EasyManua.ls Logo

Ricoh Metis MF4 User Manual

Ricoh Metis MF4
163 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Top Page
User Guide
IM
C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510A/C4510/C4510A/C5510/C5510A/C
6010
Page Top
Copyright © 2023 D0E37529-EN 2023/2
Enter the keyword(s) you search
Question and Answer IconNeed help?

Do you have a question about the Ricoh Metis MF4 and is the answer not in the manual?

Ricoh Metis MF4 Specifications

General IconGeneral
BrandRicoh
ModelMetis MF4
CategoryPrinter
LanguageEnglish

Summary

User Guide

Checking the Indicators, Icons, and Messages on the Control Panel

When an Icon is Displayed with a Message

Details on interpreting icons displayed with messages to resolve machine issues like paper jams or toner depletion.

Collecting Logs

Deleting All Logs

Procedure to clear all job, access, and eco-friendly logs stored on the machine.

Disabling Log Transfer to the Log Collection Server

Procedure to disable log transfer to a log collection server using the control panel or Web Image Monitor.

Operating the Machine Giving Priority to Job Log Maintenance

Configures settings to prioritize job log maintenance, including restrictions when log limits are reached.

Date/Time/Timer

Daylight Saving Time

Configuration for daylight saving time periods, including start/end times and offset adjustments.

Logging in to Web Image Monitor

Changing the Login Password by Using Web Image Monitor

Steps for administrators to change the user code or login password via Web Image Monitor.

Methods for Sending/Receiving a Fax

G3 fax

Details on sending and receiving faxes using a public telephone line.

Names and Functions of the Control Panel

Touch Panel/Interface

Overview of the control panel's touch screen and interfaces for external devices and USB memory.

Reception Settings

Action on Receiving File

Specifies how received fax documents are processed: stored, forwarded, printed, or memory locked.

Registering a User in the Address Book and Specifying the Login Information

For Basic Authentication

Setting up login user name and password for users authenticating via the machine's address book.

Registering/Changing/Deleting Fax Numbers in the Address Book

Registering a Fax Number and Send Conditions

Guide to adding fax destinations and their associated send conditions to the address book.

Settings for Administrator

Data Management

Administrator settings for managing machine data, including log collection, erasure, and encryption.

File Management

Administrator settings for managing files stored on the machine, including encryption and deletion.

Security

Administrator settings for network security, access control, and extended security features.

Specifying Access Privileges for Documents Saved in Document Server

Specifying Access Privileges on Documents Stored in the Machine

Methods to set read/edit permissions for documents in the Document Server to prevent unauthorized access.

Accessing to Web Image Monitor

Confirming the machine status or settings on the top page of Web Image Monitor

How to view machine status and consumables information upon accessing the Web Image Monitor interface.

Operating or Configuring the Machine from Computer (Web Image Monitor)

Useful functions available by using Web Image Monitor

Overview of capabilities like checking status, configuring settings, and managing documents via Web Image Monitor.

When a Message Appears and the Machine Cannot Be Operated

Message

Troubleshooting specific error messages that prevent machine operation and their corresponding solutions.

Access Control

Limiting Machine Access

Restricting access to the machine by specifying allowed IP addresses or using a firewall.

Disabling Unused Protocols

Procedure to disable unnecessary network protocols to enhance machine security.

Specifying the Security Level

Selecting and configuring security levels to control protocols, ports, and encryption algorithms.

Encrypting Data to Prevent Data Leaks Caused by a Stolen or Disposed Machine

Encrypting Data on the Internal Storage

Process for encrypting machine data to safeguard against leaks when the device is stolen or disposed of.

Initializing the Machine with the Erase All Memory Function

Steps to erase all data and initialize the machine's memory for relocation or disposal.

Limiting Available Functions

Specify the functions available to registered users

Configuring which functions are accessible to users to prevent unauthorized operations.

Preparing the Server to Use for User Authentication

Requirements of Server Authentication Used for User Authentication

Details on the server requirements for Windows and LDAP authentication methods.

Registering Standard-Privileges Administrators

Adding Built-in Administrators or Changing the Privileges

Procedure to register new built-in administrators or modify the privileges of existing ones.

Registering External Administrator Groups and Assigning the Standard Administrator Privileges

Steps to register external administrator groups and assign standard administrator privileges.

Using the Supervisor Privilege

Changing the Supervisor Settings

How to change the supervisor's login user name and password for managing administrators.

Usable Characters for User Names and Passwords

Login user name

Guidelines for characters allowed in login user names for supervisors, administrators, and external users.

Registering the LDAP Server

Enter the information for the LDAP Server

Steps to input LDAP server details, including name, server name, port, and authentication method.

Specifying the Policy on Login/Logout

User Lockout

Configures the user lockout function to prevent repeated login attempts with incorrect passwords.

Auto Logout Timer

Sets the period of inactivity after which the machine automatically logs out the user.

Taking Measures to Prevent Security Threats

Preventing unauthorized access by managing the users who can use the machine or the connected network

Methods to restrict access to the machine by managing users and network connections.

Preventing the leak of information by handling files

Measures to protect information leaks from files stored on the machine or transferred via media.

Verifying Users to Operate the Machine (User Authentication)

User Code authentication

Steps to configure user authentication using user codes registered in the machine's address book.

Basic authentication

Registering default function access for users based on their login name and password.

Windows authentication

Configuring the machine to authenticate users via a Windows server's Active Directory.

LDAP authentication

Steps to register and configure an LDAP server for user authentication and function access.

Related product manuals