1. Getting Started
This chapter describes the precautions you need to take when using the machine's security features and
how to configure the administrator settings.
Before Configuring the Security Function
Settings
• If the security settings are not configured, the data in the machine is vulnerable to attack.
• To prevent this machine from being stolen or willfully damaged, install it in a secure location.
• Purchasers of this machine must make sure that people who use it do so appropriately, in
accordance with operations determined by the machine administrator and supervisor. If the
administrator or supervisor does not make the required security settings, there is a risk of security
breaches by users.
• Before setting this machine's security features and to ensure appropriate operation by users,
administrators must read the Security Guide completely and thoroughly, paying particular attention
to the section entitled "Before Configuring the Security Function Settings".
• Administrators must inform users regarding proper usage of the security functions.
• If this machine is connected to a network, its environment must be protected by a firewall or similar.
• For protection of data during the communication stage, apply the machine's communication
security functions and connect it to devices that support security functions such as encrypted
communication.
• Administrators should regularly examine the machine's logs to check for irregular and unusual
events.
7
Summary of Contents for PRO C9100
Page 2: ......
Page 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Page 24: ...1 Getting Started 22...
Page 72: ...4 Preventing Leakage of Information from Machines 70...
Page 116: ...5 Enhanced Network Security 114...
Page 176: ...6 Managing the Machine 174...
Page 188: ...7 Troubleshooting 186...
Page 235: ......
Page 236: ...EN GB EN US EN AU M238 1022 2014...