Usage Environment of the Computer
It is recommended to use the computer that is connected to the machine with the environment
described below.
If you connect a computer that does not conform to the conditions below, third parties
might view your login ID, password, and other information.
- Hard disk encryption (BitLocker) setting
- Firewall settings
- Configure the port that is used for HTTPS to accept access from trusted origins only and deny access from other origins.
- Configure ports 443 and 15180 to deny access in the receiving rule.
- Enforcing an appropriate user and login management on the computer