Requirements for the Computer Environment

It is recommended to use the following environment for your computer that is connected to the machine. If you connect a computer that does not fulfill the following requirements, third parties might view your login ID, password, and other information.

Requirements for the computer environment

  • Hard disk encryption (BitLocker) setting
  • Firewall settings
    • Configure the port that is used for HTTPS to accept access from trusted origins only and deny access from other origins.
    • Configure ports 443 and 15180 to deny access in the receiving rule.
  • Enforcing an appropriate user and login management on the computer