Gestetner dsm725e Reference Manual

Page of 184
iv
3. Ensuring Information Security
Preventing Unauthorized Copying ..................................................................... 51
Unauthorized Copy Prevention ................................................................................52
Data Security for Copying ........................................................................................53
Printing Limitations................................................................................................... 54
Notice .......................................................................................................................55
Printing with Unauthorized Copy Prevention and Data Security for Copying........... 55
Printing a Confidential Document ...................................................................... 58
Choosing a Locked Print file .................................................................................... 58
Printing a Locked Print File ...................................................................................... 59
Deleting Locked Print Files ...................................................................................... 60
Deleting Passwords of Locked Print Files................................................................ 60
Unlocking Locked Print Files.................................................................................... 61
Specifying Access Permission for Stored Files ............................................... 62
Assigning Users and Access Permission for Stored Files ....................................... 63
Specifying Access Privileges for Files Stored using the Scanner and 
Fax Functions ........................................................................................................ 65
Assigning the User and the Access Permission for the User’s Stored Files ............ 67
Specifying Passwords for the Stored Files...............................................................69
Unlocking Files.........................................................................................................70
Preventing Data Leaks Due to Unauthorized Transmission............................ 71
Restrictions on Destinations.....................................................................................71
Protecting the Address Book ............................................................................. 73
Address Book Access Permission ...........................................................................73
Encrypting the Data in the Address Book ................................................................ 75
Deleting Data on the Hard Disk .......................................................................... 77
Overwriting the Data on the Hard Disk..................................................................... 77
4. Managing Access to the Machine
Preventing Modification of Machine Settings ................................................... 83
Menu Protect ........................................................................................................ 84
Set up Menu Protect ................................................................................................ 84
Limiting Available Functions .............................................................................. 88
Specifying Which Functions are Available ...............................................................88
Managing Log Files ............................................................................................. 90
Specifying Delete All Logs .......................................................................................91
Transfer Log Setting.................................................................................................92
5. Enhanced Network Security
Preventing Unauthorized Access....................................................................... 93
Enabling/Disabling Protocols ...................................................................................93
Access Control .........................................................................................................94
Specifying Network Security Level...........................................................................95
Encrypting Transmitted Passwords................................................................... 98
Driver Encryption Key .............................................................................................. 99
Group Password for PDF files................................................................................ 100
IPP Authentication Password................................................................................. 101
D0086951_RussianC45-EN.book  Page iv  Wednesday, May 31, 2006  11:45 AM