This section introduces the security function of the Epson Devices.
Feature name |
Feature type |
What to set |
What to prevent |
---|---|---|---|
Setup for the administrator password |
Locks the system settings, such as connection setup for network or USB, detail setup for fax reception/transmission or transferring, and the user default settings. |
An administrator sets a password to the device. You can set or change from both Web Config and the printer's control panel. |
Prevent from illegally reading and changing the information stored in the device such as ID, password, network settings, and contacts. Also, reduce a wide range of security risks such as leakage of information for the network environment or security policy. |
Setup for access control |
Limits the functions that can be used on devices, such as print, scan, copy, and fax for each user. If you log on with a user account registered in advance, you are allowed to use certain functions. In addition, after logging on from the control panel, you will be logged off automatically if there is no activity for a certain period of time. |
Register any user account, and then select the function you want to allow, such as copy and scan. You can register up to 10 user accounts. |
The risk of leakage and unauthorized viewing of data can be reduced by minimizing the numbers of functions in accordance with the business content and the role of the user. |
Setup for external interface |
Controls the interface, such as USB port that connects to the device. |
Enable or disable the USB port for connecting external devices such as USB memory and USB connection with the computer. |
|
Setup for processing saved data |
Automatically erases job data temporarily stored in the built-in hard disc of the device. You can also safely erase all data stored in the hard disc. |
Set whether to automatically delete when the job is finished. You can also erase all the data if you want to discard the device. |
By overwriting with a specific pattern, you can prevent someone from restoring and using the data even if the hard disc is removed. |