User manual KONICA MINOLTA MAGICOLOR 8650

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual KONICA MINOLTA MAGICOLOR 8650. We hope that this KONICA MINOLTA MAGICOLOR 8650 user guide will be useful to you.


KONICA MINOLTA MAGICOLOR 8650 : Download the complete user guide (5870 Ko)

You may also download the following manuals related to this product:

   KONICA MINOLTA MAGICOLOR 8650 ERGANZUNGEN (96 ko)
   KONICA MINOLTA MAGICOLOR 8650 annexe 1 (22968 ko)

Manual abstract: user guide KONICA MINOLTA MAGICOLOR 8650

Detailed instructions for use are in the User's Guide.

[. . . ] 1. 00 Contents Contents 1 Security 1. 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 Compliance with the ISO15408 Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 Operating Precautions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 INSTALLATION CHECKLIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3 Security Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4 Check Count Clear Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4 Data to be Protected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5 Precautions for Operation Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] Perform steps 8 and 9 once again to enter the correct Administrator Password. 8650 2-21 Administrator Operations 2 2. 8 Protecting Data in the HDD When access by the Administrator of the machine from the control panel through the Admin. Settings is authenticated, the machine enables the operation for setting and changing the HDD Lock Password. If the machine is equipped with the optional Security Kit SC-503, it enables the operation for setting and changing the Encryption Key and the operation for setting the Overwrite Priority Setting function. Should the HDD be removed unawares, the HDD Lock Password locks the HDD protecting data contained in the HDD. Furthermore, by setting the Encryption Key, the data stored in the HDD is encrypted, thereby protecting the data in the HDD. The HDD Lock Password and Encryption Key entered are displayed as "*. " The Overwrite Priority Setting function allows the setting of either "Encrypt Priority" or "OverwritePriority. " The default setting is "Encrypt Priority. " For details, see the table below. Mode Encrypt Priority Description In addition, writing is performed by enhancing strength of encryption of the data written in the HDD. The standard scheme is, however, applied to encryption of data to be written in the HDD. Select this function if an overwrite and delete operation that complies with the HDD data erasure standard is desired. OverwritePriority 2 Note Do not set any number that can easily be guessed from birthdays, employee identification numbers, and the like for the HDD Lock Password and Encryption Key. Make sure that nobody but the Administrator of the machine comes to know the HDD Lock Password or Encryption Key. If only the Encryption Key is to be set while the machine is being used without setting the HDD Lock Password or Encryption Key, the Service Engineer must perform some setting procedures in advance. For more details, ask the Service Representative. 2 Reminder When the HDD Lock Password is set, HDD verification is carried out when the machine is started. If the HDD has been improperly replaced with another, or if the HDD Lock Password is yet to be set, a message appears that tells that there is a mismatch between the HDD and the HDD Lock Password. That is, if the HDD is illegally removed or replaced with another, detection of a wrong HDD Lock Password five consecutive times will lock the authentication function. When an Encryption Key (encryption word) is set using HDD Encryption Setting, an Encryption Key with a key length of 128 bits is generated using the SHA-1 algorithm. The generated encryption key is used to encrypt or decrypt data through AES encryption algorithm. When the Encryption Key (encryption word) is set with the optional Security Kit SC-503 mounted on the machine, the encryption strength can be selected from among [Encrypt Priority] or [OverwritePriority]. For more details, see "Setting the Encryption Key (encryption word)" on page 2-27". 8650 2-22 Administrator Operations 2 2. 8. 1 Setting the HDD Lock Password 2 Note When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after turning it off. if there is no wait period between turning the main power switch off, then on again, the machine may not function properly. If it is absolutely necessary to leave the machine, be sure first to log off from the Admin. Settings. <Setting can be made only from the control panel> 0 For the procedure to call the Security Settings menu to the display, see steps 1 through 3 of "Setting the EnhancedSecurity" on page 2-8. Press the [, ] key to select [HDD Settings]. 1 2 3 4 Press the [Menu/Select] or [)] key. Press the [, ] key to select [RegisterHDDLockPW]. 5 6 Press the [Menu/Select] or [)] key. [. . . ] The Administrator Password entered during the authentication procedure is displayed as "*. " When the EnhancedSecurity is set to [ON], the number of times in which authentication fails is counted. 2 Note Make sure that none of the general users of the machine will know the Administrator Password. If the Administrator Password is forgotten, it must be set again by the Service Engineer. Contact your Technical Representative. 4. 2. 1 Backup 2 Reminder If the "Save the administrator password" check box is selected, the Administrator Password entered is stored in the PC being used. If you do not want the Administrator Password stored, clear the "Save the administrator password" check box. <From the PC> 1 2 3 Start the HDD Backup Utility. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE KONICA MINOLTA MAGICOLOR 8650




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual KONICA MINOLTA MAGICOLOR 8650 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.