Managing Logs from the Machine...............................................................................................................145
Specifying Log Collect Settings................................................................................................................ 145
Disabling Log Transfer to the Log Collection Server...............................................................................145
Specifying Delete All Logs........................................................................................................................ 146
Managing Logs from the Log Collection Server..................................................................................... 146
Configuring the Home Screen for Individual Users.................................................................................... 147
Warnings About Using a User's Own Home Screens............................................................................147
Configuring the Browser Settings................................................................................................................. 149
Precautions for Using the Browser Function............................................................................................ 149
Troubleshooting.........................................................................................................................................149
Managing Device Information..................................................................................................................... 151
Exporting Device Information...................................................................................................................152
Importing Device Information...................................................................................................................153
Periodically Importing Device Information..............................................................................................154
Manually Importing the Device Setting Information File of a Server.................................................... 155
Troubleshooting.........................................................................................................................................156
Managing Eco-friendly Counter...................................................................................................................159
Configuring Eco-friendly Counters...........................................................................................................159
Resetting a Machine's Eco-friendly Counter........................................................................................... 160
Resetting Users’ Eco-friendly Counters....................................................................................................160
Managing the Address Book........................................................................................................................161
Specifying Auto Deletion for Address Book Data...................................................................................161
Deleting All Data in the Address Book.................................................................................................... 161
Specifying the Extended Security Functions................................................................................................ 162
Other Security Functions............................................................................................................................... 168
System Status............................................................................................................................................. 168
Checking Firmware Validity......................................................................................................................168
Restricting a Customer Engineer Operation................................................................................................ 169
Additional Information for Enhanced Security............................................................................................ 170
Settings You Can Configure Using the Control Panel............................................................................ 170
Settings You Can Configure Using Web Image Monitor.......................................................................171
Settings You Can Configure When IPsec Is Available/Unavailable....................................................172
4