99
6. Specifying the
Administrator/Security Functions
The Roles of Administrators
By limiting the functions available to each user, you can protect the data in the
machine from leaks and from being tampered with or deleted. The administra-
tors each manage the access limits to the functions they are responsible for.
There are four types of administrator, as shown below. You can also specify a su-
pervisor who can change each administrator’s password.
• User Administrator
• Machine Administrator
• Network Administrator
• File Administrator
• Supervisor
Register the administrators and supervisor separately from the users registered
in the address book. Users registered in the address book cannot be specified as
administrators.
Reference
For details, see p.104 “Registering the Administrator”.
❖
User Administrator
This is the administrator who manages personal information in the address
book.
A user administrator can register/delete users in the address book or change
users’ personal information.
Users registered in the address book can also change and delete their own in-
formation. If any of the users forget their password, the user administrator
can delete it and create a new one, allowing the user to access the machine
again.
❖
Machine Administrator
This is the administrator who mainly manages the machine’s default settings.
You can set the machine so that the default for each function can only be spec-
ified by the machine administrator. By making this setting, you can prevent
unauthorized people from changing the settings and allow the machine to be
used securely by its many users.
❖
Network Administrator
This is the administrator who manages the network settings. You can set the
machine so that network settings such as the IP address and settings for send-
ing and receiving e-mail can only be specified by the network administrator.
By making this setting, you can prevent unauthorized users from changing
the settings and disabling the machine, and thus ensure correct network op-
eration.
Summary of Contents for Aficio 3035
Page 10: ...2...
Page 52: ...Preventing Unauthorized Use of Functions and Settings 44 3...
Page 184: ...176 MEMO...
Page 185: ...177 MEMO...
Page 186: ...178 EN USA AE AE B198 6707 MEMO...
Page 187: ...Copyright 2005...
Page 188: ...B1986707 Operating Instructions Security Reference Printed in China EN USA AE AE B198 6707...