Konica Minolta bizhub PRO 920 [19/980] Enhanced security mode

Konica Minolta bizhub PRO 920 [19/980] Enhanced security mode
bizhub PRO 920 Contents-17
22 Enhanced Security Mode
22.1 Description of Enhanced Security mode...................................... 22-3
22.2 Data protected by Enhanced Security mode ............................... 22-5
Data that is not protected in Enhanced Security mode............... 22-5
To turn Enhanced Security mode ON/OFF.................................. 22-5
22.3 Display when Enhanced Security mode is ON............................. 22-6
23 Protect and Delete Data After Use
24 User Authentication in Enhanced Security Mode
24.1 Description of user authentication ............................................... 24-3
24.2 To register a new user ................................................................... 24-5
24.3 To change a user data.................................................................. 24-10
24.4 To delete a user ............................................................................ 24-15
24.5 To change password by user ...................................................... 24-19
25 HDD Store Function in Enhanced Security Mode
25.1 Store the data in a Box while Copying.......................................... 25-4
25.2 Store scanned data in a Box.......................................................... 25-9
25.3 Recall/Delete data in a Box ......................................................... 25-14
25.4 Output data in the Secure Box .................................................... 25-20
Secure printing using a PC ........................................................ 25-20
Outputting secure printing using a PC – printing
on the machine .......................................................................... 25-20
26 Administrator Security Functions
26.1 Turn Enhanced Security mode ON/OFF ....................................... 26-4
26.2 HDD lock password........................................................................ 26-7
26.3 Print audit log................................................................................ 26-14
26.4 Analyze audit log .......................................................................... 26-18
Audit Log Information ................................................................ 26-18
26.5 Table of items saved in audit log ................................................ 26-19
Specify unauthorized actions – password authentication ......... 26-20
Specify unauthorized actions – actions other than
password authentication under security.................................... 26-20

Содержание

Похожие устройства

Скачать