Preventing Information Leakage (Security Functions)
CJQ608
• You can protect documents from unauthorized access and stop them from being copied without
permission.
• You can control the use of the machine, as well as prevent machine settings from being changed
without authorization.
• By setting passwords, you can prevent unauthorized access via the network.
• You can erase or encrypt the data on the hard disk to minimize the risk of information leakage.
• You can limit the usage of functions for each user.
• See Security Guide.
Centrally Controlling Scan Conditions and Distribution
You can use the distributed scan management (DSM) system in Windows Server 2008 R2/2012 to
manage the destinations and scan settings for each individual user in a group and to use the information
when distributing scanned data.
You can also use this system to centrally manage information about people using the network and the
machine's scanner functions. Both delivered files and user information can be controlled.
What You Can Do with This Machine
21
Summary of Contents for Pro C5200s
Page 2: ......
Page 12: ...10 ...
Page 94: ...2 Getting Started 92 ...
Page 157: ...3 Press OK Specifying Scan Settings 155 ...
Page 158: ...5 Scan 156 ...
Page 162: ...6 Document Server 160 ...
Page 286: ...9 Troubleshooting 284 ...
Page 296: ...MEMO 294 ...
Page 297: ...MEMO 295 ...
Page 298: ...MEMO 296 EN GB EN US D260 7012 ...
Page 299: ... 2016 ...
Page 300: ...D260 7012 US EN GB EN ...