Top
Security
Protecting the Machine from Unauthorized Access
Preventing Unauthorized Access
Setting Access Privileges
Setting the System Manager ID
Setting the Department ID Management
Setting a Remote UI PIN
Restricting Communication by Using Firewalls
Specifying IP Addresses for Firewall Rules
Specifying MAC Addresses for Firewall Rules
Changing Port Numbers
Setting a Proxy
Restricting the Machine's Functions
Restricting Access to Address Book and Sending Functions (imageRUNNER 2204F)
Setting a PIN for Address Book (imageRUNNER 2204F)
Limiting Available Destinations (imageRUNNER 2204F)
Prohibiting PC Faxing (imageRUNNER 2204F)
Disabling Use of Previously Used Destinations (imageRUNNER 2204F)
Checking Destinations before Sending Documents (imageRUNNER 2204F)
Prohibiting Sequential Broadcasting (imageRUNNER 2204F)
Restricting USB Functions
Disabling HTTP Communication
Disabling Remote UI
Implementing Robust Security Features