Usage Environment of the Computer

It is recommended to use the computer that is connected to the machine with the environment described below. If you connect the computer in a non-recommended environment, outside parties might view your login ID, password, and other information.

  • Hard disk encryption (BitLocker) setting
  • Firewall settings

    The access source of the HTTPS/8080 port is restricted appropriately.

  • Enforcing an appropriate user and login management on the computer