Текст страницы
Security
Security
Security ................................................................................................................................................................ 196
Setting the ID and PIN for the Administrator ................................................................................................. 197
Authenticating Users and Managing Groups .................................................................................................. 199
Authenticating Users and Managing Groups with Department ID (Department ID Management) ............... 200
Registering a Department ID and PIN ................................................................................................... 202
Enabling Department ID Management .................................................................................................. 204
Setting the Department ID and PIN on a Computer ............................................................................... 205
Confirming Usage by Department ID ..................................................................................................... 208
Protecting the Network .................................................................................................................................... 209
Setting the Firewall ....................................................................................................................................... 210
Changing the Port Number .......................................................................................................................... 213
Using a Proxy ............................................................................................................................................... 214
Using TLS ...................................................................................................................................................... 216
Using IPSec ................................................................................................................................................... 218
Using IEEE 802.1X ......................................................................................................................................... 222
Managing and Verifying a Key and Certificate .............................................................................................. 224
Generating a Key and Certificate ........................................................................................................... 225
Generating a Key and Certificate Signing Request (CSR) and Obtaining and Registering a Certificate ... 227
Generating a Key and Obtaining and Registering a Certificate from an SCEP Server ............................. 230
If an Error Is Displayed in the Certificate Issuance Request Status .................................................. 235
Registering a Key and Certificate or CA Certificate Obtained from an Issuing Authority ........................ 237
Verifying a Received Certificate with OCSP ............................................................................................. 239
Preventing Leaking Information ...................................................................................................................... 240
Restricting Use of Memory Media ................................................................................................................. 241
Restricting Use from a Mobile Device ........................................................................................................... 243
Restricting Printing ....................................................................................................................................... 244
Restricting Printing from a Computer to Secure Print ............................................................................ 245
Preventing Unauthorized Use .......................................................................................................................... 246
Restricting Use of Remote UI ........................................................................................................................ 247
Preventing Connection to Computer via USB Port ........................................................................................ 249
Configuring LPD, RAW, or WSD ..................................................................................................................... 250
Disabling HTTP Communication ................................................................................................................... 252
Restricting Use of the Control Panel ............................................................................................................. 253
Applying a Security Policy ................................................................................................................................. 254
Security Policy Items ..................................................................................................................................... 256
195