Configuring Access Permission for Each User for Stored Files.............................................................. 183
Specifying Passwords for Stored Files.....................................................................................................
185
Unlocking Stored Files.............................................................................................................................. 186
Managing Locked Print Files.........................................................................................................................188
Deleting Locked Print Files........................................................................................................................ 188
Changing the Password of a Locked Print File........................................................................................190
Unlocking a Locked Print File....................................................................................................................191
Unauthorized Copy Prevention / Data Security for Copying................................................................... 193
Enabling Pattern Printing...........................................................................................................................194
Enabling Detect Data Security for Copying............................................................................................195
Printing User Information on Paper...............................................................................................................197
Enforced Storage of Documents to be Printed on a Printer........................................................................199
7. Managing the Machine
Managing Log Files.......................................................................................................................................201
Using Web Image Monitor to Manage Log Files.......................................................................................
202
Logs That Can Be Managed Using Web Image Monitor......................................................................202
Attributes of Logs You Can Download.................................................................................................... 208
Specifying Log Collect Settings................................................................................................................231
Specifying Log Encryption........................................................................................................................ 232
Downloading Logs.................................................................................................................................... 233
Number of Logs That Can Be Kept on the Machine...............................................................................234
Notes on Operation When the Number of Log Entries Reaches Maximum........................................ 235
Printer Job Logs..........................................................................................................................................237
Deleting All Logs........................................................................................................................................238
Disabling Log Transfer to the Log Collection Server...............................................................................238
Managing Logs from the Machine...............................................................................................................239
Disabling Log Transfer to the Log Collection Server...............................................................................239
Specifying Delete All Logs........................................................................................................................239
Managing Logs from the Log Collection Server..................................................................................... 240
Configuring the Home Screen for Individual Users.................................................................................... 241
Warnings About Using User's Own Home Screens...............................................................................241
Configuring the Browser Functions...............................................................................................................243
Precautions for Using the Browser Function............................................................................................ 243
5