Gestetner dsm725e Guide D’Exploitation

Page de 184
3
1. Getting Started
Enhanced Security 
The machine's security functions are reinforced by means of realization of device
and user management, through extended authentication functions.
By specifying access limits on the machine’s functions and the documents and
data stored in the machine, you can prevent information leaks and unauthorized
access.
Data encryption can prevent unauthorized data access and tampering via the
network.
❖ Authentication and Access Limits
Using authentication, administrators manage the machine and its users. To
enable authentication, information about both administrators and users must
be registered in order to authenticate users via their login user names and
passwords.
Four types of administrator manage specific areas of machine usage, such as
settings and user registration.
Access limits for each user are specified by the administrator responsible for
user access to machine functions and documents and data stored in the ma-
chine.
Reference
For details, see p.11 “Administrators and Users”.
❖ Encryption Technology
This machine can establish secure communication paths by encrypting trans-
mitted data and passwords.
D0086951_RussianC45-EN.book  Page 3  Wednesday, May 31, 2006  11:45 AM