EasyManua.ls Logo

Aficio MP 2352 - Page 1793

Aficio MP 2352
2331 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Deleting Data on the Hard Disk....................................................................................................................141
Conditions for Use.....................................................................................................................................141
Auto Erase Memory..................................................................................................................................142
Erase All Memory......................................................................................................................................146
6. Managing Access to the Machine
Preventing Changes to Machine Settings....................................................................................................151
Menu Protect..................................................................................................................................................153
Enabling Menu Protect..............................................................................................................................153
Disabling Menu Protect.............................................................................................................................
153
Specifying Menu Protect...........................................................................................................................153
Limiting Available Functions..........................................................................................................................158
Specifying Which Functions are Available.............................................................................................158
Restricting Media Slot Access.......................................................................................................................160
Managing Print Volume per User.................................................................................................................162
Limiting Print Volume per User..................................................................................................................162
Specifying the Maximum Use Count per User........................................................................................166
Checking Print Volume per User...............................................................................................................168
Printing a List of Print Volume Use Counters............................................................................................169
Clearing Print Volume Use Counters........................................................................................................171
Managing Log Files.......................................................................................................................................174
Using the Control Panel to Specify Log File Settings..............................................................................174
Using Remote Communication Gate S to Manage Log Files.................................................................176
Using Web Image Monitor to Manage Log Files...................................................................................176
Logs That Can Be Managed Using Web Image Monitor......................................................................185
7. Enhanced Network Security
Preventing Unauthorized Access..................................................................................................................203
Access Control...........................................................................................................................................203
Enabling and Disabling Protocols............................................................................................................204
Specifying Network Security Level..........................................................................................................212
Encrypting Transmitted Passwords...............................................................................................................216
Specifying a Driver Encryption Key.........................................................................................................216
Specifying an IPP Authentication Password............................................................................................217
Protection Using Encryption..........................................................................................................................219
4

Table of Contents

Related product manuals