• Reinforcing Security
    • Changing Security Settings
      • Enhancing the security by simple operation
      • Changing the administrator password
    • Encrypting Communications
      • Using an SSL/TLS communication
      • Using IPsec communication
    • Restricting Communications
      • Restricting external accesses using the IP address
      • Restricting Packet Transfer
      • Restricting E-mail recipients using the domain
    • Restricting network or USB connections
      • Connecting this machine to IEEE802.1X authentication environment
      • Restricting functions using the USB port
      • Restricting the firmware update using a USB memory with a password
    • Managing the certificates for this machine
      • Using Different Certificates Depending on the Application
      • Exporting a certificate
      • Importing a certificate
      • Deleting a certificate
      • Verifying a certificate for peer
      • Importing external certificates used for validating the chain
    • Monitoring or Restricting User Operations
      • Disabling user's registration/change operations
      • Restricting user's Web browser setting operations
      • Saving the operation log of the control panel
    • Installing the Copy Security Function

Enhancing the security by simple operation