Skip header
 

Administrator Tools

This section describes the user tools in the Administrator Tools menu under System Settings.

Administrator Tools are used by the administrator. To change these settings, contact the administrator.

We recommend specifying Administrator Authentication before making Administrator Tools settings.

Address Book Management

You can add, change, or delete information registered in the Address Book.

For details, see Address Book.

  • Program / Change

    You can register and change names as well as user codes.

    • Names

      You can register a name, key display, registration number, and title selection.

    • Auth. Info

      You can register a user code, and specify the functions available to each user code. You can also register user names and passwords to be used when sending e-mail, sending files to folders, or accessing an LDAP server. User codes or user names and passwords registered here are also used for the print volume use limitation function.

    • Protection

      You can register a protection code.

    • Fax Dest.

      You can register a fax number, international TX mode, fax header, label insertion, IP-Fax destination, and protocol.

    • E-mail

      You can register an e-mail destination.

    • Folder

      You can register the protocol, path, port number, and server name.

    • Add to Group

      You can register a user or group of users registered in the Address Book to a group.

  • Delete

    You can delete a name from the Address Book.

    For details about each setting under "Address Book Management", see Address Book.

You can register information up to 2,000 users.

You can register up to 1,000 user codes and login user names in total.

You can also register and manage names in the Address Book using Web Image Monitor.

For details about the print volume use limitation setting under the Protection tab, see Security Guide.

Address Book: Program / Change / Delete Group

Names registered in the Address Book can be added into a group. You can then easily manage the names registered in each group.

You can register up to 100 groups.

  • Program/Change

    You can register and change groups.

    • Names

      You can register a name, key display, registration number, and title selection.

    • Programmed User/Group

      You can check the names or groups registered in each group.

    • Protection

      You can register a protection code.

    • Add to Group

      You can put groups registered in the Address Book into a group.

  • Delete

    You can delete a group from the Address Book.

For details on how to register names to a group, see Registering Names to a Group.

You can also register and manage groups in the Address Book using Web Image Monitor.

Address Book: Change Order

You can change the order of registered names.

For details about changing the order of the names in the Address Book, see Changing Order of Registered Names.

Print Address Book: Destination List

You can print destination lists registered in the Address Book.

  • Print in Title 1 Order

    Prints the Address Book in the Title 1 order.

  • Print in Title 2 Order

    Prints the Address Book in the Title 2 order.

  • Print in Title 3 Order

    Prints the Address Book in the Title 3 order.

  • Print Group Dial List

    Prints the group Address Book.

    For details about printing destination lists, see Printing Destination Lists.

Address Book: Edit Title

You can edit the title to easily find a user.

For details on how to edit titles, see Editing Titles.

Address Book: Switch Title

Select a sorting title for user names from [Title 1] to [Title 3].

Default: [Title 1]

For details about sorting titles, see Registering User Information.

Backup/Restore: User Custom Settings & Address Book

Using an SD card, you can backup the machine's Address Book and user settings, and also restore those backup data to the machine.

For details about installing and removing the SD card, contact your sales or service representative.

Restoring data overwrites Address Book data stored on the machine, and clears the counter of each registered user of the machine.

You can also back up and restore the machine's Address Book using Web Image Monitor. For details, see Web Image Monitor Help.

When the Address Book backup is performed via a computer using Web Image Monitor, do not change the Address Book using the control panel during the backup operation. If the error message SC997 appears, press the confirmation button to resolve the error.

  • Back Up

    You can back up the machine's Address Book and user settings to an SD card.

  • Restore

    You can restore the backup copy of the Address Book and user settings from an SD card.

  • Format

    You can format an SD card.

  • Obtain Memory Device Info

    You can check the free space and contents of the SD card.

Data Carry-over Setting for Address Book Auto-program

By using Data Carry-over Setting for Address Book Auto-program, you can carry over user authentication information that has already been registered to the Address Book of the Windows authentication, LDAP authentication, or Integration server authentication.

Default: [Do not Carry-over]

If you select [Carry-over Data], use the number keys to enter the registration number of the data you wish to carry over from an Address Book.

Windows authentication, LDAP authentication, or Integration server authentication must be specified to use this function. For details, see Security Guide.

Auto Delete User in Address Book

If the maximum registerable limit has been reached and adding a new account is requested, the oldest account can be deleted and a new account can be registered according to the user settings.

The new account described above is an account which is automatically registered in the Address Book, and is not arbitrarily registered in the Address Book by a user.

Default: [Off]

Delete All Data in Address Book

You can delete all data in the Address Book.

Display / Print Counter

Allows you to view and print the number of prints.

  • Display / Print Counter

    Displays the number of prints for each function (Total, Copier, Printer, Fax Prints, A3/DLT, Duplex, Send / TX Total, Fax Transmission, Scanner Send, Coverage).

  • Print Counter List

    Prints out a list of the number of prints made under each function.

Display / Clear / Print Counter per User

Allows you to view and print the numbers of prints accessed with user codes, and to set those values to 0.

Press [Up arrow keyPrevious] and [Down arrow keyNext] to show all the numbers of prints.

The number of prints may differ from the counter values shown in Display/Print Counter.

  • Print Counter List for All Users

    Prints the counter value for all the users.

  • Clear Counter List for All Users

    Resets the counter value for all the users.

  • Print Counter List Per User

    Prints the counter value for each user.

  • Clear Counter List Per User

    Resets the counter value for each user.

  • Select All on the Page

    Select all the users on the page.

For details about printing the counter, see Printing the Counter for Each User and Printing the Counter for All Users.

Display / Clear Eco-friendly Counter

For details about this function, see Security Guide.

Display / Clear Eco-friendly Counter per User

For details about this function, see Security Guide.

Eco-friendly Counter Period / Administrator Message

For details about this function, see Security Guide.

Machine action when limit is reached

For details about this function, see Security Guide.

Print Volume Use Limitation: Unit Count Setting

For details about this function, see Security Guide.

Enhanced Print Volume Use Limitation

You can enable the Enhanced Print Volume Use Limitation function using Software Development Kit applications.

Default for "Tracking Permission": [Off]

Default for "Stop Printing": [Off]

Print Volum. Use Limit.: Default Limit Value

For details about this function, see Security Guide.

Media Slot Use

For details about this function, see Security Guide.

User Authentication Management

  • User Code Auth.

    Using User Code Authentication, you can limit the available functions and supervise their use.

    When using User Code Authentication, register user codes.

    Using the Printer PC Control function, you can obtain a log of prints corresponding to the codes entered using the printer driver.

    For details about Basic Authentication, Windows Authentication, LDAP Authentication, and Integration Server Authentication, see Security Guide.

    • Functions to Restrict

      • Copier:

        [Restrict All (B & W / Single Color / Two-color / Full Color)], [Single Color / Two-color / Full Color], [Two-color / Full Color], [Full Color], [Do not Restrict]

      • Printer

        [Black & White / Color], [Color], [PC Control], [Do not Restrict]

      • Other Functions:

        [Document Server], [Facsimile], [Scanner], [Browser]

    • Printer Job Authentication:

      [Entire], [Simple (Limitation)], [Simple (All)]

    • Limitation Range:

      [Change]

  • Basic Auth.

  • Windows Auth.

  • LDAP Auth.

  • Integration Svr. Auth.

  • Off

Default: [Off]

If a user uses the browser function, only the functions specified for this setting are available. If [Browser] is selected and [Printer] is not selected, the printer function cannot be used with the browser function.

Enhanced Authentication Management

For details about this function, see Security Guide.

Administrator Authentication Management

For details about this function, see Security Guide.

Program / Change Administrator

For details about this function, see Security Guide.

Key Counter Management

Specify the functions you want to manage with the key counter.

  • Copier:

    [Full Color], [Black & White], [Single Color], [Two-color]

  • Printer:

    [Color], [Black & White]

  • Other Functions:

    [Document Server], [Facsimile], [Scanner], [Browser]

If a user uses the browser function, only the functions specified for this setting are available. If [Browser] is selected and [Printer] is not selected, the printer function cannot be used with the browser function.

External Charge Unit Management

You can use the key card to specify an upper limit on machine use.

  • Copier

  • Printer

  • Document Server

  • Facsimile

  • Scanner

  • Browser

If a user uses the browser function, only the functions specified for this setting are available. If [Browser] is selected and [Printer] is not selected, the printer function cannot be used with the browser function.

For details about this function, consult your administrator.

Enhanced External Charge Unit Management

Specify whether or not to enable enhanced features for the enhanced external charge unit management.

For details about this function, consult your administrator.

Extended Security

Specify whether or not to use the extended security functions. For details about the extended security functions, see Security Guide.

Auto Delete File in Document Server

Specify whether documents stored in the Document Server will or will not be deleted after a specified period of time.

Default: [On], [3 day(s)]

Documents stored after this function is activated are subject to automatic deletion in a specified period.

If you select [On], enter a number of days from 1 to 180 (in 1 day increments).

In the default setting, stored documents are automatically deleted 3 days (72 hours) after they are stored.

Delete All Files in Document Server

You can delete files stored in the Document Server, including files stored for Sample Print, Locked Print, Hold Print, and Stored Print under the printer function.

Files stored with passwords are also subject to deletion.

Select [Yes] on the confirmation screen to delete all files.

Capture Priority

This setting appears when the File Format Converter is installed, and when the capture function is being used by the ScanRouter delivery software.

For details about this function, consult your administrator.

Capture: Delete All Unsent Files

This setting appears when the File Format Converter is installed, and when the capture function is being used by the ScanRouter delivery software.

For details about this function, consult your administrator.

Capture: Ownership

This setting appears when the File Format Converter is installed, and when the capture function is being used by the ScanRouter delivery software.

For details about this function, consult your administrator.

Capture: Public Priority

This setting appears when the File Format Converter is installed, and when the capture function is being used by the ScanRouter delivery software.

For details about this function, consult your administrator.

Capture: Owner Defaults

This setting appears when the File Format Converter is installed, and when the capture function is being used by the ScanRouter delivery software.

For details about this function, consult your administrator.

Program / Change / Delete LDAP Server

Program the LDAP server to find up e-mail destinations in the LDAP server Address Book directly. This function is possible when sending scan files by e-mail using the scanner or fax function.

  • Name

  • Server Name

  • Search Base

  • Port No.

  • Use Secure Connection (SSL)

  • Authentication

  • User Name

  • Password

  • Realm Name

  • Japanese Character Code

  • Search Conditions

  • Search Options

This function supports LDAP Version 2.0 and 3.0. Digest authentication can only be used under LDAP Ver.3.0.

To use the LDAP server, select [On] under LDAP Search.

For details about how to program the LDAP Server, see Programming the LDAP server.

LDAP Search

Specify whether or not to use the LDAP server for searching.

Default: [Off]

If you select [Off], LDAP server list will not appear on the searching display.

Service Test Call

You can make a test call to the @Remote center.

This function is available only if the @Remote service is enabled and active.

This function is unavailable when "Notify Machine Status" is in use.

Notify Machine Status

You can send notification of the machine's status to the @Remote center.

This function is available only if the @Remote service is enabled and active.

This function is unavailable when "Service Test Call" is in use.

Service Mode Lock

For details about this function, see Security Guide.

Firmware Version

You can check the version of the software installed in this machine.

Network Security Level

For details about this function, see Security Guide.

Auto Erase Memory Setting

For details about this function, see Security Guide.

Erase All Memory

For details about this function, see Security Guide.

Delete All Logs

For details about this function, see Security Guide.

Transfer Log Setting

For details about this function, see Security Guide.

Detect Data Security for Copying

For details about this function, see Security Guide.

Unauthorized Copy Prevention Printing: Copier

You can set the unauthorized copy prevention for the pattern and data security for copying to data to prevent unauthorized copying of the document.

  • Compulsory Unauthorized Copy Prevention

    Select whether or not to specify compulsory unauthorized copy prevention on the machine.

    Default: [Off]

  • Unauthorized Copy Prevention Type

    Select the Unauthorized Copy Prevention type to use.

    • Data Security for Copying

      If the printed document is copied, scanned, or stored in the Document Server using a copier or MFP, images in the document are covered with gray overprint.

      For details about the optional units required for this function, see "Functions Requiring Optional Configurations", Getting Started.

    • Unathd. Copy Prev.: Patn.

      Embeds texts and background images for Unathd. Copy Prev.: Patn. on the printed document. When the printed document is copied, scanned, or stored in the Document Server, a text pattern appears on the background of the document to prevent illegal copying.

    Default: [Unathd. Copy Prev.: Patn.]

  • Data Security for Copying Effect

    Select the effect of data security for copying that will be applied to the copied or printed document.

    • Text and Background

    • Background Only

    Default: [Text and Background]

  • Unauthorized Copy Prevention of Patterns Effect

    Select the effect of unauthorized copy prevention for pattern that will be applied to the copied or printed document.

    • Text and Background

    • Background Only

    • Text Only

    • Reverse Patterns(Text/Background)

    Default: [Text and Background]

  • Mask Type for Pattern

    Select the pattern to be embedded in the background of the printed documents. The available options are as follows:

    None, Type 1, Type 2, Type 3, Type 4, Type 5, Type 6, Type 7, Type 8, Type 9, Type 10

    Default: [None]

  • Pattern Color

    Select the pattern color to be embedded in the background of the printed documents. The available options are as follows:

    Black, Magenta, Cyan

    Default: [Black]

  • Pattern Density

    Select the density of the background pattern.

    Default: "3"

  • Text Selection

    Enter the text to be embedded on the printed documents to prevent unauthorized copying. The available options are as follows:

    User Name, Date & Time, User Name + Date & Time, User Text 1, User Text 2

    Default: [Date & Time]

    Register any text that you want to be embedded for unauthorized copy prevention. Once registered, the text you want to use can be selected from [Text Selection]. You can enter a user text up to 64 characters.

  • Point Size

    Specify the font size of the copy prevention text by entering a value between 50 and 150 points using the number keys.

    Default: "70" points

  • Carriage Return Space

    Specify the spacing of the lines between text by entering a value from 50 to 150 points using the number keys. This setting is displayed if a value other than [Off] is specified for [Repeat Text].

    Default: "70" points

  • Text Angle

    Specify the rotation angle of the text. When a larger number is specified, the text is rotated counter-clock wise around the middle of the text string. Specify an angle between 0 to 90 degrees using the number keys.

    Default: "30" degree(s)

  • Repeat Text

    The text is printed repeatedly and down the page beginning the upper left corner of the page.

    • On

    • Off

    Default: [Off]

  • Text Position

    Select the position where the text is inserted. This setting is displayed if 0 degrees is specified as the value for [Text Angle] and [Off] is specified as the value for [Repeat Text]. The available options are as follows:

    Top Left, Top Center, Top Right, Center, Bottom Left, Bottom Center, Bottom Right

    Default: [Center]

Unauthorized Copy Prevention Printing: Document Server

You can set the unauthorized copy prevention for the pattern and data security for copying to data to prevent unauthorized copying of the document.

  • Compulsory Unauthorized Copy Prevention

    Select whether or not to specify compulsory unauthorized copy prevention on the machine.

    Default: [Off]

  • Unauthorized Copy Prevention Type

    Select the Unauthorized Copy Prevention type to use.

    • Data Security for Copying

      If the printed document is copied, scanned, or stored in the Document Server using a copier or MFP, images in the document are covered with gray overprint.

      For details about the optional units required for this function, see "Functions Requiring Optional Configurations", Getting Started.

    • Unathd. Copy Prev.: Patn.

      Embeds texts and background images for Unathd. Copy Prev.: Patn. on the printed document. When the printed document is copied, scanned, or stored in the Document Server, a text pattern appears on the background of the document to prevent illegal copying.

    Default: [Unathd. Copy Prev.: Patn.]

  • Data Security for Copying Effect

    Select the effect of data security for copying that will be applied to the copied or printed document.

    • Text and Background

    • Background Only

    Default: [Text and Background]

  • Unauthorized Copy Prevention of Patterns Effect

    Select the effect of unauthorized copy prevention for pattern that will be applied to the copied or printed document.

    • Text and Background

    • Background Only

    • Text Only

    • Reverse Patterns(Text/Background)

    Default: [Text and Background]

  • Mask Type for Pattern

    Select the pattern to be embedded in the background of the printed documents. The available options are as follows:

    None, Type 1, Type 2, Type 3, Type 4, Type 5, Type 6, Type 7, Type 8, Type 9, Type 10

    Default: [None]

  • Pattern Color

    Select the pattern color to be embedded in the background of the printed documents. The available options are as follows:

    Black, Magenta, Cyan

    Default: [Black]

  • Pattern Density

    Select the density of the background pattern.

    Default: "3"

  • Text Selection

    Enter the text to be embedded on the printed documents to prevent unauthorized copying. The available options are as follows:

    User Name, Date & Time, User Name + Date & Time, User Text 1, User Text 2

    Default: [Date & Time]

    Register any text that you want to be embedded for unauthorized copy prevention. Once registered, the text you want to use can be selected from [Text Selection]. You can enter a user text up to 64 characters.

  • Point Size

    Specify the font size of the copy prevention text by entering a value between 50 and 150 points using the number keys.

    Default: "70" points

  • Carriage Return Space

    Specify the spacing of the lines between text by entering a value from 50 to 150 points using the number keys. This setting is displayed if a value other than [Off] is specified for [Repeat Text].

    Default: "70" points

  • Text Angle

    Specify the rotation angle of the text. When a larger number is specified, the text is rotated counter-clock wise around the middle of the text string. Specify an angle between 0 to 90 degrees using the number keys.

    Default: "30" degree(s)

  • Repeat Text

    The text is printed repeatedly and down the page beginning the upper left corner of the page.

    • On

    • Off

    Default: [Off]

  • Text Position

    Select the position where the text is inserted. This setting is displayed if 0 degrees is specified as the value for [Text Angle] and [Off] is specified as the value for [Repeat Text]. The available options are as follows:

    Top Left, Top Center, Top Right, Center, Bottom Left, Bottom Center, Bottom Right

    Default: [Center]

Unauthorized Copy Prevention Printing: Printer

You can set the unauthorized copy prevention for the pattern and data security for copying to data to prevent unauthorized copying of the document.

  • Unauthorized Copy Prevention Setting

    Select whether or not to specify unauthorized copy prevention on the machine.

    Default: [Off]

  • Compulsory Unauthorized Copy Prevention

    Select the unauthorized copy prevention setting on which to prioritize.

    • Driver / Command

      Prints documents using the settings specified in the printer driver or commands.

    • Driver/Command (Most Settings)

      Prints the background pattern and density as specified on the machine. For other items, the settings configured in the printer driver or commands are applied when printing.

    • Machine Setting(s)

      Prints documents using the settings specified on the machine regardless of the printer driver settings.

    Default: [Driver / Command]

  • Unauthorized Copy Prevention Type

    Select the Unauthorized Copy Prevention type to use.

    • Data Security for Copying

      If the printed document is copied, scanned, or stored in the Document Server using a copier or MFP, images in the document are covered with gray overprint.

      For details about the optional units required for this function, see "Functions Requiring Optional Configurations", Getting Started.

    • Unathd. Copy Prev.: Patn.

      Embeds texts and background images for Unathd. Copy Prev.: Patn. on the printed document. When the printed document is copied, scanned, or stored in the Document Server, a text pattern appears on the background of the document to prevent illegal copying.

    Default: [Unathd. Copy Prev.: Patn.]

  • Data Security for Copying Effect

    Select the effect of data security for copying that will be applied to the copied or printed document.

    • Text and Background

    • Background Only

    Default: [Text and Background]

  • Unauthorized Copy Prevention of Patterns Effect

    Select the effect of unauthorized copy prevention for pattern that will be applied to the copied or printed document.

    • Text and Background

    • Background Only

    • Text Only

    • Reverse Patterns(Text/Background)

    Default: [Text and Background]

  • Mask Type for Pattern

    Select the pattern to be embedded in the background of the printed documents. The available options are as follows:

    None, Type 1, Type 2, Type 3, Type 4, Type 5, Type 6, Type 7, Type 8, Type 9, Type 10

    Default: [None]

  • Pattern Density

    Select the density of the background pattern.

    Default: "3"

  • Text Selection

    Enter the text to be embedded on the printed documents to prevent unauthorized copying. The available options are as follows:

    Do not Specify, Unauthorized Copy, Illegal Copy, Void, Do not copy, Copy Restricted, Copy Prohibited, Controlled Document, Confidential Document, In Confidence, In Strictest Confidence, Confidential, User Name, File Name, Date & Time, User Name + File Name, User Name + Date & Time, File Name + Date & Time, User Name + File Name + Date & Time, User Text 1, User Text 2

    Default: [Unauthorized Copy]

    Register any text that you want to be embedded for unauthorized copy prevention. Once registered, the text you want to use can be selected from [Text Selection]. You can enter a user text up to 64 characters

  • PCL Fonts for Texts

    Specify the font type to be used for the copy prevention text when using the PCL.

    Default: [Arial]

  • PS Fonts for Texts

    Specify the font type to be used for the copy prevention text when using PostScript 3.

    Default: [Arial]

  • Point Size

    Specify the font size of the copy prevention text by entering a value between 50 and 300 points using the number keys.

    Default: "70" points

  • Carriage Return Space

    Specify the spacing of the lines between text by entering a value from 50 to 300 points using the number keys. This setting is displayed if a value other than [Off] is specified for [Repeat Text].

    Default: "70" points

  • Text Angle

    Specify the rotation angle of the text. When a larger number is specified, the text is rotated counter-clock wise around the middle of the text string. Specify an angle between 0 to 359 degrees using the number keys.

    Default: "30" degree(s)

  • Repeat Text

    The text is printed repeatedly and down the page beginning the upper left corner of the page. If [On: Rotate 180deg on Return] is selected, each line of the text that is separated by a line feed will be rotated 180 degrees.

    • On

    • On: Rotate 180deg on Return

    • Off

    Default: [Off]

  • Text Position

    Select the position where the text is inserted. This setting is displayed if 0 degrees is specified as the value for [Text Angle] and [Off] is specified as the value for [Repeat Text]. The available options are as follows:

    Top Left, Top Center, Top Right, Center, Bottom Left, Bottom Center, Bottom Right

    Default: [Center]

Fixed USB Port

If this function is activated, you can avoid reinstalling the printer driver when connecting a computer pre-installed with the driver to an identical machine model to this machine.

Default: [Off]

If set to [Level 1]

It is not necessary to install a new driver when the printer driver of this machine has already been installed on the PC.

If set to [Level 2]

For details about this function, consult your administrator.

Program / Change / Delete Realm

Program the realm to be used for Kerberos authentication.

  • Realm Name

  • KDC Server Name

  • Domain Name

Be sure to set both the realm name and KDC server name when programming a realm.

For details about Program/Change/Delete Realm, see Programming the Realm.

Machine Data Encryption Settings

For details about this function, see Security Guide.

Program / Change / Delete Remote Machine

You can link this machine with other devices at maximum of six by specifying their IP addresses or host names.

Program / Delete Device Certificate

You can program and delete a self-generated device certificate and also check status of the certificate.

For details about this function, see Security Guide.

Device Setting Information: Import Setting (Server)

For details about this function, see Security Guide.

Device Setting Information: Run Import (Server)

For details about this function, see Security Guide.

Device Setting Information: Export (Memry Strge Devc)

For details about this function, see Security Guide.

Device Setting Information: Import (Memry Strge Devc)

For details about this function, see Security Guide.

PDF File Type: PDF/A Fixed

If this setting is activated, available PDF file format is limited to PDF/A.

Default: [Off]

Stop Key to Suspend Print Job

Specify the range of print jobs to be suspended when the [Stop] key is pressed.

Default: [All Print Jobs]

Energy Saver Key to Change Mode

Select which mode the machine enters when the [Energy Saver] key is pressed.

Default: [Sleep Mode]

Compulsory Security Stamp:Copier

This setting allows to print security stamps on output documents using the copier function. You can adjust where the stamps are printed.

Default: [Off]

Available stamp settings: [Date/Time], [Printout User Name], [Machine ID], [Machine IP Address], [Adjust Stamp Position]

Compulsory Security Stamp:Doc. Srvr.

This setting allows to print security stamps on output documents using the Document Server function. You can adjust where the stamps are printed.

Default: [Off]

Available stamp settings: [Date/Time], [Printout User Name], [Machine ID], [Machine IP Address], [Adjust Stamp Position]

Compulsory Security Stamp:Facsimile

This setting allows to print security stamps on output documents using the facsimile function. You can adjust where the stamps are printed.

Default: [Off]

Available stamp settings: [Date/Time], [Printout User Name], [Machine ID], [Machine IP Address], [Adjust Stamp Position]

Compulsory Security Stamp:Printer

This setting allows to print security stamps on output documents using the printer function. You can adjust where the stamps are printed.

Default: [Off]

Available stamp settings : [Date/Time], [Printout User Name], [Machine ID], [Machine IP Address], [Adjust Stamp Position]

Users Own Home Screen

Select whether to allow logged-in users to display their own home screen.

Default: [Prohibit]

For details about this function, see Security Guide.

Volume Use Counter: Scheduled/Specified Reset Settings

For details about this function, see Security Guide.

Select Switchable Languages

You can set up to five display languages that can be changed.

Depending on the destination, the default value is changed.

The following languages can be set: [Japanese], [English], [French], [German], [Italian], [Spanish], [Dutch], [Norwegian], [Danish], [Swedish], [Polish], [Portuguese], [Hungarian], [Czech], [Finnish], [Simplified Chinese], [Traditional Chinese], [Russian], [Greek], [Catalan], [Turkish], and [Brazilian Portuguese]

Note

  • For details on how to access System Settings, see Accessing User Tools.

  • Unauthorized copy prevention can be specified in Web Image Monitor and in the printer driver. For details about how to configure the settings, see "Printing Documents that Are Not Authorized for Duplication", Print.