User's Manual
Table Of Contents
- Contents
- Setting Up
- Main Functions
- Preparations Required Before Use
- Preventing Unauthorized Access
- Setting Up Using the Setup Guide
- Setting the Date/Time
- Setting Up the Network Environment
- Installing Drivers
- Configuring Initial Settings for Fax Functions
- Configuring Scan Settings
- Basic Operations
- Parts and Their Functions
- Turning ON the Machine
- Using the Operation Panel
- Placing Originals
- Loading Paper
- Customizing the Display
- Changing the Default Settings for Functions
- Setting Sounds
- Entering Quiet Mode
- Entering Sleep Mode
- Registering Destinations
- Copying
- Faxing
- Printing
- Scanning
- Linking with Mobile Devices
- Managing the Machine
- Setting Access Privileges
- Configuring the Network Security Settings
- Restricting the Machine's Functions
- Managing the Machine from a Computer (Remote UI)
- Registering Destinations from Remote UI
- Saving/Loading Address Book from Remote UI
- Importing/Exporting Address Book Data with the Supplied Software
- Updating the Firmware
- Initializing Settings
- Setting Menu List
- Maintenance
- Troubleshooting
- Appendix
- SIL OPEN FONT LICENSE
Restricting Access to Address Book and Sending
Functions
2KUU-06K
Some cases of information leakage can be pr
evented by limiting the available fax and e-mail destinations to those
registered in the Address Book, or by setting a PIN for the Address Book so that unauthorized users cannot add or edit
Address Book entries. You can also avoid sending documents to unintended recipients if the machine is set to ask you
to enter the fax number twice for conī “rmation.
Restricting Use of the Address Book(P. 326)
Limiting Available Destinations(P. 328)
Restricting the Fax Sending Functions(P. 330)
Managing the Machine
325