Preventing Data Leaks Due to Unauthorized Transmission
101
3
F Press [OK].
G Press the {User Tools} key.
Reference
This can also be specified using Web Image Monitor or SmartDeviceMon-
itor for Admin. For details, see the Help for each application.
BelliniC3-EN_Sec_F_FM_forPaper.book Page 101 Friday, December 16, 2005 9:16 AM