Requirements for the Computer Environment
It is recommended to use the following environment for your computer that is connected
to the machine.
If you connect a computer that does not fulfill the following requirements, third
parties might view your login ID, password, and other information.
Requirements for the computer environment
- Hard disk encryption (BitLocker) setting
- Firewall settings
- Configure the port that is used for HTTPS to accept access from trusted origins only and deny access from other origins.
- Configure ports 443 and 15180 to deny access in the receiving rule.
- Enforcing an appropriate user and login management on the computer