Savin 4800WD User manual

i
Manuals for This Machine
The following manuals describe the operational procedures of this machine. For
particular functions, see the relevant parts of the manual.
Note
❒Manuals provided are specific to machine type.
❒Adobe Acrobat Reader / Adobe Reader is necessary to view the manuals as
a PDF file
❒Two CD-ROMs are provided:
• CD-ROM 1 “Operating Instructions”
• CD-ROM 2 “Scanner Driver and Utilities”
❖
❖❖
❖General Settings Guide
Provides an overview of the machine and describes System Settings (such as
Tray Paper Settings), Document Server functions, and troubleshooting.
Refer to this manual for Address Book procedures such as registering e-mail
addresses and user codes.
❖
❖❖
❖Security Reference (this manual)
This manual is for administrators of this machine. It describes security func-
tions that the administrators can use to protect data from being tampered, or
prevent the machine from unauthorized use. Also refer to this manual for the
procedures for registering administrators, as well as setting user and admin-
istrator authentication.
❖
❖❖
❖Network Guide (PDF file - CD-ROM1)
Provides information about configuring and operating the scanner (Type 480
) in a network environment.
For details about network settings of the scanner (RW480) and printer
(RW480), see the manual that comes with the related option.
❖
❖❖
❖Copy Reference
Describes operations, functions, and troubleshooting for the machine's copier
function.
❖
❖❖
❖Scanner Reference (Scanner Unite Type 480) (PDF file - CD-ROM1)
Describes operations, functions, and troubleshooting for the machine's scan-
ner function.
DolC2_EN_Sec_F_FM.book Page i Thursday, February 24, 2005 7:10 PM

ii
❖
❖❖
❖Manuals for DeskTopBinder Lite
DeskTopBinder Lite is a utility included on the CD-ROM labeled “Scanner
Driver and Utilities”.
•DeskTopBinder Lite Setup Guide (PDF file - CD-ROM2)
Describes installation of, and the operating environment for DeskTop-
Binder Lite in detail. This guide can be displayed from the [Setup]display
when DeskTopBinder Lite is installed.
•DeskTopBinder Lite Introduction Guide (PDF file - CD-ROM2)
Describes operations of DeskTopBinder Lite and provides an overview of
its functions. This guide is added to the [Start]menu when DeskTopBinder
Lite is installed.
•Auto Document Link Guide (PDF file - CD-ROM2)
Describes operations and functions of Auto Document Link installed with
DeskTopBinder Lite. This guide is added to the [Start]menu when Desk-
TopBinder Lite is installed.
❖
❖❖
❖Other manuals
•Manuals for Printer (RW480) function
•Manuals for Scanner (RW480) function
DolC2_EN_Sec_F_FM.book Page ii Thursday, February 24, 2005 7:10 PM

iii
TABLE OF CONTENTS
Manuals for This Machine ......................................................................................i
How to Read This Manual .....................................................................................1
1. Getting Started
Enhanced Security.................................................................................................3
Glossary .....................................................................................................................4
Security Measures Provided by this Machine.....................................................5
Preventing Information Leaks ....................................................................................5
Preventing Unauthorized Operation...........................................................................6
Enhanced Network Security.......................................................................................7
2. Preventing Information Leaks
Specifying Access Permission for Stored Files .................................................9
Assigning Users and Access Permission for Stored Files .......................................10
Assigning the User and the Access Permission for the User’s Stored Files ............ 11
Specifying Passwords for the Stored Files...............................................................14
Unlocking Files.........................................................................................................15
Preventing Data Leaks Due to Unauthorized Transmission............................16
Restrictions on Destinations.....................................................................................16
Protecting the Address Book .............................................................................18
Address Book Access Permission ...........................................................................18
Encrypting the Data in the Address Book ................................................................20
Overwriting the Data on the Hard Disk ..............................................................22
“Auto Erase Memory Setting”...................................................................................22
“Erase All Memory” ..................................................................................................25
3. Preventing Unauthorized Use of Functions and Settings
Preventing Modification of Machine Settings ...................................................27
Limiting Available Functions ..............................................................................28
Specifying Which Functions are Available ...............................................................28
4. Enhanced Network Security
Preventing Unauthorized Access.......................................................................31
Enabling/Disabling Protocols ...................................................................................31
Access Control .........................................................................................................32
Encrypting Transmitted Passwords...................................................................34
Driver Encryption Key ..............................................................................................34
IPP Authentication Password...................................................................................36
Protection Using Encryption ..............................................................................37
SSL (Secure Sockets Layer) Encryption..................................................................38
User Settings for SSL (Secure Sockets Layer) ........................................................42
Setting the SSL / TLS Encryption Mode...................................................................42
SNMPv3 Encryption .................................................................................................44
DolC2_EN_Sec_F_FM.book Page iii Thursday, February 24, 2005 7:10 PM

iv
5. Management Based on Authentication and Access Control
The Management Function .................................................................................47
Administrators and Users ...................................................................................48
Administrator ............................................................................................................48
User..........................................................................................................................49
Enabling Authentication......................................................................................50
Administrator Authentication ....................................................................................50
User Authentication..................................................................................................51
Authentication Information Stored in the Address Book................................. 59
Specifying Authentication Information to Log on......................................................59
If User Authentication Has Been Specified .......................................................61
User Code Authentication (Using the Control Panel)...............................................61
Login (Using the Control Panel) ...............................................................................61
Log Off (Using the Control Panel) ............................................................................62
Login (Using Web Image Monitor) ...........................................................................62
Log Off (Using Web Image Monitor) ........................................................................62
Auto Logout..............................................................................................................63
Menu Protect ........................................................................................................64
Menu Protect............................................................................................................64
6. Specifying the Administrator/Security Functions
The Roles of Administrators...............................................................................67
Administrator Authentication .............................................................................69
Administrator Authentication ....................................................................................70
Registering the Administrator...................................................................................72
Logging on Using Administrator Authentication .......................................................73
Logging off Using Administrator Authentication .......................................................74
Changing the Administrator......................................................................................75
Specifying the Extended Security Functions....................................................76
Changing the Extended Security Functions .............................................................76
Settings ....................................................................................................................77
Limiting Machine Operation to Customers Only ..............................................80
Settings ....................................................................................................................80
7. Troubleshooting
Authentication Does Not Work Properly ...........................................................83
A Message Appears.................................................................................................83
Machine Cannot Be Operated.................................................................................. 85
DolC2_EN_Sec_F_FM.book Page iv Thursday, February 24, 2005 7:10 PM

v
8. Appendix
Operations by the Supervisor.............................................................................87
Logging on as the Supervisor ..................................................................................87
Logging off as the Supervisor ..................................................................................88
Changing the Supervisor..........................................................................................88
Resetting an Administrator’s Password ...................................................................89
Machine Administrator Settings.........................................................................91
System Settings .......................................................................................................91
Copier/Document Server Features ..........................................................................93
Scanner Features.....................................................................................................93
Settings via Web Image Monitor ..............................................................................94
Settings via SmartDeviceMonitor for Admin.............................................................95
Network Administrator Settings .........................................................................96
System Settings .......................................................................................................96
Scanner Features.....................................................................................................97
Settings via Web Image Monitor ..............................................................................97
Settings via SmartDeviceMonitor for Admin.............................................................99
File Administrator Settings ...............................................................................100
System Settings .....................................................................................................100
Settings via Web Image Monitor ............................................................................100
User Administrator Settings .............................................................................101
System Settings .....................................................................................................101
Settings via Web Image Monitor ............................................................................101
Settings via SmartDeviceMonitor for Admin...........................................................102
The Available Functions for Using the Files Stored in Document Server....103
Settings That Can Be Specified In the Address Book............................................104
User Settings......................................................................................................107
Copier/Document Server Features ........................................................................107
Scanner Features...................................................................................................109
System Settings .....................................................................................................110
Web Image Monitor Setting....................................................................................114
Functions That Require Options ......................................................................120
INDEX....................................................................................................... 121
DolC2_EN_Sec_F_FM.book Page v Thursday, February 24, 2005 7:10 PM

vi
DolC2_EN_Sec_F_FM.book Page vi Thursday, February 24, 2005 7:10 PM

1
How to Read This Manual
Symbols
The following set of symbols is used in this manual.
R
WARNING:
This symbol indicates a potentially hazardous situation that might result in
death or serious injury when you misuse the machine without following the in-
structions under this symbol. Be sure to read the instructions, all of which are de-
scribed in the Safety Information section.
R
CAUTION:
This symbol indicates a potentially hazardous situation that might result in mi-
nor or moderate injury or property damage that does not involve personal injury
when you misuse the machine without following the instructions under this
symbol. Be sure to read the instructions, all of which are described in the Safety
Information section.
* The statements above are notes for your safety.
Important
If this instruction is not followed, paper might be misfed, originals might be
damaged, or data might be lost. Be sure to read this.
Preparation
This symbol indicates information or preparations required prior to operating.
Note
This symbol indicates precautions for operation, or actions to take after abnor-
mal operation.
Limitation
This symbol indicates numerical limits, functions that cannot be used together,
or conditions in which a particular function cannot be used.
Reference
This symbol indicates a reference.
[]
Keys that appear on the machine's display panel.
[]
Keys and buttons that appear on the computer's display.
{}
Keys built into the machine's control panel.
{}
Keys on the computer's keyboard.
DolC2_EN_Sec_F_FM.book Page 1 Thursday, February 24, 2005 7:10 PM

2
DolC2_EN_Sec_F_FM.book Page 2 Thursday, February 24, 2005 7:10 PM

3
1. Getting Started
Enhanced Security
This machine's security function can be enhanced through the management of
the machine and its users using the improved authentication functions.
By specifying access limits on the machine’s functions and the documents and
data stored in the machine, you can prevent information leaks and unauthorized
access.
Data encryption can prevent unauthorized data access and tampering via the
network.
❖
❖❖
❖Authentication and Access Limits
Using authentication, administrators manage the machine and its users. To
enable authentication, information about both administrators and users must
be registered in order to authenticate users via their login user names and
passwords.
Four types of administrator manage specific areas of machine usage, such as
settings and user registration.
Access limits for each user are specified by the administrator responsible for
user access to machine functions and documents and data stored in the ma-
chine.
Reference
For details, see p.67 “The Roles of Administrators”.
❖
❖❖
❖Encryption Technology
This machine can establish secure communication paths by encrypting trans-
mitted data and passwords.
DolC2_EN_Sec_F_FM.book Page 3 Thursday, February 24, 2005 7:10 PM

Getting Started
4
1
Glossary
❖
❖❖
❖Administrator
Administrators manage a specific area of machine usage, such as settings or
user registration.
There are four types of administrator: user administrator, network adminis-
trator, machine administrator, and file administrator. One person can act as
more than one type of administrator.
Basically, administrators make machine settings and manage the machine;
they cannot perform normal operations, such as copying.
❖
❖❖
❖User
A user performs normal operations on the machine, such as copying.
❖
❖❖
❖File Creator (Owner)
This is a user who can store files in the machine and authorize other users to
view, edit, or delete those files.
❖
❖❖
❖Registered User
This is a user whose personal information is registered in the address book.
The registered user is the user who knows the login user name and password.
❖
❖❖
❖Administrator Authentication
Administrators are authenticated by means of the login user name and login
password supplied by the administrator when specifying the machine’s set-
tings or accessing the machine over the network.
❖
❖❖
❖User Authentication
Users are authenticated by means of the login user name and login password
supplied by the user when specifying the machine’s settings or accessing the
machine over the network.
❖
❖❖
❖Login
This action is required for administrator authentication and user authentica-
tion. Enter your login user name and login password on the machine’s control
panel.
A login user name and login password may also be supplied when accessing
the machine over the network or using such utilities as Web Image Monitor
and SmartDeviceMonitor for Admin.
❖
❖❖
❖Logout
This action is required with administrator and user authentication. This ac-
tion is required when you have finished using the machine or changing the
settings.
DolC2_EN_Sec_F_FM.book Page 4 Thursday, February 24, 2005 7:10 PM

Security Measures Provided by this Machine
5
1
Security Measures Provided by this
Machine
Preventing Information Leaks
❖
❖❖
❖Protecting Stored Files from Unauthorized Access
You can specify who is allowed to use and access scanned files and the files
in Document Server. You can prevent activities such as the printing of stored
files by unauthorized users.
Reference
For details, see p.9 “Specifying Access Permission for Stored Files”.
❖
❖❖
❖Protecting Stored Files from Theft
You can specify who is allowed to use and access scanned files and the files
in Document Server. You can prevent such activities as the sending and
downloading of stored files by unauthorized users.
Reference
For details, see p.9 “Specifying Access Permission for Stored Files”.
❖
❖❖
❖Preventing Data Leaks Due to Unauthorized Transmission
You can specify in the address book which users are allowed to send files us-
ing the scanner function.
You can also limit the direct entry of destinations to prevent files from being
sent to destinations not registered in the address book.
Reference
For details, see p.16 “Preventing Data Leaks Due to Unauthorized Trans-
mission”.
❖
❖❖
❖Protecting Registered Information in the Address Book
You can specify who is allowed to access the data in the address book. You
can prevent the data in the address book being used by unregistered users.
To protect the data from unauthorized reading, you can also encrypt the data
in the address book.
Note
❒To encrypt the data in the address book, the machine must have the scan-
ner function.
Reference
For details, see p.18 “Protecting the Address Book”.
DolC2_EN_Sec_F_FM.book Page 5 Thursday, February 24, 2005 7:10 PM

Getting Started
6
1
❖
❖❖
❖Overwriting the Data on the Hard Disk
You can overwrite data on the hard disk.
Reference
For details, see p.22 “Overwriting the Data on the Hard Disk”.
Preventing Unauthorized Operation
❖
❖❖
❖Preventing Modification or Deletion of Stored Data
You can specify who is allowed to access stored scan files and files stored in
Document Server.
You can permit selected users who are allowed to access stored files to modify
or delete the files.
Reference
For details, see p.9 “Specifying Access Permission for Stored Files”.
❖
❖❖
❖Preventing Modification of Machine Settings
The machine settings that can be modified depend on the type of administra-
tor account.
Register the administrators so that users cannot change the administrator set-
tings.
Reference
For details, see p.27 “Preventing Modification of Machine Settings”.
❖
❖❖
❖Limiting Available Functions
To prevent unauthorized operation, you can specify who is allowed to access
each of the machine’s functions.
Reference
For details, see p.28 “Limiting Available Functions”.
DolC2_EN_Sec_F_FM.book Page 6 Thursday, February 24, 2005 7:10 PM

Security Measures Provided by this Machine
7
1
Enhanced Network Security
❖
❖❖
❖Preventing Unauthorized Access
You can limit IP addresses or disable ports to prevent unauthorized access
over the network and protect the address book, stored files, and default set-
tings.
Reference
For details, see p.31 “Preventing Unauthorized Access”.
❖
❖❖
❖Encrypting Transmitted Passwords
Prevent login passwords, group passwords for PDF files, and IPP authentica-
tion passwords being revealed by encrypting them for transmission.
Also, encrypt the login password for administrator authentication and user
authentication.
Note
❒To encrypt transmitted passwords, the machine must have the scanner
function.
Reference
For details, see p.34 “Encrypting Transmitted Passwords”.
❖
❖❖
❖Safer Communication Using SSL
When you access the machine using a Web browser or IPP, you can establish
encrypted communication using SSL. When you access the machine using an
application such as SmartDeviceMonitor for Admin, you can establish en-
crypted communication using SNMPv3 or SSL.
To protect data from interception, analysis, and tampering, you can install a
server certificate in the machine, negotiate a secure connection, and encrypt
transmitted data.
Note
❒To establish encrypted communication using SSL, the machine must have
the scanner function.
Reference
For details, see p.37 “Protection Using Encryption”.
DolC2_EN_Sec_F_FM.book Page 7 Thursday, February 24, 2005 7:10 PM

Getting Started
8
1
DolC2_EN_Sec_F_FM.book Page 8 Thursday, February 24, 2005 7:10 PM

9
2.
Preventing Information Leaks
Specifying Access Permission for Stored
Files
You can specify who is allowed to access stored scan files and files stored in the
Document Server.
You can prevent activities such as the sending of stored files by unauthorized users.
❖
❖❖
❖Access Permission
To limit the use of stored files, you can specify four types of access permission.
Note
❒Files can be stored by any user who is allowed to use the Document Server
or scanner function.
❒Using Web Image Monitor, you can check the content of stored files. For
details, see the Web Image Monitor Help.
❒The default access permission for the file creator (owner) is “Read-only”.
❖
❖❖
❖Password for Stored Files
Passwords for stored files can be specified by the file creator (owner) or file
administrator.
You can obtain greater protection against the unauthorized use of files.
Read-only In addition to checking the content of and in-
formation about stored files, you can also
send the files.
Edit You can change the print settings for stored
files. This includes permission to view files.
Edit / Delete You can delete stored files.
This includes permission to view and edit
files.
Full Control You can specify the user and access permis-
sion.This includes permission to view, edit,
and edit / delete files.
DolC2_EN_Sec_F_FM.book Page 9 Thursday, February 24, 2005 7:10 PM

Preventing Information Leaks
10
2
Assigning Users and Access Permission for Stored Files
This can be specified by the file creator (owner) or file administrator.
Specify the users and their access permissions for each stored file.
By making this setting, only users granted access permission can access stored
files.
Preparation
For details about logging on with administrator authentication, see p.73
“Logging on Using Administrator Authentication”.
For details about logging off with administrator authentication, see p.74
“Logging off Using Administrator Authentication”.
Important
❒If files become inaccessible, reset their access permission as the file creator
(owner). This can also be done by the file administrator. If you want to access
a file but do not have access permission, ask the file creator (owner).
A
AA
APress the {
{{
{Document Server}
}}
}key.
B
BB
BSelect the file.
C
CC
CPress [File Management].
D
DD
DPress [Change Acs. Priv.].
E
EE
EPress [Program/Change/Delete].
F
FF
FPress [New Program].
DolC2_EN_Sec_F_FM.book Page 10 Thursday, February 24, 2005 7:10 PM

Specifying Access Permission for Stored Files
11
2
G
GG
GSelect the users or groups you want to assign permission to.
You can select more than one users.
By pressing [All Users], you can select all the users.
H
HH
HPress [Exit].
I
II
ISelect the user who you want to assign an access permission to, and then
select the permission.
Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Con-
trol].
J
JJ
JPress [Exit].
K
KK
KPress [OK].
L
LL
LPress [OK].
Assigning the User and the Access Permission for the User’s
Stored Files
This can be specified by the file creator (owner) or user administrator.
Specify the users and their access permission to files stored by a particular user.
Only those users granted access permission can access stored files.
This makes the management of access permission easier than it is when permis-
sion is specified for each stored file.
Preparation
For details about logging on with administrator authentication, see p.73
“Logging on Using Administrator Authentication”.
For details about logging off with administrator authentication, see p.74
“Logging off Using Administrator Authentication”.
Important
❒If files become inaccessible, be sure to enable the user administrator, and then
reset the access permission for the files in question.
DolC2_EN_Sec_F_FM.book Page 11 Thursday, February 24, 2005 7:10 PM

Preventing Information Leaks
12
2
A
AA
APress the {
{{
{User Tools/Counter}
}}
}key.
B
BB
BPress [System Settings].
C
CC
CPress [Administrator Tools].
D
DD
DPress [Address Book Management].
If it does not appear, press [T
TT
TNext].
E
EE
ESelect the user or group.
F
FF
FPress [Protection].
G
GG
GUnder "Protect File(s)", press [Program/Change/Delete]for "Permissions for
Users/Groups".
If it does not appear, press [T
TT
TNext].
H
HH
HPress [New Program].
DolC2_EN_Sec_F_FM.book Page 12 Thursday, February 24, 2005 7:10 PM

Specifying Access Permission for Stored Files
13
2
I
II
ISelect the users or groups to register.
You can select more than one users.
By pressing [All Users], you can select all the users.
J
JJ
JPress [Exit].
K
KK
KSelect the user who you want to assign an access permission to, and then
select the permission.
Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Con-
trol].
L
LL
LPress [Exit].
M
MM
MPress [OK].
N
NN
NPress [Exit].
O
OO
OPress the {
{{
{User Tools/Counter}
}}
}key.
DolC2_EN_Sec_F_FM.book Page 13 Thursday, February 24, 2005 7:10 PM

Preventing Information Leaks
14
2
Specifying Passwords for the Stored Files
This can be specified by the file creator (owner) or file administrator.
Specify passwords for the stored files.
Provides increased protection against unauthorized use of files.
Preparation
For details about logging on with administrator authentication, see p.73
“Logging on Using Administrator Authentication”.
For details about logging off with administrator authentication, see p.74
“Logging off Using Administrator Authentication”.
A
AA
APress the {
{{
{Document Server}
}}
}key.
B
BB
BSelect the file.
C
CC
CPress [File Management].
D
DD
DPress [Change Password].
E
EE
EEnter the password using the number keys.
You can use 4 to 8 numbers as the password for the stored file.
F
FF
FPress [Change]at the bottom of the screen.
G
GG
GConfirm the password by re-entering it using the number keys.
H
HH
HPress [#].
I
II
IPress [OK].
J
JJ
JPress [OK].
DolC2_EN_Sec_F_FM.book Page 14 Thursday, February 24, 2005 7:10 PM
Other manuals for 4800WD
1
Table of contents
Other Savin All In One Printer manuals

Savin
Savin 9330 User manual

Savin
Savin Aficio 2045e User manual

Savin
Savin C6055 Technical manual

Savin
Savin 2235 User manual

Savin
Savin 2535P User instructions

Savin
Savin C2410 User manual

Savin
Savin Fax Option Type 1027 User manual

Savin
Savin 8025e User manual

Savin
Savin 3650 User manual

Savin
Savin Aficio 2045e User manual