• For details about sending scan files by e-mail, see "Specifying a Destination", Facsimile Reference,
and "Sending Scan Files by E-mail", Scanner Reference.
• For details about sending scan files by Scan to Folder, see "Specifying a Destination", Facsimile
Reference, and "Sending Scan Files to Folders", Scanner Reference.
• For details about the machine's settings for network delivery scanner, see "Network Settings Required
to Use the Network Delivery Scanner", General Settings Guide.
• For details about how to use the network delivery scanner function, see "Delivering Scan Files",
Scanner Reference.
Administrating the Machine/Protecting Documents (Security Functions)
You can prevent information leakage by managing the machine and protecting documents.
• You can protect documents from unauthorized access and stop them from being copied without
permission.
• You can control the use of the machine, as well as prevent machine settings from being changed
without authorization.
• By setting passwords, you can prevent unauthorized access via the network.
• You can erase the data on the hard disk to prevent the information from leaking out.
• See the manual for the DataOverWriteSecurity Unit (optional), and Security Reference.
Monitoring the Machine Via Computer
You can change the machine's settings and monitor its status from a connected computer.
BCT009S
9