Gestetner DSm725e Reference Manual page 4

Gestetner dsm725e: reference manual
Hide thumbs Also See for DSm725e:
Table of Contents

Advertisement

Preventing Unauthorized Copying ..................................................................... 51
Unauthorized Copy Prevention ................................................................................52
Data Security for Copying ........................................................................................53
Printing Limitations...................................................................................................54
Notice .......................................................................................................................55
Printing a Confidential Document ...................................................................... 58
Choosing a Locked Print file ....................................................................................58
Printing a Locked Print File ......................................................................................59
Deleting Locked Print Files ......................................................................................60
Deleting Passwords of Locked Print Files................................................................60
Unlocking Locked Print Files....................................................................................61
Specifying Access Permission for Stored Files ...............................................62
Assigning Users and Access Permission for Stored Files .......................................63
Fax Functions ........................................................................................................65
Specifying Passwords for the Stored Files...............................................................69
Unlocking Files.........................................................................................................70
Restrictions on Destinations.....................................................................................71
Protecting the Address Book .............................................................................73
Address Book Access Permission ...........................................................................73
Encrypting the Data in the Address Book ................................................................75
Deleting Data on the Hard Disk .......................................................................... 77
Overwriting the Data on the Hard Disk.....................................................................77
Preventing Modification of Machine Settings ...................................................83
Menu Protect ........................................................................................................ 84
Set up Menu Protect ................................................................................................84
Limiting Available Functions .............................................................................. 88
Specifying Which Functions are Available ...............................................................88
Managing Log Files .............................................................................................90
Specifying Delete All Logs .......................................................................................91
Transfer Log Setting.................................................................................................92
Preventing Unauthorized Access.......................................................................93
Enabling/Disabling Protocols ...................................................................................93
Access Control .........................................................................................................94
Specifying Network Security Level...........................................................................95
Encrypting Transmitted Passwords...................................................................98
Driver Encryption Key ..............................................................................................99
Group Password for PDF files................................................................................100
IPP Authentication Password.................................................................................101
iv

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dsm730e

Table of Contents