0% found this document useful (0 votes)
56 views10 pages

Data Security Kit (E) Operation Guide: General Information

This document provides instructions for general users on the functions and operation of an optional Data Security Kit that has been installed on a multi-functional product. The security kit enables overwriting of data storage areas and encryption of data to prevent restoration of deleted or stored files. It overwrites unused areas with random characters or encrypts data before saving it to the hard disk or SSD. The touch panel will display a hard disk icon to indicate the security kit is installed and running properly. Users are instructed to check settings after installation and not to turn off the device during overwriting processes to prevent damage.

Uploaded by

ARMEL DOGBAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views10 pages

Data Security Kit (E) Operation Guide: General Information

This document provides instructions for general users on the functions and operation of an optional Data Security Kit that has been installed on a multi-functional product. The security kit enables overwriting of data storage areas and encryption of data to prevent restoration of deleted or stored files. It overwrites unused areas with random characters or encrypts data before saving it to the hard disk or SSD. The touch panel will display a hard disk icon to indicate the security kit is installed and running properly. Users are instructed to check settings after installation and not to turn off the device during overwriting processes to prevent damage.

Uploaded by

ARMEL DOGBAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Data Security Kit(E)

OPERATION GUIDE
GENERAL INFORMATION
Introduction
This Setup Guide explains the procedures for installing and operating the optional Data Security Kit (E)
(hereinafter called Security Kit).

Organization administrators should read and understand this manual.

• Nominate a reliable person for the machine administrator when installing the security kit.
• Sufficiently supervise the nominated administrator so that it can observe the security policy and
operation rules at the organization to which it belongs and properly operate the machine in accordance
with the operation guide of the product.
• Sufficiently supervise the general users so that they can operate the machine while observing the
security policy and operation rules at the organization to which they belong.

Instructions for General Users

• Security Kit Functions ......................................................2


• Touch Panel Display after the Security Kit is Installed .....4
• After Installation ...............................................................5

1
Instructions for General Users

Security Kit Functions


The security kit enables overwriting and encryption.

NOTE: If you install the security kit, Running security function... appears when the machine starts up and it
may take a while.

Overwriting
Multi-functional products (MFPs) temporarily store the data of scanned originals and print jobs, as well as other
data stored by users, on the hard disk/SSD and the job is output from that data. As the data storage areas used
for such data remain unchanged on the hard disk/SSD until they are overwritten by other data, the data stored
in these areas is potentially restorable using special tools.
The security kit deletes and overwrites (hereinafter collectively referred to as overwrite(s)) the unnecessary data
storage area used for the output data or deleted data to ensure that data cannot be restored.
Overwriting is performed automatically, without user intervention.

CAUTION: When you cancel a job, the machine immediately starts overwriting the data that was stored on the
hard disk/SSD.

Overwrite Methods
Changing the data overwrite method is available, when a hard disk is installed. There are two overwrite methods,
which can be switched at any time.

Once Overwrite Method


This function overwrites unneeded data areas (in the case of overwriting) or all areas (in the case of system
initialization) with zeroes to prevent data restoration.

3-time Overwrite (DoD) Method (default)


This overwrite method complies with U.S. Department of Defense (DoD) standards, and overwrites unneeded
data areas of the hard disk (in the case of overwriting) or all areas (in the case of system initialization) with
specific characters, their complements, and random characters to prevent data restoration. Data restoration is
not possible even when sophisticated restoration techniques are used, and a higher level of security than Once
Overwrite is obtained.
This method may take more time than Once Overwrite method to process a larger amount of data.

NOTE: For SSD, the method used is Once Overwrite.

2
Encryption
MFPs store the data of scanned originals and other data stored by users in the hard disk. It means the data could
be possibly leaked or tampered with if the hard disk/SSD is stolen.
The security kit encrypts data before storing it in the hard disk/SSD. It guarantees higher security because no
data cannot be decoded by ordinary output or operations.
Encryption is automatically performed and no special procedure is required.

CAUTION: Encryption helps enhance security. However, the data stored in the Document Box can be decoded
by ordinary operations. Do not store any strictly confidential data in the Document Box.

Functions of Security Kit

Hard disk/SSD
Send
Copying
Save original data
and various settings
Sending

Print

Printing

Send
Faxing

1. Overwrite unwanted area of data.


2. Encryption ( ) / Decoding ( )

Security Kit

If the security kit is introduced while the hard disk and SSD are installed in the machine, the destination where
data received by FAX is to be saved is changed from SSD to hard disk. If you want to change the destination to
SSD, contact your dealer or service technician.

3
Touch Panel Display after the Security Kit is Installed
Hard Disk Icon Display
Admin Logout In Security Mode, the security kit has been properly
Select the function. installed and is running. The hard disk icon appears on
the lower right side of the touch panel in Security Mode.

Copy Send FAX Custom Box

Removable
Job Box FAX Box Internet Browser
Memory

Status/ Device Language Paper Wi-Fi Direct System Help Program


Job Cancel Information Settings Menu
Status 2016/02/02 10:10
MM0101_01bar_02

NOTE: If the hard disk icon does not appear on the


normal screen, it is possible that the Security Mode is
not ON. Call service.

The hard disk icon display changes as follows during overwriting

The table below shows the icons displayed and their descriptions.

Icon displayed Description


There is unneeded data on the hard
disk/SSD.

Overwriting the unwanted data

The unwanted data is overwritten.

CAUTION: Do not turn the power switch off while is displayed. Risk of damage to the hard disk/SSD.

NOTE: If you turn the machine off at the power switch during overwriting, data may not be overwritten
completely from the hard disk. Turn the machine back on at the power switch. Overwriting automatically
resumes. If you accidentally turn the main power switch off during overwriting or initialization, the hard disk icon
might not switch to the second icon shown above. This would be caused by a possible crash or failed
overwriting of the data to be overwritten. This will not affect subsequent overwriting processes. However, hard
disk initialization is recommended so as to return to normal stable operations. (Initialization should be
performed by the administrator following the steps in System Initialization on page 12.)

4
After Installation
Change the machine setting as follows to securely operate it. If the system in the machine is initialized, it returns
to the settings before installation, so make changes in the same way. If you allow service personnel to conduct
maintenance operations, confirm the set values.

Items changed in Command Center RX


Item Value
Device Energy Energy Saver/Timer Timer Auto Panel On
Settings Saver/Timer Settings Settings Reset
Panel Setting any
Reset Timer value
Function Printer Printer Settings General Remote Prohibit
Settings Printing
FAX/i-FAX FAX/i-FAX Fax Settings Remote FAX Remote Off
Settings Settings Diagnostics
RX/Forward Settings RX/Forward RX/Forward [Use Rule for
Rules Rules Rules Specific RX] or
[Rule for All RX]
Settings
Forward Forwarding On
Settings Forward Any forwarding
Destination destination
Network TCP/IP TCP/IP Settings Bonjour Settings Bonjour Off
Settings Protocol Protocol Settings Print NetBEUI Off
Protocols LPD Off
FTP Server Off
(Reception)
IPP Off
IPP over On
SSL
Raw Off
WSD Print Off
POP3 Off
(E-mail RX)
Send SMTP On
Protocols (E-mail TX)
SMTP STARTTLS or
Security SSL/TLS
FTP On
Encryption TX
SMB Off
WSD Scan Off
DSM Scan Off
eSCL Off
eSCL over SSL Off
Other SNMPv1/v2c Off
Protocols SNMPv3 Off
HTTPS Off
Enhanced Off
WSD
LDAP Off
IEEE802.1X Off
LLTD On

5
Item Value
Security Device Device Authentication Password Password On
Settings Security Security Security Policy Policy
Settings Maximum Setting any
Settings Settings
password value
age
Minimum On
password 8 or more
length characters
Password Setting any
complexity value
User Account Lockout On
Lockout Policy
Settings Number of Setting any
Retries until value
Locked
Lockout Setting any
Duration value
Lockout All
Target
Network Network Secure SSL On
Security Security Protocol Serverside TLS Version SSL3.0/TLS1.0:
Settings Settings Settings Disable
TLS1.1: Disable
TLS1.2: Enable
HTTP Secure Only
Security (HTTPS)
IPP Security Secure Only
(IPPS)
Clientside TLS Version SSL3.0/TLS1.0:
Settings Disable
TLS1.1: Disable
TLS1.2: Enable
Certificate On
Verification

6
Item Value
Management Authentication Settings Authentication General Authentication Local
Settings Settings Authentication
Local Local On
Authorization Authorization
Settings
Guest Guest Off
Authorization Authorization
Settings
Simple Login Simple Login Off
Settings
History History Settings Job Log History Recipient E-mail Address for
Settings E-mail Address the administrator
of the machine
Auto Sending On
Login History Login History On
Settings Recipient E-mail Address for
E-mail Address the administrator
of the machine
Auto Sending On
Device Log Device Log On
History Settings History
Recipient E-mail Address for
E-mail Address the administrator
of the machine
Auto Sending On
Secure Secure On
Communication Communicatio
Error Log n Error Log
History Settings History
Recipient E-mail Address for
E-mail Address the administrator
of the machine
Auto Sending On

7
Items changed on the machine
Item Value
System Menu System/Network Security Level Very High
Internet Internet Browser Off
For the procedures for changing the settings, refer to the machine OPERATION GUIDE and Command Center
RX User Guide.
After changing the settings, run [Software verification] in the system menu to verify that the machine operates
correctly. Periodically perform [Software verification] after installation as well.
After installing the security kit, you can change the security password as well as the method for overwriting the
entire hard disk.
Refer to page 10 for the procedures.
The administrator of the machine should periodically store the histories, and check each history to make sure
there was no unauthorized access or abnormal operation.
Grant regular users permission based on your company rules, and promptly delete any user accounts that stop
being used due to retirement or other reasons.

8
KDE-02/2017

You might also like