![Konica Minolta BIZHUB C300 Users Manual [Security Operations Download Page 51](http://html1.mh-extra.com/html/konica-minolta/bizhub-c300/bizhub-c300_users-manual-security-operations_1993400051.webp)
2
Administrator Operations
2-32
C300
Ad
minist
ra
to
r Op
er
at
ions
Chapter 2
2.8
User Box Function
When access to the Administrator Setting mode by the Administrator of the
machine is authenticated, the machine enables the User Box. It also allows
the User Box Password and user attributes to be changed.
User Box prepares a User Box in the HDD as a space for saving image files.
The Administrator of the machine is allowed to register a Public User Box
that is shared among registered users. Up to 1,000 personal and public User
Boxes can be registered. A User Box Password may consist of 8 digits. The
password entered is displayed as “*” or “
●
.”
The term “user attributes” is a generic name used to refer to Owner Change
and User Box Type.
2
Reminder
If a job is executed in the copy, fax, or scan mode by specifying a User
Box number that has not been registered, the Personal User Box owned
by the user who logged on through User Authentication is automatically
registered.
2.8.1
Setting the User Box
2
Note
Do not leave the machine with the Administrator Setting mode setting
screen left shown on the display. If it is absolutely necessary to leave the
machine, be sure first to log off from the Administrator Setting mode.
<From the Control Panel>
0
For the procedure to access the Administrator Setting mode, see “Ac-
cessing the Administrator Setting mode” on page 2-2.
1
Call the Administrator Setting Mode to the screen from the control pan-
el.
c300_security_E.book 32 ページ 2007年4月11日 水曜日 午前10時42分
Summary of Contents for BIZHUB C300
Page 7: ...Contents x 6 C300 c300_security_E book 6...
Page 8: ...1 Security Chapter 1 Security c300_security_E book 1...
Page 20: ...2 Administrator Operations Chapter 2 Administrator Operations c300_security_E book 1...
Page 112: ...3 User Operations Chapter 3 User Operations c300_security_E book 1...
Page 155: ...3 User Operations 3 44 C300 User Operations Chapter 3 c300_security_E book 44...
Page 156: ...4 Application Software Chapter 4 Application Software c300_security_E book 1...