Security1469-079Confidential information is handled by information devices everywhere, including computers and printers, and any ofthese devices may become a target for malicious third parties at anytime. Attackers may directly gain unauthorizedaccess to your devices, or indirectly take advantage of negligence or improper use. Either way, you may incurunanticipated losses when your confidential information is leaked. To counter these risks, the machine is equippedwith a variety of security functions. Set the necessary configuration depending on your network environment.● You can configure the best security system by building an environment that inhibits access to printers onyour in-house network via the Internet and using such environment together with the machine's securityfeatures. Preventing Unauthorized Access(P. 394)◼ Establishing the Basics of Information SecurityProtecting the Machine from Unauthorized Access(P. 393)◼ Preparing for Risks from Negligence or MisuseRestricting the Machine's Functions(P. 413)◼ Implementing Robust Security FeaturesImplementing Robust Security Features (P. 425)Security392