LDAP Authentication..............................................65
LDAP Authentication - Operational Requirements
for LDAP Authentication........................................65
Locked Print............................................................97
Log off (Administrator)..........................................35
Log on (Administrator)..........................................34
Login.......................................................................17
Logout.....................................................................17
M
Machine Administrator.........................................24
Machine Administrator Settings.........................253
Menu Protect...............................................143, 145
N
Network Administrator..........................................24
Network Administrator Settings.........................264
Network Security Level.......................................165
O
Operational Issues..............................................244
Overwriting Data on the Hard Disk...................135
Owner..................................................................273
P
Password for Stored Files...................................103
Password Policy...................................................213
Print & Delete Scanner Journal...........................215
Printer...................................................................310
Printer Functions...................................................285
Printer Job Authentication.....................................80
Printer Job Authentication Levels..........................80
Printer Job Types....................................................81
Printing the Encryption Key.................................131
R
Read-only....................................................273, 275
Registered User.............................................17, 275
Registering the Administrator................................30
Remote Service....................................................213
Restrict Adding of User Destinations..................211
Restrict Display of User Information...................211
Restrict Use of Destinations.................................210
Restrict Use of Simple Encryption.......................212
Restrictions on Destinations................................115
S
S/MIME..............................................................117
Scanner................................................................314
Scanner Features.................................................290
Security Functions................................................215
Self-Signed Certificate........................................175
Service Mode Lock.............................................217
Settings by SNMP v1 and v2.............................211
SNMPv3..............................................................181
SSL........................................................................178
SSL (Secure Sockets Layer)................................174
SSL / TLS Encryption...........................................179
Stored RX File User Setting.................................215
Supervisor......................................................24, 249
Symbols..................................................................11
System Settings....................................................295
T
telnet.....................................................................206
Transfer Log Setting.............................................152
Transfer to Fax Receiver.....................................212
Transmitted Passwords........................................169
Type of Administrator..........................................143
U
Unauthorized Copy Prevention............................91
Update Firmware................................................213
User..................................................................17, 37
User Administrator...............................................275
User Administrator Settings................................271
User Authentication............................17, 38, 41, 83
User Code Authentication.....................................42
User Lockout Function...........................................85
User Settings - Control Panel Settings................278
User Settings - Web Image Monitor Settings..........
..............................................................................302
W
Webpage............................................................325
Windows Authentication.......................................53
Windows Authentication - Operational
Requirements for Kerberos...................................53
Windows Authentication - Operational
Requirements for NTLM Authentication...............53
332