User Manual
Table Of Contents
- Contents
- Important Safety Instructions
- Basic Operations
- Printing a Document
- Can Be Used Conveniently with a Mobile Device
- Network
- Security
- Using Remote UI
- Setting Menu List
- Troubleshooting (FAQ)
- Maintenance
- Appendix
- SIL OPEN FONT LICENSE
Security
52AC-031
Condential information is handled by information de
vices everywhere, including computers and printers, and any of
these devices may become a target for malicious third parties at anytime. Attackers may directly gain unauthorized
access to your devices, or indirectly take advantage of negligence or improper use. Either way, you may incur
unanticipated losses when your condential information is leaked. To counter these risks, the machine is equipped
with a variety of security functions. Set the necessary conguration depending on your network environment.
● You can congure the best security system b
y building an environment that inhibits access to printers on
your in-house network via the Internet and using such environment together with the machine's security
features.
Preventing Unauthorized Access(P. 209)
◼ Establishing the Basics of Information Security
Protecting the Machine from Unauthorized Access(P. 208)
◼ Preparing for Risks fr
om Negligence or Misuse
Restricting the Machine's Functions(P. 236) Printing a Document Secured by a PIN (Secured Print)
(P.
93)
◼ Implementing Robust Security Features
Implementing Robust Security Features(P. 251)
Security
207