Gestetner DSm725e Reference Manual

Gestetner DSm725e Reference Manual

Gestetner dsm725e: reference manual
Hide thumbs Also See for DSm725e:
Table of Contents

Advertisement

Quick Links

Manuals for This Machine

Refer to the manuals that are relevant to what you want to do with the machine.
Important
❒ Media differ according to manual.
❒ The printed and electronic versions of a manual have the same contents.
❒ Adobe Acrobat Reader/Adobe Reader must be installed in order to view the
manuals as PDF files.
❒ Depending on which country you are in, there may also be html manuals. To
view these manuals, a Web browser must be installed.
❖ About This Machine
Be sure to read the Safety Information in this manual before using the ma-
chine.
This manual provides an introduction to the functions of the machine. It also
explains the control panel, preparation procedures for using the machine,
how to enter text, and how to install the CD-ROMs provided.
❖ General Settings Guide
Explains User Tools settings, and Address Book procedures such as register-
ing fax numbers, e-mail addresses, and user codes. Also refer to this manual
for explanations on how to connect the machine.
❖ Troubleshooting
Provides a guide to solving common problems, and explains how to replace
paper, toner, and other consumables.
❖ Security Reference
This manual is for administrators of the machine. It explains security func-
tions that the administrators can use to protect data from being tampered
with, or prevent the machine from unauthorized use.
Also refer to this manual for the procedures for registering administrators, as
well as setting user and administrator authentication.
❖ Copy/ Document Server Reference
Explains Copier and Document Server functions and operations. Also refer to
this manual for explanations on how to place originals.
❖ Facsimile Reference
Explains Facsimile functions and operations.
❖ Printer Reference
Explains Printer functions and operations.
❖ Scanner Reference
Explains Scanner functions and operations.
i

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the DSm725e and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Gestetner DSm725e

  • Page 1: Manuals For This Machine

    Also refer to this manual for the procedures for registering administrators, as well as setting user and administrator authentication. ❖ Copy/ Document Server Reference Explains Copier and Document Server functions and operations. Also refer to this manual for explanations on how to place originals. ❖ Facsimile Reference Explains Facsimile functions and operations.
  • Page 2 ❖ Network Guide Explains how to configure and operate the machine in a network environ- ment, and use the software provided. This manual covers all models, and includes descriptions of functions and settings that might not be available on this machine. Images, illustrations, and information about operating systems that are supported might also differ slightly from those of this machine.
  • Page 3: Table Of Contents

    TABLE OF CONTENTS Manuals for This Machine ... i How to Read This Manual ... 1 Symbols ...1 1. Getting Started Enhanced Security... 3 Glossary ...4 Setting Up the Machine...5 Security Measures Provided by this Machine... 6 Using Authentication and Managing Users ...6 Ensuring Information Security ...7 Limiting and Controlling Access ...9 Enhanced Network Security...10...
  • Page 4 3. Ensuring Information Security Preventing Unauthorized Copying ... 51 Unauthorized Copy Prevention ...52 Data Security for Copying ...53 Printing Limitations...54 Notice ...55 Printing with Unauthorized Copy Prevention and Data Security for Copying...55 Printing a Confidential Document ... 58 Choosing a Locked Print file ...58 Printing a Locked Print File ...59 Deleting Locked Print Files ...60 Deleting Passwords of Locked Print Files...60...
  • Page 5 Logging off as the Supervisor ...128 Changing the Supervisor...129 Resetting an Administrator’s Password ...130 Machine Administrator Settings...131 System Settings ...131 Copier / Document Server Features ...133 Facsimile Features... 134 Printer Features ...135 Scanner Features... 136 Settings via Web Image Monitor ...137 Settings via SmartDeviceMonitor for Admin...
  • Page 6 Document Server File Permissions...148 The Privilege for User Account Settings in the Address Book ... 149 User Settings... 152 Copier / Document Server Features ...152 Printer Functions ...155 Scanner Features... 157 Facsimile Features... 158 System Settings ...160 Web Image Monitor Setting... 164 Functions That Require Options ...176...
  • Page 7: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. Ignoring these notes could result in serious injury or death. Be sure to read these notes. They can be found in the "Safety Information" section of About This Ma- chine.
  • Page 9: Getting Started

    Enhanced Security The machine's security functions are reinforced by means of realization of device and user management, through extended authentication functions. By specifying access limits on the machine’s functions and the documents and data stored in the machine, you can prevent information leaks and unauthorized access.
  • Page 10: Glossary

    Getting Started Glossary ❖ Administrator There are four types of administrator: machine administrator, network ad- ministrator, file administrator, and user administrator. We recommend only one person take each administrator role. A single administrator can perform the tasks of multiple administrators. Basically, administrators make machine settings and manage the machine;...
  • Page 11: Setting Up The Machine

    Setting Up the Machine If you want higher security, make the following setting before using the ma- chine: Turn the machine on. Press the {User Tools/Counter} key. Press {System Settings}. Press {Interface Settings}. Specify IP Address. Connect the machine to the network. Start the Web Image Monitor, and then log on to the machine as the admin- istrator.
  • Page 12: Security Measures Provided By This Machine

    Getting Started Security Measures Provided by this Machine Using Authentication and Managing Users ❖ Enabling Authentication To control administrator’s and user’s access to the machine, perform admin- istrator authentication and user authentication using login user names and lo- gin passwords. To perform authentication, the authentication function must be enabled.
  • Page 13: Ensuring Information Security

    Ensuring Information Security ❖ Preventing Unauthorized Copying (Unauthorized Copy Prevention) Using the printer driver, you can embed mask and pattern in the printed doc- ument. Reference For details, see p.51 “Preventing Unauthorized Copying”. ❖ Preventing Unauthorized Copying (Data Security for Copying) Using the printer driver to enable data security for the copying function, you can print a document with an embedded pattern of hidden text.
  • Page 14 Getting Started ❖ Preventing Data Leaks Due to Unauthorized Transmission You can specify in the address book which users are allowed to send files us- ing the scanner or fax function. You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered in the address book.
  • Page 15: Limiting And Controlling Access

    Limiting and Controlling Access ❖ Preventing Modification or Deletion of Stored Data You can specify who is allowed to access stored scan files and files stored in Document Server. You can permit selected users who are allowed to access stored files to modify or delete the files.
  • Page 16: Enhanced Network Security

    Getting Started Enhanced Network Security ❖ Preventing Unauthorized Access You can limit IP addresses or disable ports to prevent unauthorized access over the network and protect the address book, stored files, and default set- tings. Reference For details, see p.93 “Preventing Unauthorized Access”. ❖...
  • Page 17: Authentication And Its Application

    2. Authentication and its Administrators and Users When controlling access using the authentication specified by an administrator, select the machine’s administrator, enable the authentication function, and then use the machine. The administrators manage access to the allocated functions, and users can use only the functions they are permitted to access.
  • Page 18: User

    Authentication and its Application ❖ Machine Administrator This is the administrator who mainly manages the machine’s default settings. You can set the machine so that the default for each function can only be spec- ified by the machine administrator. By making this setting, you can prevent unauthorized people from changing the settings and allow the machine to be used securely by its many users.
  • Page 19: The Management Function

    The Management Function The machine has an authentication function requiring a login user name and lo- gin password. By using the authentication function, you can specify access limits for individual users and groups of users. Using access limits, you can not only limit the machine’s available functions but also protect the machine settings and files and data stored in the machine.
  • Page 20: About Administrator Authentication

    Authentication and its Application About Administrator Authentication There are four types of administrator: user administrator, machine administra- tor, network administrator, and file administrator. User Administrator This administrator manages personal in- formation in the address book. You can register/delete users in the address book or change users’...
  • Page 21: About User Authentication

    About User Authentication This machine has an authentication function to prevent unauthorized access. By using login user name and login password, you can specify access limits for individual users and groups of users. User A user performs normal operations on the machine, such as copying and printing.
  • Page 22: Enabling Authentication

    Authentication and its Application Enabling Authentication To control administrators’ and users’ access to the machine, perform administra- tor authentication and user authentication using login user names and login passwords. To perform authentication, the authentication function must be en- abled. To perform Basic Authentication, the hard disk must be installed. To perform Windows Authentication, LDAP Authentication, or Integration Server Authentication, the optional printer function or HDD must be installed.
  • Page 23: Administrator Authentication

    Administrator Authentication Administrators are handled differently from the users registered in the address book. When registering an administrator, you cannot use a login user name al- ready registered in the address book. Windows Authentication, LDAP Authen- tication and Integration Server Authentication are not performed for an administrator, so an administrator can log on even if the server is unreachable due to a network problem.
  • Page 24: Specifying Administrator Privileges

    Authentication and its Application Specifying Administrator Privileges To specify administrator authentication, set Administrator Authentication Man- agement to [On]. You can also specify whether or not to manage the items in Sys- tem Settings as an administrator. To log on as an administrator, use the default login user name and login password. The defaults are “admin”...
  • Page 25: Registering The Administrator

    Select the settings to manage from "Available Settings". The selected settings will be unavailable to users. Note ❒ To specify administrator authentication for more than one category, repeat steps Press [OK]. Press the {User Tools/Counter} key. Registering the Administrator If administrator authentication has been specified, We recommend only one per- son take each administrator role.
  • Page 26 Authentication and its Application In the line for the administrator whose authority you want to specify, press [Administrator 1], [Administrator 2], [Administrator 3] or [Administrator 4], and then press [Change]. If you allocate each administrator’s authority to a different person, the screen appears as follows: Press [Change] for the login user name.
  • Page 27: Logging On Using Administrator Authentication

    If a password reentry screen appears, enter the encryption password, and then press [OK]. Press [OK]. Press [OK]. Press the {User Tools/Counter} key. Logging on Using Administrator Authentication If administrator authentication has been specified, log on using an administra- tor’s user name and password. This section describes how to log on. Note ❒...
  • Page 28: Logging Off Using Administrator Authentication

    Authentication and its Application Press [Enter] next to “Login Password”. Note ❒ If assigning the administrator for the first time, proceed to step pressing [Enter]. Enter the login password, and then press [OK]. Enter [Login]. “ Authenticating... Please wait. specifying the default. Logging off Using Administrator Authentication If administrator authentication has been specified, be sure to log off after com- pleting settings.
  • Page 29: Changing The Administrator

    Changing the Administrator Change the administrator’s login user name and login password. You can also assign each administrator’s authority to the login user names “Administrator 1” to “Administrator 4” To combine the authorities of multiple administrators, as- sign multiple administrators to a single administrator. For example, to assign machine administrator authority and user administrator authority to [Administrator 1], press [Administrator 1] in the lines for the machine administrator and the user administrator.
  • Page 30: User Authentication

    Authentication and its Application User Authentication There are five types of user authentication method: user code authentication, ba- sic authentication, Windows authentication, Integration Server Authentication, and LDAP authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authen- tication.
  • Page 31 Specifying User Code Authentication Press the {User Tools/Counter} key. Press [System Settings]. Press [Administrator Tools]. Press [User Authentication Management]. Select [User Code Auth.]. Note ❒ If you do not want to use user authentication management, select [Off] Select which of the machine’s functions you want to limit. The selected settings will be available to users.
  • Page 32: Basic Authentication

    Authentication and its Application Basic Authentication Specify this authentication when using the machine’s address book to authenti- cate for each user. Using basic authentication, you can not only manage the ma- chine’s available functions but also limit access to stored files and to the personal data in the address book.
  • Page 33 Select the "Printer Job Auth." level. Note ❒ If you select [Entire], you cannot print using a printer driver or a device that does not support authentication. To print under an environment that does not support authentication, select [Simple (All)]. By making this setting, only registered users will be able to print.
  • Page 34 Authentication and its Application Specify the range in which [Simple(Limitation)] is applied to Printer Job Au- thentication. Press [OK]. Press [OK]. Press the {User Tools/Counter} key. Authentication Information Stored in the Address Book This can be specified by the user administrator. If you have specified [User Authentication], you can specify access limits for indi- vidual users and groups of users.
  • Page 35 Press [Change] for [Login User Name]. Enter a login user name, and then press [OK]. Press [Change] for [Login Password]. Enter a login password, and then press [OK]. If a password reentry screen appears, enter the login password, and then press [OK].
  • Page 36 Authentication and its Application Press [Address Book Management]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Select the user or group. Press [Auth. Info]. Specify the login user name and password. In “Available Functions”, select the functions available to the user.
  • Page 37: Windows Authentication

    Windows Authentication Specify this authentication when using the Windows domain controller to au- thenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group regis- tered in the directory server.
  • Page 38 Authentication and its Application Limitation ❒ Users managed in other domains are subject to user authentication, but they cannot obtain items such as e-mail addresses. ❒ If you have created a new user in the domain controller and selected [User must change password at next logon], log on to the machine from the computer to change the password before logging on from the machine’s control panel.
  • Page 39 Press [Administrator Tools]. Press [User Authentication Management]. Select [Windows Auth.]. Note ❒ If you do not want to use user authentication management, select [Off]. Press [Change] for “Domain Name”, enter the name of the domain controller to be authenticated, and then press [OK]. Select the "Printer Job Auth."...
  • Page 40 Authentication and its Application If you select [Simple(Limitation)], proceed to step If you select [Simple (All)] or [Entire], proceed to step Reference For details, see p.44 “Printer Job Authentication Levels and Printer Job Types”. Press [Simple(Limitation)]. Press [Change]. Specify the range in which [Simple(Limitation)] is applied to Printer Job Au- thentication.
  • Page 41 -Installing Internet Information Services (IIS) and Certificate services Specify this setting if you want the machine to automatically obtain e-mail ad- dresses registered in Active Directory. We recommended you install Internet Information Services (IIS) and Certificate services as the Windows components. Install the components, and then create the server certificate.
  • Page 42 Authentication and its Application -If the fax number cannot be obtained If the fax number cannot be obtained during authentication, specify the setting as follows: Start [C:\WINNT\SYSTEM32\adminpak]. Start Setup Wizard. Select [Install all of the Administrator Tools], and then click [Next]. On the [Start] menu, select [Run].
  • Page 43: Ldap Authentication

    LDAP Authentication Specify this authentication when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The address book stored in the LDAP server can be registered to the machine, enabling user authentication without first using the machine to register individual settings in the address book.
  • Page 44 Authentication and its Application Note ❒ Under LDAP Authentication, if “Anonymous Authentication” in the LDAP server’s settings is not set to “Prohibit”, users who do not have an LDAP serv- er account might still be able to gain access. ❒ If the LDAP server is configured using Windows Active Directory, Anony- mous Authentication might be available.
  • Page 45 Select the "Printer Job Auth." level. Note ❒ If you select [Entire], you cannot print using a printer driver or a device that does not support authentication. To also print under an environment that does not support authentication, select [Simple (All)]. By making this setting, only registered users will be able to print.
  • Page 46 Authentication and its Application Specify the range in which [Simple(Limitation)] is applied to Printer Job Au- thentication. Press [OK] Enter the login name attribute in the [Login Name Attribute] box. Note ❒ Register login name attribute with an attribute name such as “uid”. You do not need to register this if you want to authenticate according to the DN.
  • Page 47: Integration Server Authentication

    Integration Server Authentication To use Integration Server Authentication, you need a server on which ScanRout- er software that supports authentication is installed. For external authentication, the Integration Server Authentication collectively authenticates users accessing the server over the network, providing a server-in- dependent centralized user authentication system that is safe and convenient.
  • Page 48 Authentication and its Application Select [Integration Svr. Auth.]. Note ❒ If you do not wish to use User Authentication Management, select [Off]. Press [Change] for “Server Name”. Specify the name of the server for external authentication. Enter the server name, and then press [OK]. Enter the IP address or host name.
  • Page 49 Select the "Printer Job Auth." level. Note ❒ If you select [Entire], you cannot print using a printer driver or a device that does not support authentication. To print under an environment that does not support authentication, select [Simple (All)]. By making this setting, only registered users will be able to print.
  • Page 50 Authentication and its Application Specify the range in which [Simple(Limitation)] is applied to Printer Job Au- thentication. Press [OK]. Press the {User Tools/Counter} key. ❖ Printer Job Authentication Levels and Printer Job Types This section explains the relationship between printer job authentication lev- els and printer job types.
  • Page 51 ❖ [Printer Job Auth.] • [Entire] The machine authenticates all printer jobs and remote settings, and can- cels jobs and settings that fail authentication. Printer Jobs: Job Reset Settings: Disabled • [Simple (All)] The machine authenticates printer jobs and remote settings that have authentication information, and cancels the jobs and settings that fail authentication.
  • Page 52 Authentication and its Application When using the PostScript 3 printer driver, the printer job does not con- tain user code information. Neither personal authentication information nor user code information is added to the printer job. Note ❒ Type 5 also applies to recovery/parallel printing using an RPCS/PCL printer driver that does not support authentication.
  • Page 53: If User Authentication Is Specified

    If User Authentication is Specified When user authentication (User Code Authentication, Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authen- tication) is set, the authentication screen is displayed. Unless a valid user name and password are entered, operations are not possible with the machine. Log on to operate the machine, and log off when you are finished operations.
  • Page 54: Login (Using The Control Panel)

    Authentication and its Application Login (Using the Control Panel) Follow the procedure below to log on when Basic Authentication, Windows Au- thentication, LDAP Authentication, or Integration Server Authentication is set. Follow the procedure below to log on when basic authentication, Windows au- thentication, LDAP Authentication, or Integration Server Authentication is set.
  • Page 55: Login (Using A Printer Driver)

    Login (Using a Printer Driver) When Basic Authentication, Windows Authentication, or LDAP Authentication is set, make encryption settings in the printer properties of a printer driver, and then specify a login user name and password. For details, see the printer driver Help.
  • Page 56: Auto Logout

    Authentication and its Application Auto Logout When using user authentication management, the machine automatically logs you off if you do not use the control panel within a given time. This feature is called “Auto Logout”. Specify how long the machine is to wait before perform- ing Auto Logout.
  • Page 57: Ensuring Information Security

    3. Ensuring Information Preventing Unauthorized Copying Using the printer driver, you can embed a pattern in the printed copy to discour- age or prevent unauthorized copying. If you enable data security for copying on the machine, printed copies of a doc- ument with data security for copying are grayed out to prevent unauthorized copying.
  • Page 58: Unauthorized Copy Prevention

    Using the printer driver, you can embed mask and pattern (for instance, a warn- ing such as "No Copying") in the printed document. If the document is copied, scanned, or stored in a Document Server by a copier or multifunction printer, the embedded pattern appears clearly on the copy, dis- couraging unauthorized copying.
  • Page 59: Data Security For Copying

    If a data security for copying document is copied or stored in the Document Server using a copier or multi-function printer with the Copy Data Security Unit, protect- ed pages are grayed out in the copy, preventing confidential information being copied.
  • Page 60: Printing Limitations

    However, if such a document is copied or stored in the Document Server using a copier or multi-function printer with the Copy Data Security Unit, the copy is grayed out, so the embedded pattern does not appear on the copy.
  • Page 61: Notice

    1. The supplier does not guarantee that unauthorized copy prevention and data security for copying will always work. Depending on the paper, the model of copier or multi-function printer, and the copier or printer settings, unauthorized copy prevention and data security for copying may not work properly.
  • Page 62 Specifying Printer Settings for Data security for copying (Printer Driver Setting) If a document printed using this function is copied or stored in the Document Server by a copier or multi-function printer, the copy is grayed out. Using the printer driver, specify the printer settings for data security for copying.
  • Page 63 Specifying Data Security for Copying (Machine Setting) This can be specified by the machine administrator. To use this function, the Copy Data Security Unit must be installed. If a document printed is copied or stored in the Document Server, the copy is grayed out.
  • Page 64: Printing A Confidential Document

    Ensuring Information Security Printing a Confidential Document Depending on the location of the machine, it is difficult to prevent unauthorized persons from viewing prints lying in the machine’s output trays. When printing confidential documents, use the Locked Print function. ❖ Locked Print Using the printer’s Locked Print function, store files in the machine as Locked Print files and then print them from the control panel and retrieve them im- mediately, preventing others from viewing them.
  • Page 65: Printing A Locked Print File

    Click [OK]. Perform Locked Print. Reference For details, see the printer driver Help. Printing a Locked Print File To print a Locked Print file, face the machine and print the file using the control panel. To print Locked Print files, the password is required. If you do not enter the cor- rect password, you cannot print the files.
  • Page 66: Deleting Locked Print Files

    Ensuring Information Security Deleting Locked Print Files This can be specified by the file creator (owner). To delete Locked Print files, you must enter the password for the files. If the password has been forgotten, ask the file administrator to delete the password. This can also be specified via Web Image Monitor.
  • Page 67: Unlocking Locked Print Files

    Select the file. Press [Delete Password]. Press [Yes]. Unlocking Locked Print Files If you specify “Enhance File Protection”, the file will be locked and become in- accessible if an invalid password is entered ten times. This section explains how to unlock files. Only the file administrator can unlock files.
  • Page 68: Specifying Access Permission For Stored Files

    Ensuring Information Security Specifying Access Permission for Stored Files You can specify who is allowed to access stored scan files and files stored in the Document Server. You can prevent activities such as the printing or sending of stored files by un- authorized users.
  • Page 69: Assigning Users And Access Permission For Stored Files

    Assigning Users and Access Permission for Stored Files This can be specified by the file creator (owner) or file administrator. Specify the users and their access permissions for each stored file. By making this setting, only users granted access permission can access stored files.
  • Page 70 Ensuring Information Security Select the users or groups you want to assign permission to. You can select more than one users. By pressing [All Users], you can select all the users. Press [Exit]. Select the user who you want to assign an access permission to, and then select the permission.
  • Page 71: Specifying Access Privileges For Files Stored Using The Scanner And Fax Functions

    Specifying Access Privileges for Files Stored using the Scanner and Fax Functions If user authentication is set for the scanner and fax functions, you can specify ac- cess privileges for stored files when storing them in the Document Server. You can also change the access privileges for the file.
  • Page 72 Ensuring Information Security Press [Exit]. Press [OK]. Store files in the Document Server. Changing Access Privileges for Previously Stored Files This section explains the authentication process for accessing a file stored in the Document Server under the scanner or fax function. The scanner screen is used to illustrate the procudure/ Press [Select Stored File].
  • Page 73: Assigning The User And The Access Permission For The User's Stored Files

    Press [New Program]. Select the users or groups you want to assign permission to. You can select more than one users. By pressing [All Users], you can select all the users. Press [Exit]. Select the user who you want to assign an access permission to, and then se- lect the permission.
  • Page 74 Ensuring Information Security Press [Administrator Tools]. Press [Address Book Management]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Select the user or group. Press [Protection]. Under "Protect File(s)", press [Program/Change/Delete] for "Permissions for Users/Groups".
  • Page 75: Specifying Passwords For The Stored Files

    Press [Exit]. Select the user who you want to assign an access permission to, and then select the permission. Select the access permission from [Read-only], [Edit], [Edit / Delete], or [Full Control]. Press [Exit]. Press [OK]. Press [Exit]. Press the {User Tools/Counter} key. Specifying Passwords for the Stored Files This can be specified by the file creator (owner) or file administrator.
  • Page 76: Unlocking Files

    Ensuring Information Security Confirm the password by re-entering it using the number keys. Press [#]. Press [OK]. Press [OK]. Unlocking Files If you specify “Enhance File Protection”, the file will be locked and become in- accessible if an invalid password is entered ten times. This section explains how to unlock files.
  • Page 77: Preventing Data Leaks Due To Unauthorized Transmission

    Preventing Data Leaks Due to Unauthorized Transmission If user authentication is specified, the user who has logged on will be designated as the sender to prevent data from being sent by an unauthorized person mas- querading as the user. You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered in the address book.
  • Page 78 Ensuring Information Security Press [Administrator Tools]. Press [Extended Security]. Press [On] for “Restrict Use of Destinations”. Press [OK]. Press the {User Tools/Counter} key. Reference This can also be specified using Web Image Monitor or SmartDeviceMon- itor for Admin. For details, see the Help for each application.
  • Page 79: Protecting The Address Book

    Protecting the Address Book If user authentication is specified, the user who has logged on will be designated as the sender to prevent data from being sent by an unauthorized person mas- querading as the user. To protect the data from unauthorized reading, you can also encrypt the data in the address book.
  • Page 80 Ensuring Information Security Select the user or group. Press [Protection]. Under "Protect Destination", press [Program/Change/Delete] for "Permissions for Users/Groups". Press [New Program]. Select the users or groups to register. You can select more than one users. By pressing [All Users], you can select all the users. Press [Exit].
  • Page 81: Encrypting The Data In The Address Book

    Press [Exit]. Press [OK]. Press [Exit]. Press the {User Tools/Counter} key. Encrypting the Data in the Address Book This can be specified by the user administrator. Encrypt the data in the address book. Reference See p.113 “Changing the Extended Security Functions”. Preparation For details about logging on and logging off with administrator authentica- tion, see p.21 “Logging on Using Administrator Authentication”, p.22 “Log-...
  • Page 82 Ensuring Information Security Press [Administrator Tools]. Press [Extended Security]. Press [On] for “Encrypt Address Book”. Press [Change] for [Encryption Key]. Enter the encryption key, and then press [OK]. Enter the encryption key using up to 32 alphanumeric characters. Press [Encrypt / Decrypt]. Press [Yes].
  • Page 83: Deleting Data On The Hard Disk

    Deleting Data on the Hard Disk Hard Disk The machine’s optional hard disk lets you store data under the copy, printer, fax, scanner, and document server functions, as well as the address book and counters stored under each user code. Data Not Overwritten in the Hard Disk The machine’s memory lets you store fax numbers and data transmitted us- ing the fax function, and network TWAIN scanner.
  • Page 84 “Auto Erase Memory Setting” This can be specified by the machine administrator. A document scanned in Copier, Fax, or Scanner mode, or print data sent from a printer driver is temporarily stored on the machine's hard disk. Even after the job is completed, it remains in the hard disk as temporary data.
  • Page 85 Press [OK]. Auto Erase Memory is set. Important ❒ When Auto Erase Memory is set to "On", temporary data that remained on the hard disk when Auto Erase Memory was "Off" might not be overwrit- ten. Note ❒ Should the main power switch of the machine be turned off before over- writing is completed, the temporary data will remain on the hard disk un- til the main power switch is next turned on and overwriting is resumed.
  • Page 86 Copier Printer Scanner Documents stored by the user in the Document Server using the Copier, Printer or Scanner functions Information registered in the Address Book Counters stored under each user code Image overlay data • Copy jobs • Print Jobs •...
  • Page 87 “Erase All Memory” This can be specified by the machine administrator. You can erase all the data on the hard disk by writing over it. This is useful if you relocate or dispose of your machine. Preparation For details about logging on and logging off with administrator authentica- tion, see p.21 “Logging on Using Administrator Authentication”, p.22 “Log- ging off Using Administrator Authentication”.
  • Page 88 Ensuring Information Security Press [Change]. Enter the number of times that you want to overwrite using the number keys, and then press [#]. Press [OK]. Press [Yes]. When overwriting is completed, press [Exit], and then turn off the power. Reference Before turning the power off, see "Turning On the Power", About This Machine.
  • Page 89: Managing Access To The Machine

    Use this function to specify the permission level for users to change those set- tings accessible by non-administrators. You can specify Menu Protect for the following settings: • Copier / Document Server Features • Facsimile Features • Printer Features • Scanner Features Reference For details, see p.146 “User Administrator Settings”.
  • Page 90: Menu Protect

    Copying Functions Note ❒ To specify [Menu Protect] in [Copier / Document Server Features], set [Machine Man- agement] to [On] in [Administrator Authentication Management] in [Administrator Tools] in [System Settings]. Press the {User Tools/Counter} key.
  • Page 91 Select the menu protect level, and then press [OK]. Press the {User Tools/Counter} key. Fax Functions Note ❒ To specify [Menu Protect] in [Facsimile Features]: Under [System Settings], [Admin- istrator Tools], [Administrator Authentication Management], set [Machine Manage- ment], [File Management], and [Network Management] to [On]. Press the {User Tools/Counter} key.
  • Page 92 Managing Access to the Machine Printer Functions Note ❒ To specify [Menu Protect] in [Printer Features], set [Machine Management] to [On] in [Administrator Authentication Management] in [Administrator Tools] in [System Settings]. Press the {User Tools/Counter} key. Press [Printer Features]. Press [Maintenance]. Press [Menu Protect].
  • Page 93 Press [Menu Protect]. Select the menu protect level, and then press [OK]. Press the {User Tools/Counter} key. Menu Protect...
  • Page 94: Limiting Available Functions

    To prevent unauthorized operation, you can specify who is allowed to access each of the machine’s functions. ❖ Available Functions Specify the available functions from the copier, Document Server, fax, scan- ner, and printer functions. Specifying Which Functions are Available This can be specified by the user administrator.
  • Page 95 Press [Auth. Info]. In [Available Functions], select the functions you want to specify. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Press [OK]. Press [Exit]. Press the {User Tools/Counter} key. Limiting Available Functions...
  • Page 96: Managing Log Files

    Managing Access to the Machine Managing Log Files Log information To view the log, Web SmartDeviceMonitor Professional IS/Standard is re- quired. The following log information is stored in the machine’s memory and on its hard disk: • Job log Stores information about workflow related to user files, such as copying, printing, and scan file delivery •...
  • Page 97: Specifying Delete All Logs

    Specifying Delete All Logs This can be specified by the machine administrator. By deleting log files stored in the machine, you can prevent information leakage. Press the {User Tools/Counter} key. Press [System Settings]. Press [Administrator Tools]. Press [Delete All Logs]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings.
  • Page 98: Transfer Log Setting

    Managing Access to the Machine Transfer Log Setting The machine administrator can select [On] from the log server only. When using the machine’s control panel, you can change the setting to [Off] only if it is set to [On]. You can check and change the transfer log setting. This setting lets you transfer log files to the log server to check the history data and identify unauthorized access.
  • Page 99: Enhanced Network Security

    5. Enhanced Network Security Preventing Unauthorized Access You can limit IP addresses, disable ports and protocols, or use Web Image Mon- itor to specify the network security level to prevent unauthorized access over the network and protect the address book, stored files, and default settings. Enabling/Disabling Protocols This can be specified by the network administrator.
  • Page 100: Access Control

    Enhanced Network Security Press [Invalid] for the protocol you want to disable. Press [OK]. Press the {User Tools/Counter} key. Reference Advanced network settings can be specified using Web Image Monitor. For details, see the Web Image Monitor Help. Access Control This can be specified by the network administrator.
  • Page 101: Specifying Network Security Level

    Click [Apply]. Access control is set. Log off from the machine. Reference For details, see the Web Image Monitor Help. Specifying Network Security Level This can be specified by the network administrator. This setting lets you change the security level to limit unauthorized access. Set the security level to [Level 0], [Level 1], or [Level 2].
  • Page 102 Enhanced Network Security Press [Network Security Level]. If the setting you want to specify does not appear, press [TNext] to scroll down to other settings. Select the network security level. Select [Level 0], [Level 1], or [Level 2]. Press [OK]. Press [Exit].
  • Page 103 Function TCP/IP DIPRINT RSH/RCP SNMP SNMP v1v2 SNMP v3 TELNET SSDP mDNS NetWare NetWare AppleTalk AppleTalk Preventing Unauthorized Access Network Security Level Level 0 Level 1 Port 80 Port 631 Port 443 ❍ ❍ Port 21 Port 10021 ❍ ❍ ❍...
  • Page 104: Encrypting Transmitted Passwords

    Enhanced Network Security Encrypting Transmitted Passwords Prevent login passwords, group passwords for PDF files, and IPP authentication passwords being revealed by encrypting them for transmission. Also, encrypt the login password for administrator authentication and user au- thentication. ❖ Driver Encryption Key To encrypt the login password, specify the driver encryption key for the driver used for the machine and the user’s computer.
  • Page 105: Driver Encryption Key

    Driver Encryption Key This can be specified by the network administrator. Specify the driver encryption key on the machine. By making this setting, you can encrypt login passwords for transmission to pre- vent them from being analyzed. Reference See p.113 “Changing the Extended Security Functions”. Preparation For details about logging on and logging off with administrator authentica- tion, see p.21 “Logging on Using Administrator Authentication”, p.22 “Log-...
  • Page 106: Group Password For Pdf Files

    Enhanced Network Security Enter the driver encryption key, and then press [OK]. Enter the driver encryption key using up to 32 alphanumeric characters. Note ❒ The network administrator must give users the driver encryption key spec- ified on the machine so they can register it on their computers. Make sure to enter the same driver encryption key as that specified on the machine.
  • Page 107: Ipp Authentication Password

    Enter the password, and then press [OK]. For [Confirm New Password], press [Change]. Enter the password and press [OK]. Press [OK]. Press the {User Tools/Counter} key. Note ❒ The network administrator must give users the group password for PDF files that are already registered on the machine. The users can then register it in DeskTopBinder on their computers.
  • Page 108 Enhanced Network Security Click [Apply]. IPP authentication is specified. Log off from the machine.
  • Page 109: Protection Using Encryption

    Protection Using Encryption When you access the machine using a Web browser or IPP, you can establish en- crypted communication using SSL. When you access the machine using an ap- plication such as SmartDeviceMonitor for Admin, you can establish encrypted communication using SNMPv3 or SSL.
  • Page 110: Ssl (Secure Sockets Layer) Encryption

    Enhanced Network Security SSL (Secure Sockets Layer) Encryption This can be specified by the network administrator. To protect the communication path and establish encrypted communication, create and install the server certificate. There are two ways of installing a server certificate: create and install a self-cer- tificate using the machine, or request a certificate from a certificate authority and install it.
  • Page 111 Creating and Installing the Self-Signed Certificate Create and install the server certificate using Web Image Monitor. This section explains the use of a self-certificate as the server certificate. Open a Web browser. Enter “http://(machine's-address)/” in the address bar to access the printer. Log onto the machine.
  • Page 112 Enhanced Network Security Creating the Server Certificate (Certificate Issued by a Certificate Authority) Create the server certificate using Web Image Monitor. This section explains the use of a certificate issued by a certificate authority as the server certificate. Open a Web browser. Enter “http://(machine's-address)/”...
  • Page 113 Installing the Server Certificate (Certificate Issued by a Certificate Authority) Install the server certificate using Web Image Monitor. This section explains the use of a certificate issued by a certificate authority as the server certificate. Enter the server certificate contents issued by the certificate authority. Open a Web browser.
  • Page 114 Enhanced Network Security Enabling SSL After installing the server certificate in the machine, enable the SSL setting. This procedure is used for a self-signed certificate or a certificate issued by a cer- tificate authority. Open a Web browser. Enter “http://(machine's-address)/” in the address bar to access the printer. Log onto the machine.
  • Page 115: User Settings For Ssl (Secure Sockets Layer)

    User Settings for SSL (Secure Sockets Layer) If you have installed a server certificate and enabled SSL (Secure Sockets Layer), you need to install the certificate on the user’s computer. The network administrator must explain the procedure for installing the certifi- cate to users.
  • Page 116: Setting The Ssl / Tls Encryption Mode

    Enhanced Network Security Setting the SSL / TLS Encryption Mode By specifying the SSL/TLS encrypted communication mode, you can change the security level. ❖ Encrypted Communication Mode Using the encrypted communication mode, you can specify encrypted com- munication. Ciphertext Only Ciphertext Priority Ciphertext / Clear Text Setting the SSL / TLS Encryption Mode...
  • Page 117: Snmpv3 Encryption

    Press [Permit SSL / TLS Communication] If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Select the encrypted communication mode. Select [Ciphertext Only], [Ciphertext Priority], or [Ciphertext / Clear Text] as the en- crypted communication mode.
  • Page 118 Enhanced Network Security Press [Interface Settings]. Press [Permit SNMP V3 Communication]. If the setting to be specified does not appear, press [TNext] to scroll down to other settings. Press [Encryption Only]. Press [OK]. Press the {User Tools/Counter} key. Note ❒ To use SmartDeviceMonitor for Admin for encrypting the data for speci- fying settings, you need to specify the network administrator’s [Encryption Password] setting and [Encryption Key] in [SNMP Authentication Information] in SmartDeviceMonitor for Admin, in addition to specifying [Permit SNMP V3...
  • Page 119: Specifying The Extended Security Functions

    6. Specifying the Extended Specifying the Extended Security Functions As well as providing basic security through user authentication and the machine access limits specified by the administrators, you can increase security by, for in- stance, encrypting transmitted data and data in the address book. If you need ex- tended security, specify the machine’s extended security functions before using the machine.
  • Page 120: Settings

    Specifying the Extended Security Functions Press [OK]. Press the {User Tools/Counter} key. Settings ❖ Driver Encryption Key This can be specified by the network administrator. Encrypt the password transmitted when specifying user authentication. If you register the encryp- tion key specified with the machine in the driver, passwords are encrypted. •...
  • Page 121 ❖ Restrict Adding of User Destinations This can be specified by the user administrator. When “Restrict Use of Destinations” is set to [Off]. After entering a fax or scan- ner destination directly, you can register it in the address book by pressing [ProgDest].
  • Page 122 Specifying the Extended Security Functions ❖ Settings by SNMP V1 and V2 This can be specified by the network administrator. When the machine is ac- cessed using the SNMPv1, v2 protocol, authentication cannot be performed, allowing machine administrator settings such as the paper setting to be changed.
  • Page 123 This can be specified by the machine administrator. This setting lets you specify whether or not authentication is required for op- erations such as canceling jobs under the copier and printer functions. If you select [Login Privilege], authorized users and the machine administrator can operate the machine.
  • Page 124 Specifying the Extended Security Functions ❖ Password Policy This can be specified by the user administrator. This setting lets you specify [Complexity Setting] and [Minimum Character No.] for the password. By making this setting, you can limit the available passwords to only those that meet the conditions specified in [Complexity Setting] and [Min- imum Character No.].
  • Page 125: Other Security Functions

    Other Security Functions Scanner Function ❖ Print & Delete Scanner Journal To prevent personal information in the transmission/delivery history being printed automatically, set user authentication and the journal will not print automatically. Instead, items in the Print&Delete Scanner Journal are over- written one by one when the number of transmissions/deliveries exceeds 250.
  • Page 126 Specifying the Extended Security Functions ❖ Printing the Journal When making authentication settings for users, to prevent personal informa- tion in transmission history being printed, set the Journal to not be printed. Also, if more than 200 transmissions are made, transmissions shown in the Journal are overwritten each time a further transmission is made.
  • Page 127: Limiting Machine Operation To Customers Only

    Limiting Machine Operation to Customers Only The machine can be set so that operation is impossible without administrator au- thentication. The machine can be set to prohibit operation without administrator authentica- tion and also prohibit remote registration in the address book by a service rep- resentative.
  • Page 128 Specifying the Extended Security Functions Press [On] and then [OK]. A confirmation message appears. Press [Yes]. Press the {User Tools/Counter} key. Canceling Service Mode Lock For a customer engineer to carry out inspection or repair in service mode, the machine administrator must log onto the machine and cancel the service mode lock.
  • Page 129: Troubleshooting

    Authentication Does Not Work Properly This section explains what to do if a user cannot operate the machine because of a problem related to user authentication. Refer to this section if a user comes to you with such a problem. A Message Appears This section explains how to deal with problems if a message appears on the screen during user authentication.
  • Page 130 Troubleshooting Messages Failed to obtain URL. Authentication has failed. The selected file(s) which you do not have access privileges to could not be deleted. Causes The machine cannot connect to the server or cannot estab- lish communication. The machine is connected to the server, but the UA service is not responding properly.
  • Page 131: Machine Cannot Be Operated

    Machine Cannot Be Operated If the following conditions arise while users are operating the machine, provide instructions on how to deal with them. Condition Cannot print using the printer driver or connect using the TWAIN driver. Cannot authenticate using the TWAIN driver.
  • Page 132 If you try to interrupt a job while copying or scanning, an authentication screen appears. Cannot register entries in [Pro- gram No.10] for program regis- tration in the copier or printer function. Cause The ScanRouter delivery soft- ware may not be supported by the machine.
  • Page 133: Appendix

    Supervisor Operations The supervisor can delete an administrator’s password and specify a new one. If any of the administrators forget their passwords or if any of the administrators change, the supervisor can assign a new password. If logged on using the super- visor’s user name and password, you cannot use normal functions or specify de- faults.
  • Page 134: Logging On As The Supervisor

    Appendix Logging on as the Supervisor If administrator authentication has been specified, log on using the supervisor login user name and login password. This section describes how to log on. Press the {User Tools/Counter} key. Press [Login]. Press [Enter] for [Login User Name]. Enter a login user name, and then press [OK].
  • Page 135: Changing The Supervisor

    Changing the Supervisor Press the {User Tools/Counter} key. Press [System Settings]. Press [Administrator Tools]. Press [Program / Change Administrator]. Under “Supervisor”, click [Change]. Press [Change] for the login user name. Enter the login user name, and then press [OK]. Press [Change] for the login password. Enter the login password, and then press [OK].
  • Page 136: Resetting An Administrator's Password

    Appendix Resetting an Administrator’s Password Press the {User Tools/Counter} key. Press [Login]. Log on as the supervisor. You can log on in the same way as an administrator. Press [System Settings]. Press [Administrator Tools]. Press [Program / Change Administrator]. Press [Change] for the administrator you wish to reset. Press [Change] for the login password.
  • Page 137: Machine Administrator Settings

    Machine Administrator Settings The machine administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ General Features All the settings can be specified. ❖ Tray Paper Settings All the settings can be specified. ❖...
  • Page 138 Appendix • Administrator's E-mail Address • Default User Name / Password (Send) SMB User Name / SMB Password FTP User Name / FTP Password NCP User Name / NCP Password • Program / Change / Delete E-mail Message • Program / Change / Delete Subject •...
  • Page 139: Copier / Document Server Features

    • Transfer Log Setting • Data Security for Copying File Format Converter option must be installed. The DataOverwriteSecurity unit option must be installed. Copier / Document Server Features The following settings can be specified. ❖ General Features All the settings can be specified.
  • Page 140: Facsimile Features

    Appendix Facsimile Features The following settings can be specified. ❖ Gen. Settings/ Adjust All the settings can be specified ❖ Reception Settings All the settings can be specified ❖ E-mail Settings The following settings can be specified • Internet Fax Settings •...
  • Page 141: Printer Features

    Printer Features The following settings can be specified. ❖ List / Test Print All the settings can be specified. ❖ Maintenance • Menu Protect • List / Test Print Lock ❖ System The following settings can be specified. • Print Error Report •...
  • Page 142: Scanner Features

    Appendix ❖ PS Menu All the settings can be specified. ❖ PDF Menu All the settings can be specified. The PCL option must be installed. The PostScript 3 option must be installed. Scanner Features The following settings can be specified. ❖...
  • Page 143: Settings Via Web Image Monitor

    Settings via Web Image Monitor The following settings can be specified. ❖ Top Page • Reset Printer Job • Reset Device ❖ Device Settings • System Spool Printing Protect Printer Operation Panel Output Tray Paper Tray Priority Cover Sheet Tray Slip Sheet Tray •...
  • Page 144 Appendix ❖ Printer • System All the settings can be specified. • Host Interface All the settings can be specified. • PCL Settings All the settings can be specified. • PS Settings All the settings can be specified. • PDF Settings The following settings can be specified.
  • Page 145: Settings Via Smartdevicemonitor For Admin

    Settings via SmartDeviceMonitor for Admin The following settings can be specified. ❖ Device Properties • Reset Device • Reset Current Job • Reset All Jobs ❖ User Management Tool The following settings can be specified. • User Page Count • Access Control List •...
  • Page 146: Network Administrator Settings

    Appendix Network Administrator Settings The network administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Interface Settings • Network All the settings can be specified. • IEEE 802.11b All the settings can be specified. Note ❒...
  • Page 147: Facsimile Features

    Facsimile Features The following settings can be specified. ❖ E-mail Settings • Max. E-mail Size ❖ IP-Fax Settings All the settings can be specified. Scanner Features The following settings can be specified. ❖ Send Settings • Max. E-mail Size • Divide & Send E-mail Settings via Web Image Monitor The following settings can be specified.
  • Page 148 Appendix ❖ Fax • E-mail Settings Maximum E-mail Size • IP-Fax Settings All the settings can be specified. • Gateway Settings All the settings can be specified. ❖ Interface • Change Interface • IEEE 802.11b Communication Mode SSID Channel WEP Setting Authentication Type WEP Key Status Confirm Key...
  • Page 149: Settings Via Smartdevicemonitor For Admin

    ❖ Webpage All the settings can be specified. ❖ Security • Network Security All the settings can be specified. • Access Control All the settings can be specified. • IPP Authentication All the settings can be specified. • SSL/TLS All the settings can be specified. •...
  • Page 150: File Administrator Settings

    Appendix File Administrator Settings The file administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Administrator Tools • Administrator Authentication Management File Management • Program / Change Administrator File Administrator • Extended Security Enhance File Protection •...
  • Page 151: Settings Via Web Image Monitor

    ❖ PCL Menu All the settings can be specified. ❖ PS Menu All the settings can be specified. ❖ PDF Menu All the settings can be specified. The PCL option must be installed. The PostScript 3 option must be installed. Settings via Web Image Monitor The following settings can be specified.
  • Page 152: User Administrator Settings

    Appendix User Administrator Settings The user administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Administrator Tools • Administrator Authentication Management User Management • Program / Change Administrator User Administrator • Extended Security Restrict Use of Destinations Restrict Adding of User Destinations Encrypt Address Book...
  • Page 153: Settings Via Web Image Monitor

    Settings via Web Image Monitor The following settings can be specified. ❖ Address Book All the settings can be specified. ❖ Device Settings • Auto E-mail Notification All the settings can be specified. • Administrator Authentication Management File Administrator Authentication Available Settings for File Administrator •...
  • Page 154: Document Server File Permissions

    Appendix Document Server File Permissions The authorities for using the files stored in Document Server are as follows: The authority designations in the list indicate users with the following authorities. • Read-only This is a user assigned “Read-only” authority. • Edit This is a user assigned “Edit”...
  • Page 155: The Privilege For User Account Settings In The Address Book

    The Privilege for User Account Settings in the Address Book The authorities for using the address book are as follows: The authority designations in the list indicate users with the following authorities. • Read-only This is a user assigned “Read-only” authority. •...
  • Page 156 Appendix ❍ =You can view and change the setting. U =You can view the setting. - =You cannot view or specify the setting. Settings Registration No. Key Display Name Select Title Auth. User Code Info Login User Name Login Password SMTP Authenti- cation...
  • Page 157 Settings User Read-only FaxDest. Transmis- sion Format Facsimile Number Interna- tional TX Mode Header Label Insertion E-mail E-mail Address Address Folder SMB/FTP Destina- /NCP tion SMB: Path FTP: Port No. FTP: Server Name FTP: Path NCP: Path NCP: Connec- tion type You can only enter the password.
  • Page 158: User Settings

    - =You cannot view or specify the setting. Note ❒ Settings that are not in the list can only be viewed, regardless of the menu pro- tect level setting. Copier / Document Server Features The default for [Menu Protect] is [Level 2]. Tab Names Settings...
  • Page 159 Tab Names Settings Stamp Back- Size ground Density Num- bering Preset Stamp Position: COPY Stamp Stamp Position: URGENT Stamp Position: PRIORITY Stamp Position: For Your Info. Stamp Position: PRELIMINARY Stamp Position: For Internal Use Only Stamp Position: CONFIDENTIAL Stamp Position: DRAFT Stamp Language User Program / Delete Stamp...
  • Page 160 Appendix Tab Names Settings Stamp Page Font Num- Size bering Duplex Back Page Stamping Position Page Numbering in Combine Stamp on Designating Slip Sheet Stamp Position: P1, P2… Stamp Position: 1/5, 2/5… Stamp Position: 1, 2… Stamp Position: -1-, -2-… Stamp Position: P.1,P.2...
  • Page 161: Printer Functions

    Printer Functions The default for [Menu Protect] is [Level 2]. ❖ Normal Printer Screen Functions Print Jobs Error Log Spooling Job List ❖ Printer Features Tab Names Settings System Print Error Report Auto Continue Memory Overflow Job Separation Auto Delete Temporary Print Jobs Auto Delete Stored Print Jobs Initial Print Job List Memory Usage...
  • Page 162 Appendix Tab Names Settings Orientation PCL Menu Form Lines Font Source Font Number Point Size Font Pitch Symbol Set Courier Font Extend A4 Width Append CR to LF Resolution Data Format PS Menu Resolution Change PDF Password PDF Menu PDF Group Password Resolution The PCL option must be installed.
  • Page 163: Scanner Features

    Scanner Features The default for [Menu Protect] is [Level 2]. Tab Names Settings Destination List Destination List Priority 1 Settings Destination List Priority 2 Select Title Update Delivery Server Destination List Send Settings TWAIN Standby Time File Type Priority Compression (Black & White) Compression (Gray Scale) Print &...
  • Page 164: Facsimile Features

    Appendix Facsimile Features Which functions can be used and specified depend on which administrators are set to [On] in [Menu Protect] in [Facsimile Features]. The default for [Menu Protect] is [Off]. Names Settings Gen. Settings / Memory / Immed. Transmission Switch Adjust Text Size Priority Original Type Priority...
  • Page 165 Names Settings E-mail Settings Internet Fax Settings Max. E-mail Size SMTP RX File Delivery Settings IP-Fax Settings Enable H.323 Enable SIP H.323 Settings SIP Settings Program / Change / Delete Gateway Administrator Program / Change / Delete Standard Message Tools Store / Change / Delete Auto Document Program / Change / Delete Scan Size Print Journal...
  • Page 166: System Settings

    Cover Sheet Tray Slip Sheet Tray Printer Bypass Paper Size Timer Settings Auto Off Timer Panel Off Timer System Auto Reset Timer Copier/ Document Server Auto Reset Timer Facsimile Auto Reset Timer Printer Auto Reset Timer Admin- Administrator au- istrator thentication has authen- been specified.
  • Page 167 Tab Names Settings Timer Settings Scanner Auto Reset Timer Set Date Set Time Auto Logout Timer Inter- Net- IP Address face work Gateway Address Settings DNS Configuration DDNS Configuration Domain Name WINS Configuration Effective Protocol NCP Delivery Protocol NW Frame Type SMB Computer Name SMB Work Group Ethernet Speed...
  • Page 168 Appendix Tab Names Settings Inter- IEEE Communication Mode face 802.11b Transmission Speed Settings SSID Setting Channel WEP (Encryption) Setting (Encryp- Transmission Speed tion) Setting Return to Defaults Print List File Transfer Delivery Option FAX RX File Transmission SMTP Server SMTP Authentication POP before SMTP Reception Protocol POP3 / IMAP4 Settings...
  • Page 169 Tab Names Settings Administrator User Authentication Management Tools Administrator Authentication Management Key Counter Management Extended Security External Charge Unit Management Display / Clear / Print Counter per User Print Address Book: Destination List Address Book Management Address Book: Program / Change / Delete Group Address Book: Program / Change / Delete Transfer Request Address Book: Change Order Address Book: Edit Title...
  • Page 170: Web Image Monitor Setting

    Appendix Web Image Monitor Setting ❖ Device Settings The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not “Available Settings” has been specified. Category Settings System...
  • Page 171 Category Settings Timer Auto Off Timer Panel Off Timer System Auto Reset Timer Copier/ Document Server Auto Reset Timer Facsimile Auto Reset Timer Scanner Auto Reset Timer Printer Auto Reset Timer Auto Logout Timer E-mail Administrator E-mail Address Reception Protocol E-mail Reception Interval Max.
  • Page 172 Appendix Category Settings E-mail Receive FAX E-mail Fax E-mail User Name Fax E-mail Password E-mail Notification E-mail Address Receive E-mail Notification E-mail Notification User Name E-mail Notification Password Auto E-mail Notification Message Notification Address List Call Service Out of Toner Toner Almost Empty Waste Toner Bottle is Full Add Staple...
  • Page 173 Category Settings On-demand Notification Subject E-mail Notification Message Notification Restriction to System Config. Info. Restriction to Network Config. Info. Restriction to Printer Config. Info. Restriction to Supply Info. Restriction to Device Status Info. Receivable E-mail Address/Domain Name E-mail Language File Transfer SMB User Name SMB Password FTP User Name...
  • Page 174 Appendix Category Settings User User Authentication Management Authentication User Code - Available Function Management Basic Authentication - Printer Job Authentication Windows Authentication - Printer Job Authentication Windows Authentication - Domain Name Windows Authentication - Group Settings for Windows Authentication LDAP Authentication - Printer Job Authentication LDAP Authentication - LDAP Authentication LDAP Authentication - Login Name Attribute...
  • Page 175 ❖ Printer The default for [Menu Protect] is [Level 2]. Category Settings System Print Error Report Auto Continue Memory Overflow Job Separation Auto Delete Temporary Print Jobs Auto Delete Stored Print Jobs Initial Print Job List Memory Usage Duplex Copies Blank Page Print Printer Language Edge Smoothing...
  • Page 176 Appendix Category Settings Orientation PCL Settings Form Lines Font Source Font Number Point Size Font Pitch Symbol Set Courier Font Extend A4 Width Append CR to LF Resolution Duplex PS Settings Blank Page Print Data Format Resolution Resolution PDF Settings PDF Temporary Password PDF Fixed Password PDF Group Password...
  • Page 177 ❖ Fax Functions that can be used and specified via Web Image Monitor depend on which administrators are set to [On] in [Menu Protect], [Facsimile Features]. Names Settings General Fax Information Reception Settings Transmission Settings Administrator Program Confidential ID Tools Program Polling ID Memory Lock Reception Program Memory Lock ID...
  • Page 178 Appendix Names Settings Gateway Prefix 1-5 Settings Select Protocol 1-5 Gateway Address 1-5 Parameter Just Size Printing Settings Combine 2 originals Indial Convert to PDF When Transferring to Folder Journal Immediate Transmission Result Report Communication Result Report Memory Storage Report Polling TX Clear Report Polling RX Result Report Polling RX Reserve Report...
  • Page 179 ❖ Interface The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not “Available Settings” has been specified. Category Settings Change Interface...
  • Page 180 Appendix ❖ Network The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not “Available Settings” has been specified. Category Settings Protocol...
  • Page 181 Category Settings TCP/IP IPP Timeout NetWare NetWare Print Server Name Logon Mode File Server Name NDS Tree NDS Context Name Operation Mode Remote Printer No. Job Timeout Frame Type Print Server Protocol NCP Delivery Protocol AppleTalk AppleTalk Printer Name Zone Name Workgroup Name Computer Name Comment...
  • Page 182: Functions That Require Options

    Appendix Functions That Require Options The following functions require certain options and additional functions. • Hard Disk overwrite erases function DataOverwriteSecurity Unit • Data security for copying function Copy Data Security Unit • PDF Direct Print function PostScript 3 Unit Printer function or HDD...
  • Page 183: Index

    INDEX Access Control , 94 Access Permission , 62 Address Book , 147 Address Management Tool , 147 Administrator , 4 Administrator Authentication , 4 Administrator Tools , 132 , 133 , 134 , 136 , 138 , 140 , 144 , 146 AppleTalk , 142 Authenticate Current Job , 117 Authentication and Access Limits , 3...
  • Page 184 Parallel Interface , 131 Parameter Settings , 138 Password for IPP Authentication , 98 Password for Stored Files , 62 Password Policy , 118 PCL Menu , 135 , 145 PDF Menu , 136 , 145 Print & Delete Scanner Journal , 119 Printer , 138 , 145 , 169 Printer Job Authentication , 44 Protocol , 142...

This manual is also suitable for:

Dsm730e

Table of Contents