• Reinforcing Security
    • Creating a certificate for this machine to communicate via SSL
    • Managing the certificates for this machine
      • Using Different Certificates Depending on the Application
      • Exporting a certificate
      • Importing a certificate
      • Deleting a certificate
    • Configuring certificate verification settings
      • Verifying a certificate for peer
      • Importing external certificates used for validating the chain
    • Registering user's certificates automatically on this machine
    • Controlling the access to this machine by IP address
    • Using IPsec communication
    • Using the IEEE802.1X authentication
    • Sending data to the authenticated share folder (Scan to Authorized Folder)
    • Disabling user's operation of registration/change
    • Restricting user's Web browser setting operations
    • Using the copy security function
    • Saving the operation log of the control panel
    • Enhancing the security of this machine by simple operation
    • Restricting functions using the USB port
    • Restricting the firmware update using a USB memory with a password

Creating a certificate for this machine to communicate via SSL