2Table of ContentsBefore Using the Security Function .................................................................. 5Preface .......................................................................................................................................................5Security Features...................................................................................................................................6Settings for the Secure Operation ................................................................................................6Data Restoration...................................................................................................................................7Starting use of the data encryption feature and changing the settings ...................7Use of the Overwrite Hard Disk......................................................................................................8Service Representative Restricted Operation ..........................................................................8For Optimal Performance of the Security features ..............................................................9Confirm the Machine ROM version and the System Clock ............................................ 10How to check by Control Panel......................................................................................... 10How to check by Print Report ............................................................................................ 10How to check the Clock........................................................................................................ 10Initial Settings Procedures Using Control Panel...................................... 11Authentication for entering the System Administration mode................................... 11Change the System Administrator’s Passcode .................................................................... 11Set Maximum Login Attempts..................................................................................................... 11Set Service Rep. Restricted Operation...................................................................................... 12Set Overwrite Hard Disk.................................................................................................................. 12Set Scheduled Image Overwrite ................................................................................................. 12Set Authentication ............................................................................................................................ 13Set Access Control ............................................................................................................................. 13Set Private Print .................................................................................................................................. 13Set User Passcode Minimum Length ........................................................................................ 14Initial Settings Procedures Using CentreWare Internet Services .... 15Preparations for settings on the CentreWare Internet Services ................................. 15Set SMB................................................................................................................................................... 15Set SSL/TSL ........................................................................................................................................... 16Configuring Machine certificates............................................................................................... 16Set IPSec ................................................................................................................................................ 17Set IPSec Address .................................................................................................... 17Set SNMPv3 .......................................................................................................................................... 18Set S/MIME........................................................................................................................................... 19Regular Review by Audit Log ............................................................................ 20Set Audit Log........................................................................................................................................ 20Import the Audit Log File............................................................................................................... 20Authentication for the Secure Operation ................................................... 21Overview of Authentication.......................................................................................................... 21Users Controlled by Authentication ............................................................................... 21Machine Administrator ........................................................................................................ 21