background image

i

Manuals for This Machine

Refer to the manuals that are relevant to what you want to do with the machine.

Important

Media differ according to manual. 

The printed and electronic versions of a manual have the same contents.

Adobe Acrobat Reader/Adobe Reader must be installed in order to view the
manuals as PDF files.

Depending on which country you are in, there may also be html manuals. To
view these manuals, a Web browser must be installed.

About This Machine

Be sure to read the Safety Information in this manual before using the ma-
chine.
This manual provides an introduction to the functions of the machine. It also
explains the control panel, preparation procedures for using the machine,
how to enter text, and how to install the CD-ROMs provided.

General Settings Guide

Explains User Tools settings, and Address Book procedures such as register-
ing fax numbers, e-mail addresses, and user codes. Also refer to this manual
for explanations on how to connect the machine.

Troubleshooting

Provides a guide to solving common problems, and explains how to replace
paper, toner, and other consumables.

Security Reference

This manual is for administrators of the machine. It explains security func-
tions that the administrators can use to protect data from being tampered
with, or prevent the machine from unauthorized use.
Also refer to this manual for the procedures for registering administrators, as
well as setting user and administrator authentication.

Copy/ Document Server Reference

Explains Copier and Document Server functions and operations. Also refer to
this manual for explanations on how to place originals.

Facsimile Reference

Explains Facsimile functions and operations.

Printer Reference

Explains Printer functions and operations.

Scanner Reference

Explains Scanner functions and operations.

D0086951_RussianC45-EN.book  Page i  Wednesday, May 31, 2006  11:45 AM

Summary of Contents for DSm725e

Page 1: ...tings and Address Book procedures such as register ing fax numbers e mail addresses and user codes Also refer to this manual for explanations on how to connect the machine Troubleshooting Provides a g...

Page 2: ...pt 3 Supplement UNIX Supplement Manuals for DeskTopBinder Lite DeskTopBinder Lite Setup Guide DeskTopBinder Introduction Guide Auto Document Link Guide Note Manuals provided are specific to machine ty...

Page 3: ...uthentication Setting Procedure 16 Administrator Authentication 17 Specifying Administrator Privileges 18 Registering the Administrator 19 Logging on Using Administrator Authentication 21 Logging off...

Page 4: ...Stored Files 67 Specifying Passwords for the Stored Files 69 Unlocking Files 70 Preventing Data Leaks Due to Unauthorized Transmission 71 Restrictions on Destinations 71 Protecting the Address Book 7...

Page 5: ...ging on as the Supervisor 128 Logging off as the Supervisor 128 Changing the Supervisor 129 Resetting an Administrator s Password 130 Machine Administrator Settings 131 System Settings 131 Copier Docu...

Page 6: ...ser Account Settings in the Address Book 149 User Settings 152 Copier Document Server Features 152 Printer Functions 155 Scanner Features 157 Facsimile Features 158 System Settings 160 Web Image Monit...

Page 7: ...ead these notes They can be found in the Safety Information section of About This Machine Indicates points to pay attention to when using the machine and explanations of likely causes of paper misfeed...

Page 8: ...2...

Page 9: ...uthentication administrators manage the machine and its users To enable authentication information about both administrators and users must be registered in order to authenticate users via their login...

Page 10: ...t tings or accessing the machine over the network User Authentication Users are authenticated by means of the login user name and login password supplied by the user when specifying the machine s sett...

Page 11: ...or and then log on to the machine as the admin istrator H Install the server certificate I Enable secure sockets layer SSL J Enter the administrator s user name and password The administrator s defaul...

Page 12: ...on Information to Log on Users are managed using the personal information in the machine s address book By enabling user authentication you can allow only people registered in the address book to use...

Page 13: ...s Using the printer s Locked Print you can store files in the machine as confi dential files and then print them You can print a file using the machine s con trol panel and collect it on the spot to p...

Page 14: ...ing used by unregistered users To protect the data from unauthorized reading you can also encrypt the data in the address book Reference For details see p 73 Protecting the Address Book Managing Log F...

Page 15: ...see p 62 Specifying Access Permission for Stored Files Preventing Modification of Machine Settings The machine settings that can be modified according to the type of adminis trator account Register t...

Page 16: ...o encrypt the login password for administrator authentication and user authentication Reference For details see p 98 Encrypting Transmitted Passwords Safer Communication Using SSL When you access the...

Page 17: ...our types of administrator machine administrator network adminis trator file administrator and user administrator The sharing of administrator tasks eases the burden on individual administra tors whil...

Page 18: ...or This is the administrator who manages permission to access stored files You can specify passwords to allow only registered and permitted users to view and edit files stored in Document Server By ma...

Page 19: ...portant If you have enabled Administrator Authentication Management make sure not to forget the administrator login user name and login password If an adminis trator login user name or login password...

Page 20: ...copying log deletion and other defaults 3 Network Administrator This administrator manages the network settings You can set the machine so that network settings such as the IP address and settings for...

Page 21: ...normal operations on the machine such as copying and printing 2 Group A group performs normal operations on the machine such as copying and print ing 3 Unauthorized User 4 Authentication Using a login...

Page 22: ...thentication Windows Authentication LDAP Authenti cation or Integration Server Authentication you must first specify adminis trator authentication You can specify User Code Authentication without spec...

Page 23: ...strator authority is grant ed to a single login user name You can specify the login user name login password and encryption password for each administrator The encryption password is a password for pe...

Page 24: ...user name and login password If an adminis trator login user name or login password is forgotten a new password must be specified using the supervisor s authority Reference For details see p 127 Supe...

Page 25: ...the burden on individual administra tors while also limiting unauthorized operation by administrators Administrator authentication can also be specified via Web Image Monitor For details see the Web...

Page 26: ...ach administrator s authority to a different person the screen appears as follows F Press Change for the login user name G Enter the login user name and then press OK H Press Change for the login pass...

Page 27: ...on appears To log on as an administrator enter the administrator s login user name and login password If you log on using administrator authority the name of the administrator logging on appears If yo...

Page 28: ...ssword and then press OK G Enter Login Authenticating Please wait appears followed by the screen for specifying the default Logging off Using Administrator Authentication If administrator authenticati...

Page 29: ...n the lines for the machine administrator and the user administrator Preparation For details about logging on and logging off with administrator authentica tion see p 21 Logging on Using Administrator...

Page 30: ...ticating on the basis of the user code and basic authentication Windows authentication and LDAP authen tication are used for authenticating individual users You cannot use more than one authentication...

Page 31: ...C Press Administrator Tools D Press User Authentication Management E Select User Code Auth Note If you do not want to use user authentication management select Off F Select which of the machine s fun...

Page 32: ...can not only manage the ma chine s available functions but also limit access to stored files and to the personal data in the address book Specifying Basic Authentication A Press the User Tools Counter...

Page 33: ...f you want to print using unauthenticat ed printer drivers or without any printer driver Authentication is required for printing with non specified devices If you select Simple All or Simple Limitatio...

Page 34: ...Image Monitor Reference For details about logging on and logging off with administrator authentica tion see p 21 Logging on Using Administrator Authentication p 22 Log ging off Using Administrator Au...

Page 35: ...ication Folder Au thentication and LDAP Authentication For details about specifying login user name and login password see p 28 Spec ifying Login User Name and Login Password If you do not want to use...

Page 36: ...ppear press TNext to scroll down to other settings Limitation When using Use Auth Info at Login for SMTP Authentication Folder Au thentication or LDAP Authentication a user name other than other admin...

Page 37: ...e Windows Server Keep in mind that group names are case sensitive Then specify the machine functions available to each group If global groups are not specified users can use the available functions sp...

Page 38: ...s who are registered in multiple groups can use all the functions avail able to those groups If you specify in the address book which functions are available to global group members those settings hav...

Page 39: ...If you select Simple Limitation you can specify clients for which printer job authentication is not required Specify Parallel Interface Simple USB Sim ple and the clients IP address range in which pri...

Page 40: ...lied to Printer Job Au thentication K Press OK L Under Group press Program Change and then press Not Programmed If the setting to be specified does not appear press TNext to scroll down to other setti...

Page 41: ...Certificate Authority and then click Next On the displayed screen Enterprise root CA is selected I Enter the Certificate Authority name optional in CA Identifying Information and then click Next J Lea...

Page 42: ...dminpak Start Setup Wizard B Select Install all of the Administrator Tools and then click Next C On the Start menu select Run D Enter mmc and then click OK E On the Console select Add Remove Snap in F...

Page 43: ...LDAP server such as the user s e mail address is automatically registered in the machine If user information on the server is changed information registered in the machine may be overwritten when auth...

Page 44: ...e it To limit the available functions for each user register each user and corre sponding Available Functions setting in the address book or specify Available Functions for each registered user The Av...

Page 45: ...if you want to print using unauthenti cated printer drivers or without any printer driver Authentication is re quired for printing with non specified devices If you select Simple All or Simple Limitat...

Page 46: ...ed to register this if you want to authenticate according to the DN If the setting to be specified does not appear press TNext to scroll down to other settings M Enter the unique attribute in Unique A...

Page 47: ...stem or Web SmartDeviceMonitor Professional IS Standard and Authentication Manager are installed For details about the software contact your local dealer Using Web Image Monitor you can specify whethe...

Page 48: ...n name and then press OK Note You cannot specify a domain name under an authentication system that does not support domain login K Press Obtain URL The machine obtains the URL of the server specified...

Page 49: ...f you want to print using unauthenticated printer drivers or without any printer driver Authentication is required for printing with non specified devices If you select Simple All or Simple Limitation...

Page 50: ...nting is possible regardless of user authentication Printing is possible if user authentication is successful If user authentica tion fails the print job is reset Printing is possible if user authenti...

Page 51: ...ter job The printer driver applies advanced encryption to the login passwords The printer driver encryption key enables the driver encryption to pre vent the login password being stolen B In the RPCS...

Page 52: ...plies to recovery parallel printing using an RPCS PCL printer driver that does not support authentication F A printer job or PDF file is sent from a host computer without a printer driver and is print...

Page 53: ...achine automatically logs you off if you do not use the control panel within a given time Note Consult the User Administrator about your login user name password and user code For user code authentica...

Page 54: ...n or Integration Server Authentication is set A Press Enter for Login User Name B Enter a login user name and then press OK C Press Enter for Login Password D Enter a login password and then press OK...

Page 55: ...ote When logged on using a printer driver logging off is not required Login Using Web Image Monitor This section explains how to log onto the machine via Web Image Monitor A Click Login B Enter a logi...

Page 56: ...long the machine is to wait before perform ing Auto Logout A Press the User Tools Counter key B Press System Settings C Press Timer Settings D Press Auto Logout Timer If the setting to be specified do...

Page 57: ...py Prevention A Using the printer driver specify the printer settings for unauthorized copy prevention See p 55 Specifying Printer Settings for Unauthorized Copy Prevention Printer Driver Setting Data...

Page 58: ...attern for instance a warn ing such as No Copying in a printed document appears conspicuously in printed copies Important Unauthorized copy prevention discourages unauthorized copying and will not nec...

Page 59: ...opies Text and images in the document are grayed out in printed copies Limitation To gray out copies of data security for copying documents when they are cop ied or stored in the Document Server the o...

Page 60: ...cument is registered as a user stamp the machine does not beep the file registered as a user stamp is grayed out and no entry is added to the unauthorized copying log Printing Limitations The followin...

Page 61: ...Settings for Unauthorized Copy Prevention Printer Driver Setting Using the printer driver specify the printer settings for unauthorized copy pre vention Reference To use the printer function under the...

Page 62: ...see p 53 Data Security for Copy ing Reference To use the printer function under the User Authentication you must enter the login user name and password for the printer driver For details see the print...

Page 63: ...or Copying Preparation For details about logging on and logging off with administrator authentica tion see p 21 Logging on Using Administrator Authentication p 22 Log ging off Using Administrator Auth...

Page 64: ...ect Share stored print files also you can share these files Choosing a Locked Print file Using the printer driver specify a Locked Print file Reference If user authentication has been enabled you must...

Page 65: ...ecified via Web Image Monitor For details see the Web Image Monitor Help Preparation For details about logging on and logging off with user authentication see p 48 Login Using the Control Panel p 48 L...

Page 66: ...Print Jobs C Press Locked Print Job List D Select the file E Press Delete F Enter the password of the Locked Print file and then press OK G Press Yes Deleting Passwords of Locked Print Files If the fi...

Page 67: ...invalid password is entered ten times This section explains how to unlock files Only the file administrator can unlock files For details about Enhance File Protection see p 113 Specifying the Extende...

Page 68: ...ils see the Web Image Monitor Help The default access permission for the file creator owner is Read only You can also specify the access permission Password for Stored Files Passwords for stored files...

Page 69: ...out logging on and logging off with administrator authentica tion see p 21 Logging on Using Administrator Authentication p 22 Log ging off Using Administrator Authentication Important If files become...

Page 70: ...an select more than one users By pressing All Users you can select all the users H Press Exit I Select the user who you want to assign an access permission to and then select the permission Select the...

Page 71: ...lains how to specify the access privileges and then store a file in the Document Server under the scanner or fax function A Press Store File B Press Access Privileges Note When using facsimile functio...

Page 72: ...usly Stored Files This section explains the authentication process for accessing a file stored in the Document Server under the scanner or fax function The scanner screen is used to illustrate the pro...

Page 73: ...ied by the file creator owner or user administrator Specify the users and their access permission to files stored by a particular user Only those users granted access permission can access stored file...

Page 74: ...settings E Select the user or group F Press Protection G Under Protect File s press Program Change Delete for Permissions for Users Groups If the setting to be specified does not appear press TNext to...

Page 75: ...creator owner or file administrator Specify passwords for the stored files Provides increased protection against unauthorized use of files Preparation For details about logging on and logging off with...

Page 76: ...explains how to unlock files Only the file administrator can unlock files For details about Enhance File Protection see p 113 Specifying the Extended Security Functions Preparation For details about...

Page 77: ...ibit users from directly entering telephone numbers e mail addresses or Folder Path in order to send files If you set Restrict Use of Destinations to Off Restrict Adding of User Destina tions appears...

Page 78: ...ols D Press Extended Security E Press On for Restrict Use of Destinations F Press OK G Press the User Tools Counter key Reference This can also be specified using Web Image Monitor or SmartDeviceMon i...

Page 79: ...pecified by a user granted full control or the user administrator You can specify who is allowed to access the data in the address book By making this setting you can prevent the data in the address b...

Page 80: ...ions for Users Groups H Press New Program I Select the users or groups to register You can select more than one users By pressing All Users you can select all the users J Press Exit K Select the user...

Page 81: ...address book may take a long time Up to three minutes The time it takes to encrypt the data in the address book depends on the num ber of registered users The machine cannot be used during encryption...

Page 82: ...ecurity E Press On for Encrypt Address Book F Press Change for Encryption Key G Enter the encryption key and then press OK Enter the encryption key using up to 32 alphanumeric characters H Press Encry...

Page 83: ...acity and the method of erasing the data this ac tion may take a few hours Once you start the Erase All Memory function no other machine operation is possible until the function completes or you quit...

Page 84: ...s overwriting will only be done after the job is completed Preparation For details about logging on and logging off with administrator authentica tion see p 21 Logging on Using Administrator Authentic...

Page 85: ...pleted the temporary data will remain on the hard disk un til the main power switch is next turned on and overwriting is resumed If the overwriting method is changed while overwriting is in progress t...

Page 86: ...fter it has been printed or deleted from the Document Server 5 Data stored in the Address Book can be encrypted for security For details see p 75 Encrypting the Data in the Address Book 6 Image overla...

Page 87: ...ress Book printer fonts downloaded by users applications using Embedded Software Architecture SSL server certificates and the machine s network settings Note Before erasing the hard disk you can back...

Page 88: ...turned off during overwriting Note If the main power is turned off when Erase All Memory is in progress overwriting will start again when you next turn on the main power If an error occurs before ove...

Page 89: ...ch machine settings can be modified The following types of administrator are available User Administrator File Administrator Network Administrator Machine Administrator Reference For details see p 11...

Page 90: ...Off no menu protect limitation is applied To limit access to the fullest extent select Level 2 For details about the menu protect level for each function see p 146 User Administrator Settings Note Th...

Page 91: ...Management and Network Management to On A Press the User Tools Counter key B Press Facsimile Features C Press Administrator Tools D Press Menu Protect If the setting to be specified does not appear pr...

Page 92: ...ols Counter key B Press Printer Features C Press Maintenance D Press Menu Protect E Select the menu protect level and then press OK F Press the User Tools Counter key Scanner Functions Note To specify...

Page 93: ...Menu Protect 87 4 D Press Menu Protect E Select the menu protect level and then press OK F Press the User Tools Counter key...

Page 94: ...administrator Specify the functions available to registered users By making this setting you can limit the functions available to users Preparation For details about logging on and logging off with a...

Page 95: ...F Press Auth Info G In Available Functions select the functions you want to specify If the setting to be specified does not appear press TNext to scroll down to other settings H Press OK I Press Exit...

Page 96: ...strator procedures 1 and customer engineer procedures 2 1 Deleting all log information Changing the settings of Job Log function Chang ing the settings of Access Log function Changing the settings of...

Page 97: ...machine you can prevent information leakage A Press the User Tools Counter key B Press System Settings C Press Administrator Tools D Press Delete All Logs If the setting to be specified does not appea...

Page 98: ...log server to check the history data and identify unauthorized access For details about Web SmartDeviceMonitor Professional IS Standard contact your local dealer For details about the transfer log set...

Page 99: ...ther to enable or disable the function for each protocol By making this setting you can specify which protocols are available and so pre vent unauthorized access over the network Preparation For detai...

Page 100: ...le will be from 192 168 15 16 to 192 168 15 20 Limitation Using access control you can limit access involving LPD RCP RSH FTP IPP DIPRINT Web Image Monitor SmartDeviceMonitor for Client or DeskTop Bin...

Page 101: ...rea network LAN Select Level 0 to use this setting if no information needs to be protected You can use the control panel to select the security level for the entire network If you change this setting...

Page 102: ...ct Level 0 Level 1 or Level 2 F Press OK G Press Exit H Press the User Tools Counter key Status of Functions under each Network Security Level Available Unavailable U Port is open Port is closed Autom...

Page 103: ...DIPRINT LPR FTP Port 21 U U U RFU Port 10021 U U U RSH RCP SNMP SNMP v1v2 Setting Browse SNMP v3 SNMP Encryption TELNET SSDP Port 1900 U U NBT Port 137 138 U U SSL SSL TLS Encryption Mode mDNS SMB Net...

Page 104: ...for the driver used for the machine and the user s computer Reference See p 113 Changing the Extended Security Functions Group Passwords for PDF Files DeskTopBinder s PDF Direct Print function allows...

Page 105: ...t them from being analyzed Reference See p 113 Changing the Extended Security Functions Preparation For details about logging on and logging off with administrator authentica tion see p 21 Logging on...

Page 106: ...e network administrator On the machine specify the group password for PDF files By using a PDF group password you can enhance security and so protect pass words from being analyzed Preparation For det...

Page 107: ...onitor Help IPP Authentication Password This can be specified by the network administrator Specify the IPP authentication passwords for the machine using Web Image Monitor By making this setting you c...

Page 108: ...Enhanced Network Security 102 5 H Click Apply IPP authentication is specified I Log off from the machine...

Page 109: ...tall a server certificate in the machine negotiate a secure connection and encrypt transmitted data SSL Secure Sockets Layer A To access the machine from a user s computer request for the SSL server c...

Page 110: ...flow certificate issued by a certificate authority A Creating the server certificate Create the server certificate using Web Image Monitor The application procedure after creating the certificate depe...

Page 111: ...on Enter the login user name and login password D Click Configuration click Security and then click Certificate E Click Create F Make the necessary settings Reference For details about the displayed i...

Page 112: ...Click Request F Make the necessary settings Reference For details about the displayed items and selectable items see Web Image Monitor Help G Click OK Requesting appears for Certificate Status in the...

Page 113: ...e printer C Log onto the machine The network administrator can log on Enter the login user name and login password D Click Configuration click Security and then click Certificate The Certificate page...

Page 114: ...machine s address in the address bar to access the printer C Log onto the machine The network administrator can log on Enter the login user name and login password D Click Configuration click Securit...

Page 115: ...iew Certificate The Certificate dialog box appears To be able to respond to inquiries from users about such problems as expiry of the certificate check the contents of the certificate B On the General...

Page 116: ...ou can change the security level Preparation For details about logging on and logging off with administrator authentica tion see p 21 Logging on Using Administrator Authentication p 22 Log ging off Us...

Page 117: ...also be specified using Web Image Monitor For details see the Web Image Monitor Help SNMPv3 Encryption This can be specified by the network administrator When using SmartDeviceMonitor for Admin or ano...

Page 118: ...administrator s Encryption Password setting and Encryption Key in SNMP Authentication Information in SmartDeviceMonitor for Admin in addition to specifying Permit SNMP V3 Communication on the machine...

Page 119: ...unctions and how to specify them For details about when to use each function see the corresponding chapters Changing the Extended Security Functions To change the extended security functions display t...

Page 120: ...an be specified by the user administrator Encrypt the data in the ma chine s address book Reference See p 75 Encrypting the Data in the Address Book On Off Note Default Off Restrict Use of Destination...

Page 121: ...n personal information can be displayed as so users cannot be identified Because no information identifying registered users can be viewed unauthorized users can be pre vented from obtaining informati...

Page 122: ...t Prohibit Note Default Do not Prohibit Restrict Use of Simple Encryption This can be specified by the network administrator Specify simple encryption when advanced encryption cannot be specified For...

Page 123: ...Settings Guide Authenticate Current Job This can be specified by the machine administrator This setting lets you specify whether or not authentication is required for op erations such as canceling job...

Page 124: ...Complexity Setting and Min imum Character No If you select Level 1 specify the password using a combination of two types of characters selected from upper case letters lower case letters decimal numb...

Page 125: ...ists You can specify whether or not to display destinations and senders by click ing Facsimile Features Administrator Tools Parameter Setting and specifying Bit No 04 and Bit No 05 under Switch 04 Not...

Page 126: ...transmissions shown in the Journal are overwritten each time a further transmission is made To prevent the Transmission History being overwritten perform the follow ing procedures In the default setti...

Page 127: ...be specified by the machine administrator Service mode is used by a customer engineer for inspection or repair If you set the service mode lock to On service mode cannot be used unless the machine adm...

Page 128: ...log onto the machine and cancel the service mode lock Preparation For details about logging on and logging off with administrator authentica tion see p 21 Logging on Using Administrator Authenticatio...

Page 129: ...ording to the information contained in the message Messages Causes Solutions You do not have the privileges to use this function The authority to use the func tion is not specified If this appears whe...

Page 130: ...ct Inquire the user administrator for the correct login user name and login password The number of users regis tered in the address book has reached the maximum limit allowed by Windows Authen ticatio...

Page 131: ...ff Authentication is taking time because of operating condi tions Make sure the LDAP server setting is correct Make sure the network set tings are correct Authentication is not possible while the mach...

Page 132: ...mission for Stored Files Destinations specified using the machine do not appear User authentication may have been disabled while All Users is not specified Re enableuserauthentication and then enable...

Page 133: ...nk We recommend changing the login user name and login password When registering login user names and login passwords you can specify up to 32 alphanumeric characters and symbols Keep in mind that use...

Page 134: ...OK Note When you assign the administrator for the first time enter supervisor E Press Enter for Login Password F Enter a login password and then press OK Note When you assign the administrator for the...

Page 135: ...ange Administrator E Under Supervisor click Change F Press Change for the login user name G Enter the login user name and then press OK H Press Change for the login password I Enter the login password...

Page 136: ...trator D Press System Settings E Press Administrator Tools F Press Program Change Administrator G Press Change for the administrator you wish to reset H Press Change for the login password I Enter the...

Page 137: ...specified Interface Settings Parallel Interface File Transfer The following settings can be specified Delivery Option Capture Server IP Address Fax RX File Transmission Line 1 3 E mail Address IP Fax...

Page 138: ...gement Program Change Administrator Machine Administrator You can change the user name and the full control user s authority Key Counter Management Extended Security Restrict Display of user Informati...

Page 139: ...2 The DataOverwriteSecurity unit option must be installed Copier Document Server Features The following settings can be specified General Features All the settings can be specified Reproduction Ratio...

Page 140: ...ngs SMTP RX File Delivery Settings Administrator Tools The following settings can be specified Program Change Delete Standard Message Store Change Delete Auto Document Program Change Delete Scan Size...

Page 141: ...n be specified Print Error Report Auto Continue Memory Overflow Job Separation Initial Print Job List Memory Usage Memory Usage Copies Blank Page Print Edge Smoothing Toner Saving Printer Language Sub...

Page 142: ...Settings All the settings can be specified Destination List Settings All the settings can be specified Send Settings The following settings can be specified TWAIN Standby Time File Type Priority Comp...

Page 143: ...il All the settings can be specified Auto E mail Notification All the settings can be specified On demand E mail Notification All the settings can be specified File Transfer All the settings can be sp...

Page 144: ...PDF Fixed Password PDF Group Password 1 The PCL option must be installed 2 The PostScript 3 option must be installed Fax General All the settings can be specified Administrator Tools All the settings...

Page 145: ...SmartDeviceMonitor for Admin The following settings can be specified Device Properties Reset Device Reset Current Job Reset All Jobs User Management Tool The following settings can be specified User P...

Page 146: ...d 1 The IEEE802 11b interface unit option must be installed File Transfer SMTP Server Server Name Port No E mail Communication Port E mail Reception Interval Scanner Recall Interval Time Number of Sca...

Page 147: ...ttings via Web Image Monitor The following settings can be specified Device Settings System Device Name Comment Location E mail Reception SMTP E mail Communication Port Auto E mail Notification Progra...

Page 148: ...eration Mode 1 The IEEE802 11b interface unit option must be installed 2 The Bluetooth interface unit option must be installed Network Protocol All the settings can be specified TCP IP All the setting...

Page 149: ...pecified Access Control All the settings can be specified IPP Authentication All the settings can be specified SSL TLS All the settings can be specified Certificate All the settings can be specified S...

Page 150: ...e Protection Auto Delete File in Document Server Delete All Files in Document Server Facsimile Features The following settings can be specified Administrator Tools Stored RX File User Setting Printer...

Page 151: ...ob Printer Print Jobs 1 1 The file administrator can select Delete Delete Password and Unlock Job The file administrator cannot print files Device Settings Auto E mail Notification All the settings ca...

Page 152: ...gement User Management Program Change Administrator User Administrator Extended Security Restrict Use of Destinations Restrict Adding of User Destinations Encrypt Address Book Password Policy Print Ad...

Page 153: ...istrator Authentication Available Settings for File Administrator Program Change Administrator The user administrator settings that can be specified are as follows Login User Name Login Password Chang...

Page 154: ...granted full control Owner This is a user who can store files in the machine and authorize other users to view edit or delete those files File Administrator This is the file administrator Granted aut...

Page 155: ...icate users with the following authorities Read only This is a user assigned Read only authority Edit This is a user assigned Edit authority Edit Delete This is a user assigned Edit Delete authority F...

Page 156: ...y Edit Edit Delete Registration No U Key Display U Name U Select Title U Auth Info User Code LoginUser Name Login Password 1 1 SMTP Authenti cation 1 1 Folder Authenti cation U LDAP Authenti cation 1...

Page 157: ...at U U Facsimile Number U Interna tional TX Mode U Fax Header U Label Insertion U E mail Address E mail Address U Folder Destina tion SMB FTP NCP U SMB Path U FTP Port No U FTP Server Name U FTP Path...

Page 158: ...the list can only be viewed regardless of the menu pro tect level setting Copier Document Server Features The default for Menu Protect is Level 2 Tab Names Settings Menu Protect Off Level 1 Level 2 Ge...

Page 159: ...NARY 1 U Stamp Position For Internal Use Only 1 U Stamp Position CONFIDENTIAL 1 U Stamp Position DRAFT 1 U Stamp Language U User Stamp Program Delete Stamp U Stamp Position 1 U Stamp Format 1 U Stamp...

Page 160: ...ng in Combine U Stamp on Designating Slip Sheet U Stamp Position P1 P2 1 U Stamp Position 1 5 2 5 1 U Stamp Position 1 2 1 U Stamp Position 1 2 1 U Stamp Position P 1 P 2 1 U Stamp Position 1 1 1 2 1...

Page 161: ...U Auto Continue U U Memory Overflow U U Job Separation U U Auto Delete Temporary Print Jobs U U Auto Delete Stored Print Jobs U U Initial Print Job List U U Memory Usage U U Duplex U U Copies U U Bla...

Page 162: ...Lines U U Font Source U U Font Number U U Point Size U U Font Pitch U U Symbol Set U U Courier Font U U Extend A4 Width U U Append CR to LF U U Resolution U U PS Menu 2 Data Format U U Resolution U U...

Page 163: ...st Priority 1 U Destination List Priority 2 U Select Title U Update Delivery Server Destination List U Send Settings TWAIN Standby Time U File Type Priority U Compression Black White U Compression Gra...

Page 164: ...h U Text Size Priority U Original Type Priority U Auto Image Density U Adjust Scan Density U Select Title U Change Initial Mode U Adjust Sound Volume U Program Fax Information U Scan End Reset U TX St...

Page 165: ...nge Delete Auto Document U Program Change Delete Scan Size U Print Journal U Transmission Page Count U Forwarding U Memory Lock RX U ECM U Parameter Setting U Program Special Sender Box Setting Transf...

Page 166: ...Set tings has not been specified General Features Panel Tone U Warm Up Notice U Copy Count Display U Function Priority U Print Priority U Function Reset Timer U Output Copier U Output Document Server...

Page 167: ...uter Name U SMB Work Group U Ethernet Speed U Ping Command U Permit SNMP V3 Communication U Permit SSL TLS Communication U Host Name U Machine Name U Paral lel Inter face 7 Parallel Timing U Parallel...

Page 168: ...ings U Administrator s E mail Address U E mail Communication Port U E mail Reception Interval U Max Reception E mail Size U E mail Storage in Server U Default User Name Password Send 4 U Program Chang...

Page 169: ...nt U Display Clear Print Counter per User U Print Address Book Destination List U U U Address Book Management U U U Address Book Program Change Delete Group U U U AddressBook Program Change DeleteTran...

Page 170: ...tication has not been speci fied Administrator au thentication has been specified Avail able Set tings has been specified Avail able Set tings has not been specified System Device Name U Comment U Loc...

Page 171: ...ame U SMTP Port No U SMTP Authentication U SMTP Auth E mail Address U SMTP Auth User Name SMTP Auth Password 1 SMTP Auth Encryption U POP before SMTP U POP E mail Address U POP User Name POP Password...

Page 172: ...vice U Out of Toner U Toner Almost Empty U Waste Toner Bottle is Full U Add Staple U Paper Misfeed U Cover Open U Out of Paper U Paper Tray Error U Output Tray Full U Unit Connection Error U Duplex Un...

Page 173: ...to Supply Info U Restriction to Device Status Info U Receivable E mail Address Domain Name U E mail Language U File Transfer SMB User Name SMB Password 1 FTP User Name FTP Password 1 NCP User Name NCP...

Page 174: ...Authentication Login Name Attribute U LDAP Authentication Unique Attribute U Integration Server Authentication Printer Job Authentication U Integration Server Authentication Integration Server Name U...

Page 175: ...U Auto Delete Temporary Print Jobs U Auto Delete Stored Print Jobs U Initial Print Job List U Memory Usage U U Duplex U U Copies U U Blank Page Print U U Printer Language U U Edge Smoothing U Toner Sa...

Page 176: ...U U Font Number U U Point Size U U Font Pitch U U Symbol Set U U Courier Font U U Extend A4 Width U U Append CR to LF U U Resolution U U PS Settings 2 Duplex U U Blank Page Print U U Data Format U U R...

Page 177: ...or Tools Program Confidential ID Program Polling ID ECM Memory Lock Reception Program Memory Lock ID Transfer Report Select Dial Push Phone E mail Settings Internet Fax Settings Maximum E mail Size SM...

Page 178: ...munication Result Report Memory Storage Report Polling TX Clear Report Polling RX Result Report Polling RX Reserve Report Confidential File Report LAN Fax Result Report Inclusion of part of image Erro...

Page 179: ...installed 3 The IEEE 1284 interface board option must be installed Category Settings Admin istrator authen tication has not been speci fied Administrator au thentication has been specified Avail able...

Page 180: ...Admin istrator authen tication has not been speci fied Administrator au thentication has been specified Avail able Set tings has been specified Avail able Set tings has not been specified Protocol LP...

Page 181: ...CP Delivery Protocol U AppleTalk AppleTalk U Printer Name U Zone Name U SMB SMB U Workgroup Name U Computer Name U Comment U Notify Print Completion U Rendezvous Rendezvous U Computer Name U Location...

Page 182: ...owing functions require certain options and additional functions Hard Disk overwrite erases function DataOverwriteSecurity Unit Data security for copying function Copy Data Security Unit PDF Direct Pr...

Page 183: ...48 149 E mail Settings 134 138 141 Encrypt Address Book 114 Encrypted Communication Mode 110 Encryption Technology 3 Enhance File Protection 115 Erase All Memory 77 F Fax 138 142 171 File Administrato...

Page 184: ...ng of User Destinations 115 Restrict Display of User Information 115 Restrict Use of Destinations 114 Restrict Use of Simple Encryption 116 S Scan Settings 136 Security 143 Send Settings 136 141 Servi...

Reviews: