EasyManuals Logo

Ricoh C9100 User Manual

Ricoh C9100
236 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #4 background imageLoading...
Page #4 background image
Auto Registration to the Address Book........................................................................................................... 44
Automatically Registered Address Book Items.......................................................................................... 44
User Lockout Function...................................................................................................................................... 45
Specifying the User Lockout Function.........................................................................................................46
Canceling Password Lockout......................................................................................................................46
Auto Logout.......................................................................................................................................................47
3. Restricting Machine Usage
Preventing Changes to Administrator Settings............................................................................................... 49
Limiting the Settings that Can Be Changed by Each Administrator..........................................................49
Prohibiting Users from Making Changes to Settings.................................................................................49
Limiting Available Functions............................................................................................................................ 50
4. Preventing Leakage of Information from Machines
Protecting the Address Book........................................................................................................................... 51
Specifying Address Book Access Permissions........................................................................................... 51
Encrypting Data in the Address Book.........................................................................................................53
Encrypting Data on the Machine.................................................................................................................... 55
Enabling the Encryption Settings.................................................................................................................56
Backing Up the Encryption Key.................................................................................................................. 58
Updating the Encryption Key......................................................................................................................59
Canceling Data Encryption.........................................................................................................................61
Deleting Data on the Machine........................................................................................................................63
Auto Erase Memory.....................................................................................................................................63
Erase All Memory........................................................................................................................................ 66
5. Enhanced Network Security
Access Control..................................................................................................................................................71
Enabling and Disabling Protocols...................................................................................................................72
Enabling and Disabling Protocols Using the Control Panel......................................................................75
Enabling and Disabling Protocols Using Web Image Monitor................................................................75
Specifying Network Security Levels................................................................................................................77
Specifying Network Security Levels Using the Control Panel.................................................................. 77
Specifying Network Security Level Using Web Image Monitor.............................................................. 78
Status of Functions under Each Network Security Level........................................................................... 78
Protecting Communication Paths via a Device Certificate............................................................................ 81
2

Table of Contents

Other manuals for Ricoh C9100

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Ricoh C9100 and is the answer not in the manual?

Ricoh C9100 Specifications

General IconGeneral
BrandRicoh
ModelC9100
CategoryPrinter
LanguageEnglish

Related product manuals