Sign in today to find solutions:

Don't have an account? Sign up

Konica Minolta bizhub PRESS 1250/1250P Manuals

Manuals and User Guides for Konica Minolta bizhub PRESS 1250/1250P

We have 1 Konica Minolta bizhub PRESS 1250/1250P manual available for free PDF download: User Manual

  • Table of contents
    Table Of Contents2................................................................................................................................................................
    bizhub PRESS 1250P3................................................................................................................................................................
    Welcome5................................................................................................................................................................
    Composition of User's Guide5................................................................................................................................................................
    User's Guide5................................................................................................................................................................
    Conventions Used in This Manual6................................................................................................................................................................
    Symbols Used in This Manual6................................................................................................................................................................
    Paper Indications7................................................................................................................................................................
    Control Software11................................................................................................................................................................
    Control Software Version11................................................................................................................................................................
    About the ROM Version Display Function11................................................................................................................................................................
    Security Functions12................................................................................................................................................................
    Security Mode12................................................................................................................................................................
    Environment12................................................................................................................................................................
    Description of Enhanced Security Mode13................................................................................................................................................................
    Data Protected by the Enhanced Security Mode14................................................................................................................................................................
    Protecting and Deleting of Remaining Data After Being Used15................................................................................................................................................................
    User Authentication in Enhanced Security Mode16................................................................................................................................................................
    Adding User Registration16................................................................................................................................................................
    Changing User Registration22................................................................................................................................................................
    Deleting User Data27................................................................................................................................................................
    Changing Password by User29................................................................................................................................................................
    HDD Recall Function in Enhanced Security Mode33................................................................................................................................................................
    Recalling and Deleting of Data33................................................................................................................................................................
    Output Data in the Secure Box37................................................................................................................................................................
    Administrator Security Functions41................................................................................................................................................................
    Turning the Enhanced Security Mode ON/OFF41................................................................................................................................................................
    HDD Lock Password44................................................................................................................................................................
    Deleting Temporary Data46................................................................................................................................................................
    Deleting All Data49................................................................................................................................................................
    Printing Audit Log52................................................................................................................................................................
    Analyzing Audit Log54................................................................................................................................................................
    Index by item59................................................................................................................................................................
    Index by button60................................................................................................................................................................