EasyManua.ls Logo

Ricoh MP C2503 Series

Ricoh MP C2503 Series
662 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Configuring Access Permission for Each User for Stored Files..............................................................185
Specifying Passwords for Stored Files.....................................................................................................187
Unlocking Stored Files..............................................................................................................................188
Managing Locked Print Files.........................................................................................................................190
Deleting Locked Print Files........................................................................................................................190
Changing the Password of a Locked Print File........................................................................................192
Unlocking a Locked Print File....................................................................................................................193
Unauthorized Copy Prevention / Data Security for Copying...................................................................195
Enabling Pattern Printing...........................................................................................................................196
Enabling Detect Data Security for Copying............................................................................................197
Printing User Information on Paper...............................................................................................................199
Enforced Storage of Documents to be Printed on a Printer........................................................................201
7. Managing the Machine
Managing Log Files.......................................................................................................................................203
Using Web Image Monitor to Manage Log Files.......................................................................................204
Logs That Can Be Managed Using Web Image Monitor......................................................................204
Attributes of Logs You Can Download....................................................................................................209
Specifying Log Collect Settings................................................................................................................234
Specifying Log Encryption........................................................................................................................235
Downloading Logs....................................................................................................................................236
Number of Logs That Can Be Kept on the Machine...............................................................................236
Notes on Operation When the Number of Log Entries Reaches Maximum........................................238
Printer Job Logs..........................................................................................................................................240
Deleting All Logs........................................................................................................................................241
Disabling Log Transfer to the Log Collection Server...............................................................................241
Managing Logs from the Machine...............................................................................................................242
Disabling Log Transfer to the Log Collection Server...............................................................................242
Specifying Delete All Logs........................................................................................................................242
Managing Logs from the Log Collection Server.....................................................................................243
Configuring the Home Screen for Individual Users....................................................................................244
Warnings About Using User's Own Home Screens...............................................................................244
Configuring the Browser Functions...............................................................................................................246
Precautions for Using the Browser Function............................................................................................246
5

Table of Contents

Related product manuals