KYOCERA MA4500ci Data Encryption Overwrite Operation Guide User Guide

June 16, 2024
Kyocera

kyoceradocumentsolutions.com
Data Encryption/Overwrite
Operation Guide
MA4500ci
2023.2 3MS2Z7KDENUS0

Introduction

This Setup Guide explains the procedures for installing and operating the Data Encryption/Overwrite Functions (hereinafter called Security Functions) and the procedure for system initialization.
Organization administrators should read and understand this manual.

  • Nominate a reliable person for the machine administrator when installing the security functions.
  • Sufficiently supervise the nominated administrator so that it can observe the security policy and operation rules at the organization to which it belongs and properly operate the machine in accordance with the Operation Guide of the product.
  • Sufficiently supervise the general users so that they can operate the machine while observing the security policy and operation rules at the organization to which they belong.

Instructions for General Users (for Both General Users and Administrators)

Security Functions

The security functions enable overwriting and encryption.
NOTE: If you install the security functions, Running security function… appears when the machine starts up and it may take a while.

Overwriting

Multi-functional products (MFPs) temporarily store the data of scanned originals and print jobs, as well as other data stored by users, on the SSD or in FAX memory, and the job is output from that data. As the data storage areas used for such data remain unchanged on the SSD or in FAX memory until they are overwritten by other data, the data stored in these areas is potentially restorable using special tools.
The security functions delete and overwrite (hereinafter collectively referred to as overwrite(s)) the unnecessary data storage area used for the output data or deleted data to ensure that data cannot be restored.
Overwriting is performed automatically, without user intervention.
CAUTION: When you cancel a job, the machine immediately starts overwriting the data that was stored on the SSD or in FAX memory.
Encryption
MFPs store the data of scanned originals and other data stored by users in the SSD. It means the data could be possibly leaked or tampered with if the SSD is stolen. The security functions encrypt data before storing it in the SSD. It guarantees higher security because no data cannot be decoded by ordinary output or operations. Encryption is automatically performed and no special procedure is required.
CAUTION: Encryption helps enhance security. However, the data stored in the Document Box can be decoded by ordinary operations. Do not store any strictly confidential data in the Document Box.

Security Functions

KYOCERA MA4500ci Data Encryption Overwrite -

Touch Panel Display after the Security Functions are Installed

Hard Disk Icon DisplayKYOCERA MA4500ci Data Encryption Overwrite -
fig In Security Mode, the security functions have been properly installed and is running. The hard disk icon appears on the top right side of the touch panel in Security Mode.
NOTE: If the hard disk icon does not appear on the normal screen, it is possible that the Security Mode is not ON. Call service.
The hard disk icon display changes as follows during overwriting
The table below shows the icons displayed and their descriptions.

Icon displayed Description
     There is unneeded data on the SSD or in FAX memory.
Overwriting the unwanted data
The unwanted data is overwritten.

CAUTION: Do not turn the power switch off while is displayed. Risk of damage to the SSD or FAX memory.
NOTE: If you turn the machine off at the power switch during overwriting, data may not be overwritten completely from the SSD. Turn the machine back on at the power switch. Overwriting automatically resumes. If you accidentally turn the main power switch off during overwriting or initialization, the icon might not switch to the second icon shown above. This would be caused by a possible crash or failed overwriting of the data to be overwritten. This will not affect subsequent overwriting processes. However, hard disk initialization is recommended so as to return to normal stable operations. (Initialization should be performed by the administrator following the steps in System Initialization on page 15.)
Instructions for Administrators (for Those in Charge of Installation and Operations of the Security Functions)
If any kind of problem occurs in the installation or use of the security functions, contact your dealer or service technician.

Installing the Security Functions

The Security Functions Contents
The security functions package includes:

  • License Certificate
  • Installation Guide (for service personnel)
  • Notice In case of the standard specification, there will be no bundled items included.

Before Installation

  • Make sure that the service representative must be a person who belongs to the supplying company.
  • Install the machine in a safe location with controlled access, and unauthorized access to the machine can be prevented.
  • The SSD will be initialized during installation of the security functions. This means that the data stored in the hard disk will be all overwritten. Special attention should be given if you install the security functions on the MFP currently used.
  • The network to which the machine is hooked up must be protected by a firewall to prevent extraneous attacks.
  • [Adjustment/Maintenance] -> [Restart/Initialization] -> [System Initialization] will not be displayed in the System Menu after the installation.
  • When installing the security functions, change the machine settings as follows.
Item Value
Job Accounting/ Authentication User Login Setting

Change the administrator password.
Device Settings| Date/Timer| Date and Time| Set the date and time.

Installation

Installation of the security function is performed by the service person or the administrator. The service person or the administrator should log in the system menu to enter the encryption code.
Encryption Code
An encryption code of 8 alphanumeric characters (0 to 9, A to Z, a to z) to encrypt data needs to be entered. By default, the code is set 00000000. As an encryption key is then created from this code, it is safe enough to continue using the default code.
CAUTION: Be sure to remember and securely manage the encryption code you entered. If you need to enter the encryption code again for some reason and you do not enter the same encryption code, all the data stored on the SDD will be overwritten as a security precaution.
Installation Procedure
Use the procedure below to select the interface.KYOCERA MA4500ci Data
Encryption Overwrite - setting 1

  1. Press the [Home] key.

  2. Press […] [System Menu] [Add/Delete Application].

  3. Press [Optional Function List] of Optional Function.
    If user login is disabled, the user authentication screen appears. Enter your login user name and password and then press [Login]. For this, you need to log in with administrator privileges. Refer to the machine’s Operation Guide for the default loginuser name and password.

  4. The optional function screen is displayed. Select Data Encryption/Overwrite and press [Activate].

  5. This function will be activated. The data saved in the large capacity storage will be deleted and the storage will be formatted and encrypted. If there is no problem, press [Yes].

  6. Turn the power switch on again following to the indication in the panel screen.

  7. The screen for entering the encryption code is displayed.
    To change the encryption code, erase the “00000000” and then enter the 8-digit alphanumeric encryption code (0 to 9, A to Z, a to z) and press [OK]. SSD formatting begins.
    If the encryption code is not changed, press [OK]. SSD formatting begins.

  8. When formatting finishes, follow the on screen instructions to turn the Power Switch off and on again.

  9. After the opening screen is displayed, confirm that a hard disk icon (Overwritten completion icon of unnecessary data) is shown in the top right corner of the screen.

After Installation
Change the machine setting as follows to securely operate it. If the system in the machine is initialized, it returns to the settings before installation, so make changes in the same way. If you allow service personnel to conduct maintenance operations, confirm the set values.
Items changed in Command Center RX

Item

|

Value

---|---
Device Settings| Energy Saver/Timer| Energy Saver/Timer Settings| Timer Settings| Auto Panel Reset| On
Panel Reset Timer| Setting any value
System| System| Error Settings| Continue or Cancel Err. Job| Job Owner Only
Function Settings| Printer| Printer Settings| General| Remote Printing| Prohibit
FAX| FAX Settings| Fax Settings| Remote Settings| FAX Remote Diagnostics| Off
Forwarding| Forward Settings| Forwarding| On
Network Settings| TCP/IP| TCP/IP Settings| Bonjour Settings| Bonjour| Off
IPSec Settings| IPSec| On
Restriction| Allowed
Allowed IPSec Rules*(“Settings” selection of any of Rule No.)| Policy| Rule| On
Key Manageme nt Type| IKEv1
Encapsulati on Mode| Transport
IP Address| IP Version| IPv4
IP Address (IPv4)| IP Address of the destination terminal
Subnet Mask| Setting any value
Authentication| Local Side| Authentication Type| Pre-shared Key
Pre-shared Key| Setting any value

Item

|

Value

---|---
Network Settings| TCP/IP| Allowed IPSec Rules* (“Settings” selection of any of Rule No.)| Key Exchange (IKE phase1)| Mode| Main mode
Hash| MD5:Disable, SHA1:Disable, SHA-256:Enable, SHA-384:Enable, SHA-512:Enable AES-XCBC:  Disable
Encryption| 3DES: Enable, AES-CBC-128: Enable, AES-CBC-192: Enable, AES- CBC-256: Enable
DiffieHellman Group| Select one from following option. modp2048(14), modp4096(16), modp6144(17), modp8192(18), ecp256(19), ecp384(20), ecp521(21), modp1024s160 (22), modp2048s224 (23), modp2048s256 (24)
Lifetime (Time)| 28800 seconds
Data Protection (IKE phase2)| Protocol| ESP
Hash| MD5:Disable, SHA1:Disable, SHA-256:Enable, SHA-384:Enable, SHA-512:Enable, AES-XCBC: Setting any value, AES-GCM- 128:Enable, AES-GCM- 192:Enable, AES-GCM- 256:Enable, AES-GMAC128: Setting any value, AES-GMAC-192: Setting any value, AES-GMAC-256: Setting any value
Item| Value
---|---
Network

Settings

| TCP/IP| Allowed IPSec Rules*

(“Settings” selection of any of Rule No.)

| Data Protection (IKE phase2)| Encryption| 3DES: Enable, AES-CBC-128: Enable, AES-CBC-192: Enable, AES-CBC-256: Enable, AES-GCM-128: Enable, AES-GCM-192: Enable, AES-GCM-256: Enable, AES-CTR: Disable
PFS| Off
Lifetime Measurement| Time & Data Size
Lifetime (Time)| 3600 seconds
Lifetime (Data Size)| 100000 KB
Extended Sequence Number| Off
Network Settings| Protocol| Protocol Settings| Print Protocols| NetBEUI| Off
LPD| Off
FTP Server (Reception)| Off
IPP| Off
IPP over TLS| On
IPP Authenticati on| Off
Raw| Off
WSD Print| Off
POP3 (E-mail RX)| Off
Item| Value
---|---
Network Settings| Protocol| Protocol Settings| Send Protocols| SMTP (E-mail TX)| On
SMTP (E- mail TX) – Certificate Auto Verification| Validity Period: Enable
FTP Client (Transmission)| On
FTP Client (Transmission ) – Certificate Auto Verification| Validity Period: Enable
SMB| Off
WSD Scan| Off
eSCL| Off
eSCL over TLS| Off
Other Protocols| SNMPv1/v2c| Off
SNMPv3| Off
HTTP| Off
HTTPS| On
HTTP(Client side) – Certificate Auto Verification| Validity Period : Enable
Enhanced WSD| Off
Enhanced WSD(TLS)| On
LDAP| Off
IEEE802.1X| Off
LLTD| Off
REST| Off
REST over TLS| Off
VNC(RFB)| Off
VNC(RFB) over TLS| Off
Enhanced VNC(RFB) over TLS| Off
OCSP/CRL Settings| Off
Syslog| Off
Item| Value
---|---
Security Settings| Device Security| Device
Security Settings| Job Status/Job Log Settings| Display Jobs
Detail Status| My Jobs Only
Display Jobs  Log| My Jobs Only
Edit Restriction| Address Book| AdministratorOnly
One Touch Key| Administrator Only
Device

Security

| Device Security Settings| Authentication Security Settings| Password Policy Settings| Password Policy| On
Maximum password age| Setting any value
Minimum password length| On 8 or more characters
Password complexity| Setting any value
User Account
Lockout Settings| Lockout Policy| On
Number of Retries until Locked| Setting any value
Lockout Duration| Setting any value
Lockout Target| All
Network  Security| Network Security Settings| Secure Protocol Settings| TLS| On
Serverside Settings| TLS Version| TLS1.0: Disable
TLS1.1: Disable TLS1.2: Enable TLS1.3: Enable
Effective Encryption| ARCFOUR: Disable, DES: Disable, 3DES: Enable, AES: Enable, AES-GCM:
Setting any value CHACHA20/ POLY1305: Setting any value
Hash| SHA1: Enable, SHA2(256/384):
Enable
HTTP Security| Secure Only (HTTPS)
IPP Security| Secure Only (IPPS)
Enhanced WSD Security| Secure Only (Enhanced WSD over TLS)
eSCL Security| Secure Only (eSCL over TLS)
REST Security| Secure Only (REST over TLS)
Item| Value
---|---
Security Settings| Network Security| Network Security Settings| Secure Protocol Settings| Clientside Settings| TLS Version| TLS1.0: Disable TLS1.1: Disable TLS1.2: Enable TLS1.3: Enable
Effective Encryption| ARCFOUR: Disable, DES: Disable, 3DES: Enable, AES: Enable, AES-GCM: Setting any value CHACHA20/ POLY1305:
Setting any value
Hash| SHA1: Enable SHA2(256/384):  Enable
Management Settings| Authentication| Settings| Authentication Settings| General| Authenticati on| Local Authentication
Local Authorization Settings| Local Authorization| On
Guest

Authorization Settings

| Guest

Authorization

| Off
Unknown User Settings| Unknown ID Job| Reject
Simple Login Settings| Simple Login| Off
History Settings| History Settings| Job Log History| Recipient E-mail Address| E-mail Address for the administrator of the machine
AutoSending| On

Items changed on the machine

Item Value
System Menu Security Settings

For the procedures for changing the settings, refer to the machine Operation Guide and Command Center RX User Guide.
After changing the settings, run [Software verification] in the system menu to verify that the machine operates correctly. Periodically perform [Software verification] after installation as well.
After installing the security functions, you can change the security password. Refer to page 14 for the procedures.
The administrator of the machine should periodically store the histories, and check each history to make sure there was no unauthorized access or abnormal operation.
Grant regular users permission based on your company rules, and promptly delete any user accounts that stop being used due to retirement or other reasons.
IPsec setting
It is possible to protect data by enabling the IPsec function that encrypts the communication path. Please note the following points when enabling the IPsec function.

  • The value set by the IPsec rule has to be matched with the destination PC. Communication error occurs in case the setting does not match.
  • IP address set by the IPsec rule has to be matched with the IP address of the SMTP server or FTP server which is set on the main unit.
  • In case the setting does not match, data sent by mail or FTP can’t be encrypted.
  • Pre-shared key set by the IPsec rule has to be created by using the alphanumeric symbols of 8 digits or more which will not be easily guessed.

Changing Security Functions

Changing Security Password
Enter the security password to change security functions. You can customize the security password so that only the administrator can use the security functions.
Use the procedure below to change the security password.KYOCERA MA4500ci
Data Encryption Overwrite - setting 2

  1. Press the [Home] key.

  2. Press […] [System Menu] [Security Settings].

  3. Press [Data Security] of Device Security Settings.
    If user login is disabled, the user authentication screen appears. Enter your login user name and password and then press [Login].
    For this, you need to log in with administrator privileges. Refer to the machine’s Operation Guide for the default login user name and password.

  4. Press [SSD Initialization].

  5. Enter the default security password, 000000.

  6. Press [Security Password].

  7. For the “Password,” enter a new security password with 6 to 16 alphanumeric characters and symbols.

  8. For “Confirm Password,” enter the same password again.

  9. Press [OK].

CAUTION: Avoid any easy-to-guess numbers for the security password (e.g. 11111111 or 12345678).

System Initialization

Overwrite all the data stored in the system when disposing of the machine.
CAUTION: If you accidentally turn the power switch off during initialization, the system might possibly crash or initialization might fail.
NOTE: If you accidentally turn the power switch off during initialization, turn the power switch on again. Initialization automatically restarts.
Use the procedure below to initialize the system.KYOCERA MA4500ci Data
Encryption Overwrite - setting 3

  1. Press the [Home] key.

  2. Press […] [System Menu] [Security Settings].

  3. Press [Data Security] of Device Security Settings.
    If user login is disabled, the user authentication screen appears. Enter your login user name and password and then press [Login].
    For this, you need to log in with administrator privileges. Refer to the machine’s Operation Guide for the default login user name and password.

  4. Press [SSD Initialization].

  5. Enter the default security password, 000000.

  6. Press [System Initialization].

  7. Press [Initialize] on the screen to confirm the initialization. Initialization starts.

  8. When the screen appears to show initialization is completed, turn the power switch off and then on.

Warning Message

If the encryption code information of the machine has been lost for some reason, the screen shown here appears when the power is turned on.
Follow the steps below.KYOCERA MA4500ci Data Encryption Overwrite - setting
4

  1. Enter the encryption code that was entered during the installation of the security functions.
    CAUTION: Even though entering a different encryption code can also enable continuation of a job, this will overwrite all the data stored in the SSD. Exercise extreme caution when entering an encryption code.
    The encryption code is not the same as the security password.

  2. Turn the power switch off and on.

Disposal

If the machine is unused and demolished, initialize the system of this product to erase the SSD data and FAX memory.
If the machine is unused and demolished, obtain directions for disposal from the dealer (from which you purchased the machine) or your service representative.

Appendix

List of factory default settings
The default settings for security mode are shown below.
Items changed in Command Center RX

Item Value
Device Settings Energy Saver/Timer
TimerSettings Auto Panel Reset
Panel Reset Timer 90 seconds
System System
Function Settings Printer
FAX FAX Settings
Forwarding Forward Settings
Network Settings TCP/IP
IPSec Settings IPSec
Restriction Allowed
IPSec Rules (“Settings” selection of any of Rule No.) Policy
Key Management Type IKEv1
Encapsulation Mode Transport
IP Address IP Version
IP Address (IPv4) No setting
Subnet Mask No setting
Authentication Local Side
Pre-shared Key No setting
Key Exchange (IKE phase1) Mode
Hash MD5:  Disable, SHA1: Enable, SHA-256: Enable, SHA-384: Enable, SHA-512:

Enable AES-XCBC: Disable
Item| Value
---|---
Network Settings| TCP/IP| IPSec Rules (“Settings” selection of any of Rule No.)| Key Exchange (IKE phase1)| Encryption| 3DES: Enable, AES-CBC-128: Enable, AES-CBC-192:
Enable, AES-CBC-256: Enable
Diffie Hellman Group| modp1024(2)
Lifetime (Time)| 28800 seconds
Data Protection (IKE phase2)| Protocol| ESP
Hash| MD5: Disable, SHA1: Enable, SHA-256: Enable, SHA-384: Enable, SHA-512: Enable, AES-XCBC: Disable, AES-GCM-128: Enable, AES-GCM-192: Enable, AES- GCM-256: Enable, AES-GMAC-128: Disable, AES-GMAC- 192: Disable, AES-GMAC-256: Disable
Encryption| 3DES: Enable, AES-CBC-128: Enable, AES-CBC-192: Enable, AES- CBC-256: Enable, AES-GCM-128:
Enable, AES-GCM- 92: Enable, AES-GCM-256:
Enable, AES-CTR: Disable
PFS| Off
Item| Value
---|---
Network Settings| TCP/IP| IPSec Rules (“Settings” selection of any of Rule No.)| Data Protection (IKE phase2)| Lifetime Measurement| Time & Data Size
Lifetime (Time)| 3600 seconds
Lifetime (Data Size)| 100000KB
Extended Sequence Number| Off
Protocol| Protocol Settings| Print Protocols| NetBEUI| On
LPD| On
FTP Server (Reception)| On
IPP| Off
IPP over TLS| On
IPP Authentication| Off
Raw| On
WSD Print| On
POP3 (E-mail RX)| Off
Send Protocols| SMTP (E-mail TX)| Off
FTP Client (Transmission)| On
FTP Client (Transmission ) – Certificate Auto Verification| Validity Period:

Enable

SMB| On
WSD Scan| On
eSCL| On
eSCL over TLS| On
Item| Value
---|---
Network Settings| Protocol| Protocol Settings| Other Protocols| SNMPv1/v2c| On
SNMPv3| Off
HTTP| On
HTTPS| On
HTTP(Client side) – Certificate Auto Verification| Validity Period: Enable
Enhanced WSD| On
Enhanced WSD(TLS)| On
LDAP| Off
IEEE802.1X| Off
LLTD| On
REST| On
REST over TLS| On
VNC(RFB)| Off
VNC(RFB) over TLS| Off
Enhanced VNC(RFB) over TLS| On
OCSP/CRL Settings| On
Syslog| Off
Security Settings| Device Security| Device Security Settings| Job Status/Job Log Settings| Display Jobs Detail Status| Show All
Display Jobs Log| Show All
Edit Restriction| Address Book| Off
One Touch Key| Off
Authentication Security Settings| Password Policy Settings| Password Policy| Off
Maximum password age| Off
Minimum password length| Off
Password complexity| No more than two consecutive identical char
Item| Value
---|---
Security Settings| Device Security| Device Security Settings| Authentication Security Settings| User Account  Lockout Settings| Lockout Policy| Off
Number of Retries until Locked| 3 times
Lockout Duration| 1 minute
Lockout Target| Remote Login Only
Security Settings| Network Security| Network Security Settings| Secure Protocol Settings| TLS| On
Serverside Settings| TLS Version| TLS1.0: Disable

TLS1.1: Enable TLS1.2: Enable TLS1.3: Enable

Effective Encryption| ARCFOUR: Disable, DES: Disable, 3DES: Enable, AES: Enable, AES-GCM: Disable, CHACHA20/ POLY1305: Enable
Hash| SHA1: Enable, SHA2(256/384): Enable
HTTP Security| Secure Only (HTTPS)
IPP Security| Secure Only (IPPS)
Enhanced WSD Security| Secure Only (Enhanced WSD over TLS)
eSCL Security| Not Secure (eSCL over TLS & eSCL)
REST Security| Secure Only (REST over TLS)
Clientside Settings| TLS Version| TLS1.0: Disable TLS1.1: Enable TLS1.2: Enable TLS1.3: Enable
Effective Encryption| ARCFOUR: Disable, DES: Disable, 3DES: Enable, AES: Enable, AES-GCM: Enable, CHACHA20/ POLY1305: Enable
Hash| SHA1: Enable, SHA2(256/384): Enable
Item| Value
---|---
Management Settings| Authentication| Settings| Authentication Settings| General| Authentication| Off
Local Authorization Settings| Local Authorization| Off
Guest Authorization Settings| Guest Authorization| Off
Unknown User Settings| Unknown ID Job| Reject
Simple LoginSettings| Simple Login| Off
History Settings| History Settings| Job Log History| Recipient E-mail Address| No setting
Auto Sending| Off

Items changed on the machine

Item Value
System Menu Security Settings

The initial value of the custom box

Item Value
Owner Local User
Permission Private

Log information
The following settings and status regarding security are shown in the machine log.

  • Event date and time
  • Type of event
  • Information of the log in user or the user who attempted to log in
  • Event result (Success or fail)

Event to be displayed in the log

Log Event
Job Logs End job/Check job status/Change job/Cancel job

© 2023 KYOCERA Document Solutions Inc.
is a trademark of KYOCERA Corporation

Read User Manual Online (PDF format)

Loading......

Download This Manual (PDF format)

Download this manual  >>

Kyocera User Manuals

Related Manuals