Skip to main text

Effect and Impact of Security Settings

By changing the security settings to suit your environment, you can implement security measures to counter the expected threats for each environment type. Some functions of the machine may be restricted as shown below.

  • 1. Intranet And Internet Connection
  • 2. Direct Internet Connection
  • 3. Internet Connection Prohibited
  • 4. Private (Home) Network
  • 5. Public Network
  • 6. Highly Confidential Info. Environment

*The security settings that are configured differ according to the environment type, even for the same security measures.

Examples of Restricted Functions:

Security Measure Examples of Restricted Functions 1 2 3 4 5 6
Basic measures Disabling the firmware update notification settings
Restricting print methods Printing using LPD or RAW
Configuring the encryption / authentication algorithms / protocols Connecting with information devices using conventional encryption/protocols
Restricting methods for retrieving / configuring device information Using the Remote UI

List of Settings

For details on the security settings that are configured, see the list of settings indicated below.