User Manual - Page 446

For 2223C023.

Loading ...
Loading ...
Loading ...
[Prohibit Use of Ke
y/Certiî ´cate with Weak
Encryption]
In <Prohibit Use of Weak Encrypt.>, <Prohibit Weak
Encryp. Key/Cert.> is set to <On>. It is not possible to use
a key or certiî ´cate with weak encryption.
<Encryption
Settings>(P
. 554)
[Use TPM to Store Password and Key] This function is not available on this machine, giving no
change to the security level.
â—¼ [Log]
[Force Recording of Audit Log] This function is not available on this machine, giving no change to the security level.
[Force SNTP Settings] This function is not available on this machine, giving no change to the security level.
â—¼ [
Job]
[Printing Policy]
[Prohibit Immediate Printing of Received Jobs] This function is not available on this machine, giving no change to the
security le
vel.
[Sending/Receiving Policy]
Limit the sending oper
ations for destinations, and limit how received data is processed.
[Allow Sending Only to Registered
Addr
esses]
<Restrict New Destinations> is set to <On>. It is only
possible to send to destinations that are registered in
the Address Book.
<Restrict New
Destinations>
(P. 519)
[Force Conî ´rmation of Fax Number] <Conî ´rm Entered Fax Number> is set to <On>. Users
are required to enter a fax number again for
conî ´rmation when sending a fax.
<Conî ´rm Enter
ed Fax
Number>(P. 528)
[Prohibit Auto Forwarding] In <Forwarding Function>, the <Use Forwarding
Function> is set to <Off>. It is not possible to
automatically forward faxes.
<Forwarding
Settings>(P
. 535)
â—¼ [Stor
age]
[Force Complete Deletion of Data] This function is not available on this machine, giving no change to the security level.
To Apply the Security Policy to the Machine
You can import the security policy edited on the imageRUNNER ADVANCE Series or using Device Management
Software to apply it to this machine. In addition, you can export the security policy as applied to this machine to apply
it to other machines
*
. Importing/Exporting the Setting Data(P. 440)
*
Only Canon de
vices that are compatible with security policy settings
Managing the Machine
438
Loading ...
Loading ...
Loading ...