2-47
Installing and Setting up the Machine > Additional Preparations for the Administrator
Additional Preparations for the Administrator
In addition to the information provided in this chapter, the administrator of this machine should check the following, and 
configure the settings as needed.
Sending Documents to a PC
To Send to a Shared Folder (Send to Folder (SMB))
To send a document that has been loaded, you need to create a shared folder to receive the document on your computer. 
Preparation for Sending a Document to a Shared Folder in a PC (page 3-12)
To E-mail Scanned Images (Send as E-mail)
You can send a scanned original image as an E-mail attachment. 
E-mail Settings (page 2-55)
Strengthening the Security
This machine is shipped with two default users registered one with Machine Administrator rights, and another with 
Administrator rights.Logging in as this user will allow you to configure all settings; therefore, please change the login 
user name and password.
In addition, this machine is equipped with user authentication function, which can be configured to limit the access to this 
machine to only those who have a registered login name and password.
User Authentication and Accounting (User Login, Job Accounting) (page 9-1)
I want to... Function Reference page
Restrict the users of the machine.
User Login page 9-2
Authentication Security page 9-5
Auto Panel Reset page 8-53
ID Card Settings
*1
*1 The optional Card Authentication Kit is required.
page 9-32
Restrict the basic functions that can be used.
Local Authorization page 9-20
Group Authorization Set. page 9-21
Guest Authorization Set. page 9-24
Prevent another user from handling the 
documents stored in the machine.
Custom Box
*2
*2 A hard disk is required.
page 5-45
Output the document stored in the machine at 
the time when user operates the device via 
operation panel.
Remote Printing
page 8-26
Prevent the data stored in the machine from 
being leaked.
Data Overwrite
*3
*3 The optional Data Security Kit is required.
Refer to the 
Data 
Security Kit (E) 
Operation Guide
.
Encryption
*3
PDF Encryption Functions page 6-61
Completely delete the data on the machine 
before disposing of the machine.
Data Sanitization page 8-50