>
Administrator Setting
> [Security Setting] > [Enhanced Security Mode] > What Is the Enhanced Security Mode?
What Is the Enhanced Security Mode?
Overview
Enhanced Security mode is a security setting to be configured when connecting this system to an external device via the network or a telephone line.
The administrator manages this system in Enhanced Security mode, preventing unauthorized accesses to the HDD and providing the secure operating environment in view of data protection.
Enhanced Security mode can be set by having the administrator set [Enhanced Security Mode] to [ON] after the service representative has performed the pre-setting.
- The following setting by your service representative is required to enable [Enhanced Security Mode]. For details about each setting, contact your service representative.
- Set the CE authentication function to ON, and specify the CE authentication password.
- Set the administrator authentication function to ON, and specify the administrator password.
- Enabling [Enhanced Security Mode] automatically performs [Firmware Diagnosis] to detect whether system programs are written properly and [Device Diagnosis] to detect an error in setting information used for the security function. If an error is detected, the service call screen is displayed.
- When [Enhanced Security Mode] is enabled, the security icon "" is displayed at the bottom right of the [MACHINE] screen.
- If the administrator sets [Enhanced Security Mode] to [OFF] by mistake, contact your service representative. After the customer engineer (CE) has checked the security environment and setting, enable [Enhanced Security Mode] again.
Procedure
This section describes how the administrator sets Enhanced Security mode.
The administrator can obtain the administrator password required to configure Enhanced Security mode settings, from your service representative.
Step 1
Enabling [HDD Encryption Setting]
Step 2
Enabling [Enhanced Security Mode]
Step 3
Performing [User Registration]
[User Registration]: Assigns an optional number to each user and sets and registers user information for each number. You can manage the usage of this system.
- Make sure that the administrator does not leak the obtained administrator password to any third parties.
The administrator should give the following guidance to users.
- Do not leak the individual password to any third parties.
- When ending system operations after logging in with user authentication, be sure to log out.