27
2.4.3 Recalling and Deleting of Data......................................................................................................... 2-31
2.4.4 Output Data in the Secure Box ........................................................................................................ 2-35
2.5 Administrator Security Functions................................................................................................ 2-39
2.5.1 Turning the Enhanced Security Mode ON/OFF ............................................................................... 2-39
2.5.2 HDD Lock Password........................................................................................................................ 2-42
2.5.3 Deleting Temporary Data ................................................................................................................. 2-44
2.5.4 Deleting All Data............................................................................................................................... 2-47
2.5.5 Printing Audit Log ............................................................................................................................ 2-50
2.5.6 Analyzing Audit Log ......................................................................................................................... 2-52
3 Index
3.1 Index by item ................................................................................................................................... 3-2
3.2 Index by button................................................................................................................................ 3-3