Settings To Configure Using Web Image Monitor - Ricoh C2828 Function Manual

Scanner reference
Hide thumbs Also See for C2828:
Table of Contents

Advertisement

8. Specifying the Extended Security Functions
• For Basic Authentication settings, see "Basic Authentication".
• For Administrator Authentication settings, see "Enabling Administrator Authentication".
• For the Extended Security settings, see "Specifying the Extended Security Functions".
• For Network Security Level settings, see "Preventing Unauthorized Access".
• For Service Mode Lock settings, see "Limiting Machine Operation to Customers Only".
• For Machine Data Encryption settings, see "Encrypting Data on the Hard Disk".
• For Stored Reception File User settings, see "Other Security Functions".
• For Menu Protect settings, see "Menu Protect".
• p.83 "If User Authentication is Specified"
• p.46 "Basic Authentication"
• p.27 "Enabling Administrator Authentication"
• p.209 "Specifying the Extended Security Functions"
• p.157 "Preventing Unauthorized Access"
• p.217 "Limiting Machine Operation to Customers Only"
• p.129 "Encrypting Data on the Hard Disk"
• p.215 "Other Security Functions"
• p.145 "Menu Protect"
8

Settings to configure using Web Image Monitor

You can use Web Image Monitor to configure the settings shown in the table below. When you first begin
operating the machine, specify the values shown in the table.
Category
Device Settings / Logs
Device Settings / Logs
Security / User Lockout Policy
Security / User Lockout Policy
Security / User Lockout Policy
222
Settings
Collect Job Logs
Collect Access Logs
Lockout
Number of Attempts
before Lockout
Lockout Release Timer
Setting Value
Active
Active
Active
Up to 5 times
Select either [Active] or
[Inactive].

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents