EasyManua.ls Logo

Ricoh Pro C751EX - Page 5

Ricoh Pro C751EX
296 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Changing the Owner of a Document.........................................................................................................79
Specifying Access Permissions for Files Stored Using the Scanner Function..........................................79
Specifying User and Access Permissions for Files Stored by a Particular User.......................................83
Specifying Passwords for Stored Files........................................................................................................84
Unlocking Files.............................................................................................................................................85
5. Securing Information Sent over the Network or Stored on Hard Disk
Preventing Information Leakage Due to Unauthorized Transmission...........................................................87
Restricting Destinations................................................................................................................................87
Using S/MIME to Protect E-mail Transmission..............................................................................................89
E-mail Encryption.........................................................................................................................................89
Attaching an Electronic Signature..............................................................................................................91
Protecting the Address Book...........................................................................................................................96
Configuring Address Book Access Permissions.........................................................................................96
Encrypting Data in the Address Book.........................................................................................................97
Encrypting Data on the Hard Disk................................................................................................................100
Enabling the Encryption Settings..............................................................................................................100
Printing the Encryption Key.......................................................................................................................104
Updating the Encryption Key....................................................................................................................105
Canceling Data Encryption......................................................................................................................106
Deleting Data on the Hard Disk....................................................................................................................108
Conditions for Use.....................................................................................................................................108
Auto Erase Memory..................................................................................................................................109
Erase All Memory......................................................................................................................................112
6. Managing Access to the Machine
Preventing Changes to Machine Settings....................................................................................................117
Menu Protect..................................................................................................................................................118
Enabling Menu Protect..............................................................................................................................118
Disabling Menu Protect.............................................................................................................................118
Specifying Menu Protect...........................................................................................................................118
Limiting Available Functions..........................................................................................................................122
Specifying Which Functions are Available.............................................................................................122
Managing Log Files.......................................................................................................................................124
Using Web Image Monitor to Manage Log Files...................................................................................124
3

Table of Contents

Other manuals for Ricoh Pro C751EX

Related product manuals