Operation Manual

2-31
Installing and Setting up the Machine > Additional Preparations for the Administrator
Additional Preparations for the Administrator
In addition to the information provided in this chapter, the administrator of this machine should check the following, and
configure the settings as needed.
To Send Documents to a PC
To send a document that has been loaded, you need to create a folder to receive the document on your computer.
For details, refer to Preparation for Sending a Document to a PC on page 3-35
.
To E-mail Scanned Images
When sending documents by E-mail or to FTP, it may be useful to store the destinations in the Address Book. For each
registration method, refer to Registering Destinations in the Address Book on page 3-45
.
To Strengthen the Security
This machine is shipped with two default users registered รณ one with Machine Administrator rights, and another with
Administrator rights. Logging in as this user will allow you to configure all settings; therefore, please change the login
user name and password.
In addition, this machine is equipped with user authentication function, which can be configured to limit the access to this
machine to only those who have a registered login name and password. For each setting procedure, refer to User
Authentication and Accounting (User Login, Job Accounting) (page 9-1).
I want to... Function Reference page
Restrict the users of the machine.
User Login page 9-2
Authentication Security page 9-6
Auto Panel Reset page 8-54
ID Card Settings*
1
page 9-26
Restrict the basic functions that can be used.
Local Authorization page 9-15
Group Authorization Set. page 9-15
Guest Authorization Set. page 9-18
Prevent another user from handling the
documents stored in the machine.
Custom Box page 5-54
Output the document sent to the machine at the
time when the machine is operated.
Remote Printing page 8-27
Prevent the data stored in the machine from
being leaked.
Data Overwrite*
2
Refer to the
Data
Security Kit (E)
Operation Guide
.
Encryption*
2
PDF Encryption Functions page 6-68
Document Guard*
3
page 8-51
Completely delete the data on the hard disk
before disposing of the machine.
Data Sanitization page 8-50
Record the operation history of users.
Login History Settings page 8-40
Device Log History Settings page 8-41
Secure Comm. Error Log page 8-42