Ricoh LD533CG Betriebsanleitung Seite 16

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 47
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 15
CRP-C0266-01
11
5) Management Function of Machine Control Data
> Administrator (File Administrator)
+ Query the date and time of system clock
+ Query Service Mode Lock Function
> Administrator (Machine Administrator)
+ Query and modify Number of Attempts before Lockout
+ Query and modify Settings for Lockout Release Timer
+ Query and modify Lockout Time
+ Query and modify the date and time of system clock
+ Query and modify Lockout Flag of supervisor
+ Query and newly create HDD Encryption Keys
+ Query audit logs and delete all logs
+ Query and modify Service Mode Lock Function
> Administrator (User Administrator)
+ Query and specify Minimum Password Length
+ Query and specify Password Complexity
+ Query the date and time of system clock
+ Query Service Mode Lock Function
+ Query and modify Lockout Flags for general users
+ Query Destination Information for Deliver to Folder
> Administrator (Network Administrator)
+ Query the date and time of system clock
+ Query Service Mode Lock Function
> Supervisor
+ Query the date and time of system clock
+ Query Service Mode Lock Function
+ Query and modify Lockout Flags for administrators
> General User
+ Query the date and time of system clock
+ Query Service Mode Lock Function
+ Query Destination Information for Deliver to Folder
As mentioned above, all the Security Management Functions 1) to 5) properly permit the
available functions according to the user role.
Recording implemented actions of the Security Management Functions in audit logs enables
re-detection of security breaches for the Security Management Functions as auditable events.
Therefore, T.ABUSE_SEC_MNG, in which users not authorised for Security Management
Functions may abuse, is countered by the user identification and authentication, the security
management, and the audit.
(4) Countermeasures against the threat T.SALVAGE
T.SALVAGE, by which attackers may remove the HDD from the TOE and disclose document
data, is countered by the prevention of disclosing the memory storage data and the audit.
Seitenansicht 15
1 2 ... 11 12 13 14 15 16 17 18 19 20 21 ... 46 47

Kommentare zu diesen Handbüchern

Keine Kommentare