This section describes the security measures that customers should take to use this system safely. By taking appropriate security measures, you can prevent unauthorized access, virus infections, and information leaks via this system.
When connecting this system to a network, use it in an environment protected by a firewall. In addition, we recommend that you set a private IP address for the IP address of this system. When a private IP address is set, only users on a local area network such as an internal LAN can access the system, which prevents unauthorized access from outside.
If you must use a global IP address, be sure to install this system inside a firewall.
For private IP addresses, addresses in one of the following ranges are used.
This system has settings ([Administrator Setting]) that can only be changed by the administrator. When changing the administrator settings, you will be asked to enter the administrator password.
To prevent settings from being changed by malicious third parties, change the administrator password from the factory default. Please keep the changed password in a safe place so that you do not forget it.
Implementing user authentication allows you to restrict the users who can use this system.
Only users who have registered a user name and password on this system can use this system; this prevents unauthorized use by third parties. In addition, if you have an authentication server such as Active Directory, you can restrict users who can use this system using the user information registered on the authentication server.
Also, you can restrict functions for each user as follows to prevent unauthorized use.
Allow/disallow a use of each function such as print, scan, and copy
Allow/disallow use of USB flash drive
Restrict scan destinations
In addition, by collecting user usage history in the audit log, you can trace fraudulent acts and information leaks later, which is expected to have a psychological deterrent effect against unauthorized use.
IP address filtering is a function that controls devices that access this system by IP address. By setting this function appropriately, you can restrict accesses from unauthorized devices.
There are 2 ways to set the IP address filtering function of this system.
[IP Filtering]
Manually specify the range of IP addresses to allow or deny access.
[Quick IP Filtering]
The range of IP addresses to allow access is automatically set based on the IP address and subnet mask set on this system.
The following security features are also available.
Network
SSL/TLS communication: Allows you to encrypt a communication between this system and your computer and enhance security.
Scan
Encrypt PDF file: Allows you to restrict file viewing with a password when distributing scanned data as a PDF file. You can also encrypt files to prevent unauthorized viewing by third parties.
Storage
Encryption settings: Encrypts the storage.
Was this information useful?
Thank you.