This setting is used when you want to set a more strict password or when users who
have not logged in for a specified period of time are to be deleted.
Enables this option when you want to make your existing password settings more strict.
Changes the setting of the administrator password.
Specifies the number of characters for the password to be entered.
When setting a password, make sure that it contains at least one or more numbers,
uppercase and lowercase letters of the alphabet, and symbols.
The characters that can be entered are as follows.
Check if the password you set before the change is the same as the password after
the change, and if it is the same, you will not be able to register it. (However,
if "Minimum Password Length" is 0, this setting cannot be used.)
Changes the setting of the user password.
Specifies the number of characters for the password to be entered.
When setting a password, make sure that it contains at least one or more numbers,
uppercase and lowercase letters of the alphabet, and symbols.
The characters that can be entered are as follows.
Check if the password you set before the change is the same as the password after
the change, and if it is the same, you will not be able to register it. (However,
if "Minimum Password Length" is 0, this setting cannot be used.)
Deletes users who have not logged in to the machine for the specified period from
the machine’s user list.
Prohibits the reregistration of user accounts (login names) once they have been deleted.
This setting can be used to prohibit reregistration for a certain period of time or
for no period of time.
After enabling the setting, set the period of time to prohibit reregistration. If
you select "Undefined", you can prohibit reregistration without setting a period.
If [Case sensitivity of login name is enabled.] is enabled in the authentication settings,
it will be judged case sensitive. If it is disabled, it will be judged without distinguishing
case.
Example: Deleted login name: ABC, login name to be registered: Abc
If [Case sensitivity of login name is enabled.] is enabled in the authentication settings,
the login name Abc can be registered because bc is in lower case. If it is disabled,
Abc cannot be registered.
Use this setting to display the login screen and require login in order to access
the Web server.
The administrator password can be changed.
When you change the password, be sure to remember the new password.
(It is recommended that you periodically change the administrator password.)
You can select settings to cancel print jobs that are not print hold jobs, or force
all print jobs to be held.
When [Restrict Print Jobs other than the current Print Hold Job] is turned ON, the
settings below can be selected.
Item | Description |
---|---|
Force Retention |
This setting forcibly sets all print jobs as print hold jobs, even jobs for which print hold is not selected. |
Disable Job |
Prohibit all print jobs other than print hold jobs. |
If the job is interrupted due to a paper jam, etc., the job is automatically deleted
after the time set in "Time until automatic deletion" has elapsed.
Set the time after stopping a job to automatically deleting the job.
You can reject the request from external sites.
When the machine starts up, the firmware is inspected, and if any damage is found,
it automatically recovers to the state before the damage.
The default administrator is displayed at login. Set whether to apply the security
policy on this machine.
Set whether to perform forced access control. Once set, access to all files inside
the machine will be forcibly controlled.
Set to show/hide the completion screen of the job status screen.
Sets the contents to be displayed in the job status. For printing, you can choose
to show or hide the file name.
For the various major ports used in the system, set the prohibition/permission and
port number, and tap the [Store] key.
The ports that can be set are as follows.
Server Port | Factory default settings | Client Port | Factory default settings | ||
---|---|---|---|---|---|
Port Control | Enable / Disable | Port Control | Enable / Disable | ||
HTTP |
80 |
Enabled |
HTTP |
Enabled |
|
HTTPS |
443 |
Enabled |
HTTPS |
Enabled |
|
FTP Print |
21 |
Enabled |
FTP |
Enabled |
|
Raw Print |
9100 |
Enabled |
FTPS |
Enabled |
|
LPD |
515 |
Enabled |
SMTP |
Enabled |
|
IPP |
631 |
Enabled |
SMTP-SSL/TLS |
Enabled |
|
IPP-SSL/TLS |
443 |
Disabled |
POP3 |
Enabled |
|
Tandem Output Receive |
50001 |
Disabled |
POP3-SSL/TLS |
Enabled |
|
SNMPD |
161 |
Enabled |
LDAP |
Enabled |
|
SMB |
Disable |
LDAP-SSL/TLS |
Enabled |
||
SMTP |
Enabled |
SMB |
Enabled |
||
WSD |
Enabled |
SNTP |
Enabled |
||
Print Release |
53000 |
Enabled |
mDNS |
Enabled |
|
Sharp OSA(Expansion Platform) |
Tandem Output Send |
Disabled |
|||
|
10080 |
Enabled |
Data Backup (Send) |
Enabled |
|
|
1443 |
Enabled |
Print Release |
Enabled |
|
IPP INFRA |
Enabled |
||||
syslog |
514 |
Enabled |
|||
syslog-SSL/TLS |
6514 |
Enabled |
You can set the filter by an IP or MAC address to prevent an unauthorized access to
the machine via a network.
Set the IP or MAC address filter and tap the [Store] key.
This option sets an IP address.
You can specify whether to allow or prohibit access to the machine from the IP address
you set.
This option sets a MAC address.
It allows access to the machine from the MAC address you set.
This section explains how to protect the machine by partially blocking communications
with an attempt to attack the machine via network.
If the multifunction device receives more than the set number of communications from
the same IP address within the set period, communication from that IP address is prohibited.
IP addresses whose communication is prohibited are recorded in the audit log and registered
as a reception refusal list.
In addition, those IP addresses are notified by e-mail to the addresses in the e-mail
alert message list 1/2 and dealer e-mail alert message list.
The removal of the IP address from the rejection list is also recorded in the audit
log.
The maximum number of IP addresses that can be registered in the reception rejection
list is 100, and when the number reaches 100, external connection requests for multifunction
devices will not be accepted.
Item | Description |
---|---|
IP Address |
Displays the IP address that is rejected. The default setting is "OFF". |
Start Time of Incoming Packet Denials |
Displays the date and time when reception refusal started. |
Total |
Displays the number registered in the reception rejection list.
|
This setting is available when the virus detection kit is installed. Specifies the
settings for virus detection.
Specifies whether to use the virus scan function.
When the input/output data of the machine is generated, the corresponding data is
scanned for viruses.
Scans for viruses at the specified date and time.
Perform this setting when you want to scan for viruses immediately.
Specifies the schedule for virus scan.
When this setting is enabled, a daily virus scan will be performed.
(Start Time)
Sets the time to start scanning.
When this setting is enabled, a virus scan will be performed every week on the specified
day and time.
(Day of the Week)
Sets the day of the week to start scanning.
When this setting is enabled, virus scan will be performed on the specified day and
time.
(Date)
Sets the date when the scan will start.
For months that have days that do not exist (for example, February and April when
31 is set), run at the end of the month.
Select the data to be scanned for viruses.
Perform this setting when you want to update the virus scan definition files immediately
SSL/TLS can be used for data transmission over a network.
SSL/TLS is a protocol that enables the encryption of information communicated over
a network. Encrypting data makes it possible to transmit and receive sensitive information
safely.
Data encryption can be set by the following protocols.
The encryption strength can be set to one of three levels.
Displays the status of the certificate required for SSL/TLS communication. Click the
[Select] key to install the certificate.
If the device certificate is installed, click the [Show] key to display the certificate
information.
Click the [Select] key to display the device certificates that have already been registered.
Select from them.
IPsec can be used for data transmission/reception on a network.
When IPsec is used, data can be sent and received safely without the need to configure
settings for IP packet encryption in a Web browser or other higher-level application.
When enabling this settings, take the following notes.
Sets whether to use IPsec for transmission.
Enter the Pre-Shared Key to be used for IKEv1.
Set the SA lifetime.
Set the SA lifetime size.
Set the IKE lifetime.
The registered IPsec rules are displayed.
To add a new rule, click the [Add] key.
To delete a rule, select the rule you want to delete and click the [Delete] key.
Enter a name for the IPsec rule.
Set the priority level.
If there is a previously registered rule that is similar to the rule you want to create,
you can create the new rule based on the registered rule.
Set the type of IP address to be used on the machine and the port number (for IPv6,
set the port number / prefix length).
Set the destination IP address type and port number (for IPv6, set the port number
/ prefix length).
Set the protocol to be used.
Configure settings for the authentication method used for IPsec.
Configure settings for the authentication method used for IPsec.
Select to use ESP authentication.
Specify whether or not communication that does not use ESP is allowed.
Select to use AH authentication.
Specify whether or not communication that does not use AH is allowed.
Select Hidden Pattern Print Setting.
The hidden pattern print function is effective at preventing unauthorized copying
as the specified text emerges in the background on output sheets.
Item | Description |
---|---|
Hidden Pattern Print Setting |
A pattern print can be printed with this settings.
|
Exposure |
Select an exposure.
|
Font Size |
Select a font size.
|
Angle |
Select a character angle.
|
Font Style |
Select the standard or italic character settings.
|
Camouflage Pattern |
Set a camouflage pattern.
|
Print Method |
Select a character display pattern.
|
Item | Description |
---|---|
Pre-Set Word |
Allows you to select a preset character string. The following character strings can be selected.
|
Pre-set Text |
Select a stored preset character string. This setting is ignored if [Direct Entry] is enabled.
|
Information Printing |
Enables simultaneous printing of the following information sets.
|
Disable Direct Entry |
Set whether to enable direct input of print characters for tint block printing in each mode.
|
Set a character contrast.
The black can be set in any of 9 levels.
Stores the user-created print characters. Up to 30 characters can be stored.
Prints the tracking information at the top or bottom of output pages when print job
is executed.
This function forcibly prints the pre-specified traceable information to prevent an
unauthorized copy.
Item | Description |
---|---|
Tracking Information Print Setting |
Set this option to print the tracking information.
|
Print Information |
The following information can be printed.
|
Position |
Set a print position on each page.
|
Font Size |
Set the size of the characters to be printed.
|
Select the Job to Print |
Set a job to print the tracking information.
|
Logs are created and saved for various events relating to security functions and settings.
Audit logs are created and saved in English. However, setting values such as filenames
which are input from external sources are saved as-is.
Audit logs which have been saved in the internal storage can be exported by an administrator
to a PC as TSV files.
You can select either the internal storage or an external server as the destination
for saving audit logs.
"Audit Log" can be carried out as follows.
In "Settings (administrator)", select [System Settings] → [Security Settings] → [Audit
Log]
Select "Security Control", "Storage/Send Settings" or "Save/Delete Audit Log".
"Storage/Send Settings" can be carried as follows.
In "Settings (administrator)", select [System Settings] → [Security Settings] → [Audit
Log]→ [Storage/Send Settings]
Then make the storage and transmission settings.
"Save/Delete Audit Log" can be carried out as follows.
In "Settings (administrator)", select [System Settings] → [Security Settings] → [Audit
Log]→ [Save/Delete Audit Log]
Select "Save Audit Log" or "Delete Audit Log".
If the audit log is saved to an external server, the audit log is temporarily saved
in the buffer area reserved in the internal storage until the transmission to the
external server is successful.
Event name | Date & Time *1 |
Operation I/F *2 |
Login Name | Result *3 |
Additional Information |
---|---|---|---|---|---|
Audit Start |
Yes |
N/A |
N/A |
Yes |
Reasons for starting Normal start-up: power on, panel SW pressed, reboot, timer, network, other Other: security erase |
Audit End |
Yes |
N/A |
N/A |
Yes |
N/A |
Job Completion |
Yes |
Yes |
Job owner (SYSTEM) |
Yes |
Finished job name |
I&A Success |
Yes |
Yes |
The string entered as your login name |
N/A |
IP address of the login source 127.0.0.1 for the operation panel |
I&A Failure |
Yes |
Yes |
The string entered as the login name |
N/A |
IP address of the login source 127.0.0.1 for the operation panel |
Add User |
Yes |
Yes |
User who added |
Yes |
Added login name |
Login Terminated |
Yes |
Yes |
The string entered as your login name |
N/A |
Active termination/ Timeout |
Change Password |
Yes |
Yes |
The user who made the change |
Yes |
Login name of the user whose password has been changed |
Change Login Name |
Yes |
Yes |
The user who made the change |
Yes |
Login name after change |
Delete user |
Yes |
Yes |
User who deleted |
Yes |
Deleted login name (ALL if all users are deleted) |
Add Auth Group |
Yes |
Yes |
User who added |
Yes |
Added authority group name |
Change Role |
Yes |
Yes |
The user who made the change |
Yes |
|
Change Auth |
Yes |
Yes |
The user who made the change |
Yes |
Privilege changed settings Group Name |
Add Page Limit Group |
Yes |
Yes |
Users with additional functions |
Yes |
Name of the additional page limit group |
Delete Page Limit Group |
Yes |
Yes |
Users whose functions are deleted |
Yes |
Name of the deleted page limit group |
Change Page Limit |
Yes |
Yes |
Users who have changed the settings |
Yes |
Name of the changed page limit group |
Change Time Setting |
Yes |
Yes |
The user who made the change |
Yes |
N/A |
Change Setting |
Yes |
Yes |
User who made the change (“ByPolicy” when applying AD policy) |
Yes |
|
Firm Recovery |
Yes |
N/A |
N/A |
Yes |
|
Exec Rejection |
Yes |
N/A |
N/A |
Yes |
Distinguished name of firmware or embedded OSA app |
TLS, IPsec communication |
Yes |
N/A |
Users who are communicating |
N/A |
|
Modify AddrBook |
Yes |
Yes |
User who updated |
Yes |
|
Firm Update |
Yes |
Yes |
User who updated |
Yes |
|
Intrusion/Attack |
Yes |
N/A |
N/A |
Yes |
|
Release Denied Addr |
Yes |
Yes |
Users who have been released |
Yes |
Released IP address |
Invoke EAM App |
Yes |
N/A |
N/A |
Yes |
Starting Sharp OSA External Accounts Application Additional Information: IP Address and Application Name of Sharp OSA External Account Server |
CSRF Trial |
Yes |
Net |
N/A |
N/A |
Attacking IP address |
Enabling Embedded |
Yes |
Yes (N/A for firmware updates) |
Users who have activated the function (default administrator for installation and update via Application Portal, system for firmware update) for installation and update from Application Portal, "system" for firmware update) |
Yes |
|
Send External Dest |
Yes |
Yes |
Users who sent |
Yes |
Destination e-mail address/IP address/SMB folder path |
Web Push Print |
Yes |
Yes |
Users of the function |
Yes |
IP address from which the file was downloaded |
Change Service Setting |
Yes |
Yes |
Users who have changed the settings |
Yes |
Changed settings and their values |
Switch to service mode |
Yes |
Yes |
Service |
Yes |
N/A |
Running in service mode |
Yes |
Yes |
Service |
Yes |
Changed setting values |
Sharp OSA external |
Yes |
Yes |
The string entered as your login name |
Yes |
N/A |
Scheduled Virus Scan |
Yes |
N/A |
N/A |
Success/ Failure |
In case of failure, the reason
|
On-demand Virus Scan |
Yes |
Ope/Web |
Users who requested the scan to be performed |
Success/ Failure |
In case of failure, the reason
|
Virus Detection |
Yes |
N/A |
N/A |
Always "Success" |
One of the following
Data identification name (file name, etc., if obtainable. N/A if not possible) Identification name of the virus |
Auto Pattern Update |
Yes |
N/A |
N/A |
Success/ Failure |
In case of failure, the reason
|
On-demand |
Yes |
Ope/Web |
Users who requested the implementation of the update |
Success/ Failure |
In case of failure, the reason
|
Change Setting |
Yes |
Yes |
Users who have changed the setting values |
Success/ Failure |
Setting items and values for Web page (Virus Scan Setting) |
*1 The date and time when the event occurred is displayed in the extended format of ISO 8601.
*2 Either Ope/Web/sNet is displayed as the operation interface. However, if it is "N / A" in the table, it will be written as "N / A".
*3 Either Success / Failure will be displayed as the result of the event.
Import the certificate/private key.
Export the certificate/private key.
Shows the status of the certificate.
Enter the name to be used.
Enter the name of the organization.
Enter the name of the unit within the organization.
Enter the city or locality.
Enter the state or province.
Enter the country code.
Enter the sender's E-mail address.
Enter the start date and time for the certificate.
Enter the expiration date of the certificate.
Enter the Certificate Information.
Install the certificate.
Shows the status of the certificate.
Enter the name to be used.
Enter the name of the organization.
Enter the name of the unit within the organization.
Enter the city or locality.
Enter the state or province.
Enter the Subject Alternative Name (SAN).
Enter the country code.
Enter the sender's E-mail address.
Enter the start date and time for the certificate.
Enter the expiration date of the certificate.
Enter the Certificate Information.
Import the certificate.
Shows the status of the certificate.
Version 02a / bpb550pw_usr_02a_us