Canon imageRunner 1133 Specifications Page 29

  • Download
  • Add to my manuals
  • Print
  • Page
    / 37
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 28
29
White Pa
p
er: Canon ima
g
eRUNNER ADVANCE Securit
y
Section 5 — Security Monitoring & Management Tools
Canon provides a number of tools to help organizations enforce their internal company policies and meet
regulatory requirements. Whether a single imageRUNNER ADVANCE system is deployed, or a fleet of
them, these solutions provide the ability to audit usage and limit access to features and functions enterprise-
wide—at the group and user-level.
5.1 – imageWARE Enterprise Management Console
imageWARE Enterprise Management Console (EMC) is a highly scalable web-based management utility
for administrators that delivers a streamlined, centralized point of control for all devices installed across
enterprises. The software makes it easier for organizations to securely manage one or more imageRUNNER
ADVANCE systems remotely across a network. To aid in implementing and managing an MFP
infrastructure, imageWARE Enterprise Management Console facilitates the secure distribution of device
configuration information and address books using SSL encryption, as well as distributing standard and
custom driver configurations to client workstations on the network.
5.2 – Restricting Device Setup Screens
Administrators can lock-out access to device setup screens for unauthorized users from the control panel
and Remote UI utility in an effort to protect its configuration information.
For more information on restricting access to the device’s setup screens, please refer to the Device
Security section.
5.3 – Access Management System
The Access Management System enables the ability for administrators to restrict access to the features of
the system at the device or function level. If device authentication is used, users will need to login prior to
accessing the Main Menu. If Function Level Authentication in the Access Management System is used,
users will be prompted for their credentials to use certain, often sensitive device features.
For more information on the Access Management System, please refer to the Device Security section.
Page view 28
1 2 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37

Comments to this Manuals

No comments