TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................1
How to Read This Manual.................................................................................................................................9
Symbols...........................................................................................................................................................9
IP Address.......................................................................................................................................................9
Setting Up the Machine...................................................................................................................................12
Enhanced Security............................................................................................................................................14
Glossary............................................................................................................................................................15
Ensuring Information Security.....................................................................................................................16
Enhanced Network Security.......................................................................................................................18
Administrators and Users.................................................................................................................................21
Administrators...............................................................................................................................................21
User...............................................................................................................................................................22
The Management Function..............................................................................................................................24
About User Authentication..........................................................................................................................25
Enabling Authentication...................................................................................................................................27
Administrator Authentication...........................................................................................................................29
Registering the Administrator......................................................................................................................32
Changing the Administrator........................................................................................................................40
Using Web Image Monitor.........................................................................................................................42
Using Web Printing Tool.............................................................................................................................43
User Authentication..........................................................................................................................................44
User Code Authentication...............................................................................................................................45
3