EasyManua.ls Logo

Ricoh SP 4520DN - Page 148

Ricoh SP 4520DN
955 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Integration Server Authentication....................................................................................................................53
Printer Job Authentication................................................................................................................................
57
Printer Job Authentication Levels.................................................................................................................57
Printer Job Types.......................................................................................................................................... 57
"authfree" Command................................................................................................................................... 60
Auto Registration to the Address Book........................................................................................................... 61
User Lockout Function...................................................................................................................................... 62
Specifying the User Lockout Function.........................................................................................................63
Canceling Password Lockout......................................................................................................................63
Auto Logout.......................................................................................................................................................64
Authentication Using an External Device....................................................................................................... 65
3. Restricting Printer Usage
Preventing Changes to Administrator Settings............................................................................................... 67
Limiting the Settings that Can Be Changed by Each Administrator..........................................................
67
Prohibiting Users from Making Changes to Settings.................................................................................67
Specifying Menu Protect..................................................................................................................................68
Limiting Available Functions............................................................................................................................ 69
Restricting Media Slot Access......................................................................................................................... 71
Managing Print Volume Per User....................................................................................................................72
Specifying Limitations for Print Volume.......................................................................................................73
Specifying the Default Maximum Use Count.............................................................................................74
Specifying the Maximum Use Count Per User...........................................................................................75
Checking Print Volume Per User................................................................................................................. 76
Printing a List of Print Volume Use Counters...............................................................................................76
Clearing Print Volume Use Counters.......................................................................................................... 77
Configuring the Auto-Reset Function.......................................................................................................... 78
4. Preventing Leakage of Information from Printer
Protecting the Address Book........................................................................................................................... 81
Specifying Address Book Access Permissions...........................................................................................
81
Encrypting Data in the Address Book.........................................................................................................82
Encrypting Data on the Hard Disk.................................................................................................................. 85
Enabling the Encryption Settings.................................................................................................................87
Backing Up the Encryption Key.................................................................................................................. 89
2

Table of Contents

Related product manuals