Skip header
 

Administrator Tools

This section describes the user tools in the Administrator Tools menu under System Settings.

Administrator Tools are used by the administrator. To change these settings, contact the administrator.

We recommend specifying Administrator Authentication before making Administrator Tools settings.

Address Book Management

You can add, change, or delete information registered in the Address Book.

For details, see Address Book.

  • New Program / Change

    You can register and change names as well as user codes.

    • Names

      You can register a name, key display, registration number, display priority, and title selection.

    • Auth. Info

      You can register a user code, and specify the functions available to each user code. You can also register user names and passwords to be used when sending e-mail, sending files to folders, or accessing an LDAP server. User codes or user names and passwords registered here are also used for the print volume use limitation function.

    • Protection

      You can register a protection code.

    • Add to Group

      You can register a user or group of users registered in the Address Book to a group.

    • Fax Dest.

      You can register a fax number, international TX mode, fax header, label insertion, and protocol.

    • Email

      You can register an e-mail destination.

    • Folder

      You can register the protocol, path, port number, and server name.

  • Delete

    You can delete a name from the Address Book.

    For details about each setting under "Address Book Management", see Address Book.

You can register information up to 400 users.

You can register up to 200 user codes and login user names in total.

You can also register and manage names in the Address Book using Web Image Monitor.

For details about the print volume use limitation setting under the Protection tab, see "Managing Print Volume per User", Security Guide.

Address Book: Program / Change / Delete Group

Names registered in the Address Book can be added into a group. You can then easily manage the names registered in each group.

You can register up to 20 groups.

  • New Program / Change

    You can register and change groups.

    • Names

      You can register a name, key display, registration number, display priority, and title selection.

    • Programmed User/Group

      You can check the names or groups registered in each group.

    • Protection

      You can register a protection code.

    • Add to Group

      You can put groups registered in the Address Book into a group.

  • Delete

    You can delete a group from the Address Book.

For details on how to register names to a group, see Registering Names to a Group.

You can also register and manage groups in the Address Book using Web Image Monitor.

Address Book: Change Order

You can change the order of registered names.

For details about changing the order of the names in the Address Book, see Changing Order of Registered Names.

Address Book: Edit Title

You can edit the title to easily find a user.

For details on how to edit titles, see Editing Titles.

Address Book: Switch Title

Select a sorting title for user names from [Title 1] to [Title 3].

Default: [Title 1]

For details about sorting titles, see Registering User Information.

Auto Delete User in Address Book

If the maximum registerable limit has been reached and adding a new account is requested, the oldest account can be deleted and a new account can be registered according to the user settings.

The new account described above is an account which is automatically registered in the Address Book, and is not arbitrarily registered in the Address Book by a user.

Default: [Off]

Delete All Data in Address Book

You can delete all data in the Address Book.

Conditions to Search Address Book/LDAP

Specify the default search conditions for Address book / LDAP search.

  • Address Book

    Specify the default search conditions for Address book search.

    • Beginning Word

    • End Word

    • Exact Match

    • Include one Word

    • Exclude Words

    Default: [Beginning Word]

  • LDAP

    Specify the default search conditions for LDAP search.

    • Beginning Word

    • End Word

    • Exact Match

    • Include one Word

    • Exclude Words

    • Fuzzy Search

    Default: [Beginning Word]

Display / Clear / Print Counter per User

Allow you to view and print the numbers of prints accessed with user codes, and to set those values to 0.

Press [Up arrow key] and [Down arrow key] to show all the numbers of prints.

  • All Users

    • Print List

      Print the counter value for all the users.

    • Clear

      Reset the counter value for all users.

  • Per User

    • Print List

      Print the counter value for each user.

    • Clear

      Reset the counter value for each user.

For details about printing the counter, see Printing the Counter for Each User and Printing the Counter for All Users.

Machine action when limit is reached

For details about this function, see "Managing Print Volume per User", Security Guide.

Print Volume Use Limitation: Unit Count Setting

For details about this function, see "Managing Print Volume per User", Security Guide.

Enhanced Print Volume Use Limitation

You can enable the Enhanced Print Volume Use Limitation function using Software Development Kit

applications. This setting can be selected for "Tracking Permission" and "Stop Printing". Tracking refers to the trace records of machine information.

Default for "Tracking Permission": [Off]

Default for "Stop Printing": [Off]

If you set "Tracking Permission" to [On], the Software Development Kit application collects the tracking information from the machine and calculates the count.

If you set "Stop Printing" to [On], the Software Development Kit application will cancel a print job from the machine if one is underway.

Print Volum. Use Limit.: Default Limit Value

For details about this function, see "Managing Print Volume per User", Security Guide.

Media Slot Use

For details about this function, see "Restricting Media Slot Access", Security Guide.

User Authentication Management

  • User Code Authentication

    Using User Code Authentication, you can limit the available functions and supervise their use.

    When using User Code Authentication, register user codes.

    Using the Printer PC Control function, you can obtain a log of prints corresponding to the codes entered using the printer driver.

    • Functions to Restrict

      • Copier

      • Fax (only SP C360SFNw and SP C361SFNw)

      • Printer

      • Printer: PC Control

      • Scanner

      • Browser

    • Printer Job Authentication:

      [Entire], [Simple (Limitation)], [Simple (All)]

  • Basic Authentication

  • Windows Authentication

  • LDAP Authentication

  • Off

Default: [Off]

For details about Basic Authentication, see "Basic Authentication", Security Guide. For details about Windows Authentication, see "Windows Authentication", Security Guide. For details about LDAP Authentication, see "LDAP Authentication", Security Guide.

Administrator Authentication Management

For details about this function, see "Configuring Administrator Authentication", Security Guide.

Program / Change Administrator

For details about this function, see "Configuring Administrator Authentication", Security Guide.

Extended Security

Specify whether or not to use the extended security functions. For details about the extended security functions, see "Specifying the Extended Security Functions", Security Guide.

Program / Change / Delete LDAP Server

Program the LDAP server to find up e-mail destinations in the LDAP server Address Book directly.

This function is possible when sending scan files by e-mail using the scanner or fax function.

  • Name

  • Server Name

  • Search Base

  • Port No.

  • Use Secure Connection (SSL)

  • Authentication

  • User Name

  • Password

  • Realm Name

  • Japanese Character Code

  • Search Conditions

  • Search Options

This function supports LDAP Version 2.0 and 3.0. Digest authentication can only be used under LDAP Ver.3.0.

To use the LDAP server, select [On] under LDAP Search.

For details about how to program the LDAP Server, see Programming the LDAP Server.

Service Test Call

You can make a test call to the RICOH @Remote center.

This function is available only if the RICOH @Remote Service is enabled and active.

This function is unavailable when "Notify Machine Status" is in use.

Sleep Mode Entry by Sleep Mode Timer

Specify whether or not to use Sleep Mode.

Default: [Enable]

Notify Machine Status

You can send notification of the machine's status to the RICOH @Remote center.

This function is available only if the RICOH @Remote Service is enabled and active.

This function is unavailable when "Service Test Call" is in use.

Firmware Version

You can check the version of the software installed in this machine.

Erase All Memory

For details about this function, see "Deleting Data on the Machine", Security Guide.

Delete All Logs

For details about this function, see "Managing Logs from the Machine", Security Guide.

Transfer Log Setting

For details about this function, see "Managing Logs from the Machine", Security Guide.

Fixed USB Port

If this function is activated, you can avoid reinstalling the printer driver when connecting a computer pre-installed with the driver to an identical machine model to this machine.

Default: [Off]

If set to [Level 1]

It is not necessary to install a new driver when the printer driver of this machine has already been installed on the computer.

If set to [Level 2]

For details about this function, consult your administrator.

Program / Change / Delete Realm

Program the realm to be used for Kerberos authentication.

  • Realm Name

  • KDC Server Name

  • Domain Name

Be sure to set both the realm name and KDC server name when programming a realm.

For details about Program/Change/Delete Realm, see Programming the Realm.

Stop Key to Suspend Print Job

Specify the range of print jobs to be suspended when [Stop] is pressed.

Default: [All Print Jobs]

Collect Logs

You can specify whether or not to collect job logs, access logs, and eco-friendly logs.

  • Active

  • Inactive

Default for "Job Log ": [Inactive]

Default for "Access Log ": [Inactive]

Default for "Eco-friendly Logs ": [Inactive]

For details about this function, see "Managing Logs from the Machine", Security Guide.

Display IP Address

Specify whether or not to display the IPv4 address and host name of the machine. Only the machine administrator can specify the settings.

Default: [Do not Display]

Region A iconShift to Power Off When Ntwrk. Disconnctd.

Specify whether or not to switch to Off mode if all Ethernet connections, USB2.0 connections, and fax traffic are disconnected for more than two hours.

Default: [On]

Note