Table of Contents
Security Printing Solutions User’s Guide -- 50-70410-002 Rev. A
TOC-5
Section 5 – Using the TROY Port Monitor
Introduction ............................................................................................................................................5-1
Installing the TROY Port Monitor .......................................................................................................5-3
Accessing the TROY Port Monitor.......................................................................................................5-3
Using the TROY Port Monitor..............................................................................................................5-5
Connection Tab................................................................................................................................5-5
Encryption Tab ................................................................................................................................5-6
Security Tab .....................................................................................................................................5-7
Section 6 – Using the Printer Control Panel
Introduction ............................................................................................................................................6-1
Security ....................................................................................................................................................6-1
Functionality ...........................................................................................................................................6-1
Accessing Printer Features .............................................................................................................6-2
Entering the Administrator Password...........................................................................................6-2
Saving Printer Settings....................................................................................................................6-3
TROY Security Printing Solution Menu Map.....................................................................................6-4
Using the Exact Positioning Technology ..............................................................................................6-6
Section 7 – Using TROY Fonts
Introduction ............................................................................................................................................7-1
Accessing and Using TROY Fonts ........................................................................................................7-1
Accessing the TROY Fonts Using Windows Applications...........................................................7-1
Accessing the TROY Fonts Using Non-Windows Applications ..................................................7-2
Using TROY MICR Fonts ..............................................................................................................7-2
Using the Convenience Amount Fonts...........................................................................................7-2
Using the TROY Security Fonts.....................................................................................................7-2
Using the TROY Messaging Fonts .................................................................................................7-2
Using the TROY OCR Fonts .................................................................................................................7-2