Текст страницы
Security
[Prohibit Use of Key/Certificate with Weak Encryption]
You can prohibit the use of keys and certificates with weak encryption.
[Use TPM to Store Password and Key]
As this function is not available on the machine, it is not applied to the security policy.
[Log]
You can periodically survey how the machine is used, by requiring logs to be recorded.
[Force Recording of Audit Log]
Audit logs are always recorded.
[Force SNTP Settings]
Time synchronization via SNTP is required.
[Job]
[Printing Policy]
As this function is not available on the machine, it is not applied to the security policy.
[Prohibit Immediate Printing of Received Jobs]
[Sending/Receiving Policy]
As this function is not available on the machine, it is not applied to the security policy.
[Allow Sending Only to Registered Addresses]
[Force Confirmation of Fax Number]
[Prohibit Auto Forwarding]
[Storage]
As this function is not available on the machine, it is not applied to the security policy.
[Force Complete Deletion of Data]
259