Preventing Information Leakage (Security Functions)
CJQ608
• You can protect documents from unauthorized access and stop them from being copied without
permission.
• You can control the use of the machine, as well as prevent machine settings from being changed
without authorization.
• By setting passwords, you can prevent unauthorized access via the network.
• You can erase or encrypt the data on the hard disk to minimize the risk of information leakage.
• You can limit the usage of functions for each user.
• See Security Guide.
Centrally Controlling Scan Conditions and Distribution
You can use the distributed scan management (DSM) system in Windows Server 2008 R2/2012 to
manage the destinations and scan settings for each individual user in a group and to use the information
when distributing scanned data.
You can also use this system to centrally manage information about people using the network and the
machine's scanner functions. Both delivered files and user information can be controlled.
What You Can Do with This Machine
21
Содержание Pro C5200s
Страница 2: ......
Страница 12: ...10 ...
Страница 94: ...2 Getting Started 92 ...
Страница 99: ...2 Select the paper size 3 Place the originals and then press the Start key Auto Reduce Enlarge 97 ...
Страница 119: ...2 Enter the number of copy sets with the number keys 3 Press Continue Copying starts again Sort 117 ...
Страница 157: ...3 Press OK Specifying Scan Settings 155 ...
Страница 158: ...5 Scan 156 ...
Страница 162: ...6 Document Server 160 ...
Страница 240: ...For details about Function Compatibility see Function Compatibility Troubleshooting 9 Troubleshooting 238 ...
Страница 286: ...9 Troubleshooting 284 ...
Страница 296: ...MEMO 294 ...
Страница 297: ...MEMO 295 ...
Страница 298: ...MEMO 296 EN GB EN US D260 7012 ...
Страница 299: ... 2016 ...
Страница 300: ...D260 7012 US EN GB EN ...