Usage Environment of the Computer

It is recommended to use the computer that is connected to the machine with the environment described below. If you connect a computer that does not conform to the conditions below, third parties might view your login ID, password, and other information.

  • Hard disk encryption (BitLocker) setting
  • Firewall settings
    • Configure the port that is used for HTTPS to accept access from trusted origins only and deny access from other origins.
    • Configure ports 443 and 15180 to deny access in the receiving rule.
  • Enforcing an appropriate user and login management on the computer