Security
15A8-049
Confidential information is handled by information devices everywhere, including computers and printers, and any of
these devices may become a target for malicious third parties at anytime. Attackers may directly gain unauthorized
access to your devices, or indirectly take advantage of negligence or improper use. Either way, you may incur
unanticipated losses when your confidential information is leaked. To counter these risks, the machine is equipped
with a variety of security functions. Set the necessary configuration depending on your network environment.
●
You can configure the best security system by building an environment that inhibits access to printers on
your in-house network via the Internet and using such environment together with the machine's security
features. Preventing Unauthorized Access(P. 226)
◼
Establishing the Basics of Information Security
Protecting the Machine from Unauthorized Access(P. 225)
◼
Preparing for Risks from Negligence or Misuse
Restricting the Machine's Functions (MF244dw / MF232w)(P. 245)
◼
Implementing Robust Security Features
Implementing Robust Security Features (MF244dw / MF232w)(P. 248)
Security
224
Содержание imageclass MF232W
Страница 1: ...MF244dw MF232w MF231 User s Guide USRMA 1398 00 2016 10 en Copyright CANON INC 2016 ...
Страница 35: ... key Press to switch the type of text that is entered LINKS Using the Operation Panel P 33 Basic Operations 29 ...
Страница 66: ...Exiting Sleep Mode Press You can also press any key other than to exit sleep mode Basic Operations 60 ...
Страница 80: ...LINKS Basic Copy Operations P 65 Adjusting Density P 72 Copying 74 ...
Страница 96: ...Managing Documents and Checking the Machine Status P 278 Using the Machine as a Printer 90 ...
Страница 117: ...LINKS Printing a Document P 87 Printing Borders P 109 Printing Watermarks P 112 Using the Machine as a Printer 111 ...
Страница 132: ...LINKS Printing a Document P 87 Various Print Settings P 95 Using the Machine as a Printer 126 ...
Страница 248: ...Configuring Printer Ports P 201 Security 242 ...
Страница 264: ... The machine does not support use of a certificate revocation list CRL Security 258 ...
Страница 287: ...LINKS Remote UI Screens P 275 Using Remote UI MF244dw MF232w 281 ...
Страница 346: ...Troubleshooting 340 ...
Страница 409: ...Third Party Software 15A8 085 For information related to third party software click the following icon Appendix 403 ...
Страница 438: ...Manual Display Settings 15A8 080 Appendix 432 ...
Страница 448: ...Appendix 442 ...
Страница 466: ... 12 JPEG this software is based in part on the work of the Independent JPEG Group ...