User's Manual
Table Of Contents
- Contents
- Important Safety Instructions
- Basic Operations
- Copying
- Faxing
- Configuring Initial Settings for Fax Functions
- Sending Faxes
- Receiving Faxes
- Sending and Receiving Faxes According to Your Purposes
- Checking Status and Log for Sent and Received Documents
- Importing/Exporting Address Book Data with the Supplied Software
- Sending Faxes from Your Computer (PC Fax)
- Using the Machine as a Printer
- Printing from a Computer
- Printing a Document
- Canceling Prints
- Checking the Printing Status
- Various Print Settings
- Enlarging or Reducing
- Switching 1-Sided and 2-Sided Printing (MF249dw / MF247dw)
- Collating Printouts by Page
- Printing Multiple Pages onto One Sheet
- Printing Posters
- Printing Booklet (MF249dw / MF247dw)
- Printing Borders
- Printing Dates and Page Numbers
- Printing Watermarks
- Selecting Document Type
- Saving Toner
- Combining and Printing Multiple Documents
- Configuring Print Settings to Your Needs
- Printing from a Computer
- Using the Machine as a Scanner
- Preparing to Use the Machine as a Scanner
- Scanning from the Machine
- Scanning from a Computer
- Convenient Scanning with a Machine-Based Operation (MF249dw / MF247dw)
- Can Be Used Conveniently with a Mobile Device
- Network
- Connecting to a Network
- Viewing Network Settings
- Configuring the Machine for Printing or Faxing from a Computer
- Configuring Scan Settings (E-Mail/Shared Folders) (MF249dw / MF247dw)
- Configuring the Machine for Your Network Environment
- Security
- Using Remote UI
- Setting Menu List
- Troubleshooting
- Maintenance
- Appendix
- SIL OPEN FONT LICENSE
Security
1469-079
Condential information is handled b
y information devices everywhere, including computers and printers, and any of
these devices may become a target for malicious third parties at anytime. Attackers may directly gain unauthorized
access to your devices, or indirectly take advantage of negligence or improper use. Either way, you may incur
unanticipated losses when your condential information is leaked. To counter these risks, the machine is equipped
with a variety of security functions. Set the necessary conguration depending on your network environment.
● Y
ou can congure the best security system by building an environment that inhibits access to printers on
your in-house network via the Internet and using such environment together with the machine's security
features.
Preventing Unauthorized Access(P. 394)
◼ Establishing the Basics of Information Security
Protecting the Machine from Unauthorized Access(P. 393)
◼ Pr
eparing for Risks from Negligence or Misuse
Restricting the Machine's Functions(P. 412)
◼ Implementing Robust Security Featur
es
Implementing Robust Security Features (P. 424)
Security
392