ManualsContentsPreviousNext |
Depending on your e-mail application, a phishing warning might appear after you receive an e-mail message. To prevent phishing warnings appearing after you receive e-mail from a specified sender, you must add the sender to your e-mail application's exclusion list. For details about how to do this, see your e-mail application's Help.
Service call.
Toner is empty.
Toner is nearly empty.
Paper has jammed.
Cover is open.
Paper tray is empty.
Paper tray is nearly empty.
Paper tray error.
Output paper tray is full.
Unit connection error.
Duplex unit error.
Photoconductor unit needs replacing.
Photoconductor unit needs replacing soon.
Waste toner bottle is full.
Waste toner bottle is nearly full.
Stapler has no staples.
Fusing unit needs replacing.
Fusing unit needs replacing soon.
Intermediate transfer unit needs replacing.
Intermediate transfer unit needs replacing soon.
Punch waste receptacle is full.
Memory for file storage is full soon.
Log error.
Open a Web browser, and then enter "http://(printer's address)/" in the address bar.
Top Page of Web Image Monitor appears.
When setting SSL, a protocol for encrypted communication, under environment which server authentication is issued, enter "https://(printer's address)/".
Click [Login] on Top Page of Web Image Monitor.
The window for entering the login user name and password appears.
Enter the user name and password, and then click [Login].
For details about the login user name and password, contact your administrator.
In the menu area, click [Configuration].
On the [Device Settings] area, click [E-mail].
Make the following settings:
Items in the Reception column: Make the necessary settings for sending and receiving e-mail.
Items in the SMTP column: Configure the SMTP server. Check your mailing environment, and then specify the necessary items. You can also perform mail authentication for the SMTP server.
Items in the POP before SMTP column: Configure the POP server. Check your mailing environment, and then specify the necessary items. You can also perform mail authentication for the POP server.
Items in the POP3/IMAP4 column: Configure the POP3 or IMAP4 server. Check your mailing environment, and then specify the necessary items.
Items in the E-mail Communication Port column: Configure the port to be used for access to the mail server.
Items in the E-Mail Notification Account column: Specify these items if you want to use on-demand e-mail notification.
Click [OK].