Security Measures Provided by this Printer
Using Authentication and Managing Users
Enabling Authentication
To control administrators' and users' access to the printer, perform administrator authentication and
user authentication using login user names and login passwords. To perform authentication, the
authentication function must be enabled. For details about authentication settings, see p.22
"Enabling Administrator Authentication".
Specifying Authentication Information to Log in
Users are managed using the personal information registered in the printer's Address Book.
By enabling user authentication, you can allow only people registered in the Address Book to use the
printer. Users can be managed in the Address Book by the user administrator. For information on
specifying information to log in, see p.33 "Basic Authentication".
Specifying Which Functions are Available
This can be specified by the user administrator. Specify the functions available to registered users. By
making this setting, you can limit the functions available to users. For information on how to specify
which functions are available, see p.75 "Limiting Available Functions".
Ensuring Information Security
Printing confidential files
Using the Locked Print function, you can store files in the printer as confidential files and then print
them. You can print a file using the printer's control panel and collect it on the spot to prevent others
from seeing it. For details about printing confidential files, see p.57 "Printing a Confidential
Document".
Protecting Registered Information in the Address Book
You can specify who is allowed to access the data in the Address Book. You can prevent the data in
the Address Book being used by unregistered users.
To protect the data from unauthorized reading, you can also encrypt the data in the Address Book.
For details about protecting registered information in the Address Book, see p.61 "Protecting the
Address Book".
Managing Log Files
You can improve data security by deleting log files stored in the printer. By transferring the log files,
you can check the history data and identify unauthorized access.
To transfer the log data, Remote Communication Gate S is required. For details about managing log
files, see p.76 "Managing Log Files".
1. Getting Started
16
1
Summary of Contents for Aficio SP 5200DN
Page 17: ...17 MEMO...
Page 18: ...18 MEMO...
Page 19: ...19 MEMO...
Page 20: ...20 MEMO 2010 Printed in France EN GB M020 8510...
Page 30: ...Model types Model types Model name Type 1 SP 5200DN Type 2 SP 5210DN 8...
Page 34: ...Manuals provided are specific to printer types 12...
Page 38: ...16...
Page 52: ...1 Guide to the Printer 30 1...
Page 64: ...If the hard disk is active If the printer s cover is opened 2 Setting Up the Printer 42 2...
Page 122: ...5 Configuration 100 5...
Page 184: ...7 Maintaining the Printer 162 7...
Page 192: ...8 Adjusting the Printer 170 8...
Page 212: ...9 Troubleshooting 190 9...
Page 223: ...12 Close the front cover CEC214 Paper Misfeed Message B C 201 10...
Page 226: ...CEC082 10 Removing Misfed Paper 204 10...
Page 230: ...10 Removing Misfed Paper 208 10...
Page 244: ...11 Appendix 222 11...
Page 247: ...2010...
Page 248: ...Operating Instructions Hardware Guide M020 8502 EN US...
Page 256: ...6...
Page 284: ...2 Network Connection 34 2...
Page 298: ...4 When Using the Printer under Mac OS X 48 4...
Page 310: ...MEMO 60 EN GB EN US M0208518...
Page 311: ...2010...
Page 312: ...Operating Instructions Driver Installation Guide M020 8518 GB EN US EN...
Page 321: ...Trademarks 217 INDEX 219 7...
Page 324: ...Model types Model types Model name Type 1 SP 5200DN Type 2 SP 5210DN 10...
Page 328: ...14...
Page 338: ...1 Preparing for Printing 24 1...
Page 351: ...CBK525 Down then Left CBK526 Frequently Used Print Methods 37 2...
Page 359: ...CBK504 ORIGINAL CBK505 COPY CBK501 Advanced Printing 45 2...
Page 452: ...4 Making Printer Settings Using the Control Panel 138 4...
Page 470: ...5 Monitoring and Configuring the Printer 156 5...
Page 480: ...6 Using a Printer Server 166 6...
Page 497: ...For details see Using telnet UNIX Supplement Using the Dynamic DNS Function 183 8...
Page 535: ...2010...
Page 536: ...Operating Instructions Software Guide M020 8504 EN US...
Page 545: ...For details about the specifications of each option see Specifications Hardware Guide 7...
Page 548: ...10...
Page 674: ...8 Specifying the Extended Security Functions 136 8...
Page 680: ...9 Troubleshooting 142 9...
Page 702: ...10 Appendix 164 10...
Page 705: ...MEMO 167...
Page 706: ...MEMO 168 EN GB EN US M0208505...
Page 707: ...2010...
Page 708: ...Operating Instructions Security Guide M020 8505 EN US...
Page 821: ...MEMO 111...
Page 822: ...MEMO 112 EN GB EN US M0668513...