Deleting Data on the Hard Disk....................................................................................................................141
Conditions for Use.....................................................................................................................................141
Auto Erase Memory..................................................................................................................................142
Erase All Memory......................................................................................................................................146
6. Managing Access to the Machine
Preventing Changes to Machine Settings....................................................................................................151
Menu Protect..................................................................................................................................................153
Enabling Menu Protect..............................................................................................................................153
Disabling Menu Protect.............................................................................................................................
153
Specifying Menu Protect...........................................................................................................................153
Limiting Available Functions..........................................................................................................................158
Specifying Which Functions are Available.............................................................................................158
Restricting Media Slot Access.......................................................................................................................160
Managing Print Volume per User.................................................................................................................162
Limiting Print Volume per User..................................................................................................................162
Specifying the Maximum Use Count per User........................................................................................166
Checking Print Volume per User...............................................................................................................168
Printing a List of Print Volume Use Counters............................................................................................169
Clearing Print Volume Use Counters........................................................................................................171
Managing Log Files.......................................................................................................................................174
Using the Control Panel to Specify Log File Settings..............................................................................174
Using Remote Communication Gate S to Manage Log Files.................................................................176
Using Web Image Monitor to Manage Log Files...................................................................................176
Logs That Can Be Managed Using Web Image Monitor......................................................................185
7. Enhanced Network Security
Preventing Unauthorized Access..................................................................................................................203
Access Control...........................................................................................................................................203
Enabling and Disabling Protocols............................................................................................................204
Specifying Network Security Level..........................................................................................................212
Encrypting Transmitted Passwords...............................................................................................................216
Specifying a Driver Encryption Key.........................................................................................................216
Specifying an IPP Authentication Password............................................................................................217
Protection Using Encryption..........................................................................................................................219
4