Konica-minolta bizhub PRESS C1100 Bedienungsanleitung Seite 58

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 68
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 57
Index by item
3
3.1
3-2 bizhub PRESS C1100/C1085
3Index
3.1 Index by item
A
Adding User Registration ..........................................2-26
Administrator authentication .......................................2-5
Administrator security functions
..................................2-7
Administrator setting mode
.........................................2-5
Analyzing audit log ....................................................2-23
Audit log
......................................................................2-5
B
Blocking external accesses .........................................2-5
C
Changing password by user .....................................2-45
Changing User Registration ......................................2-34
Control Software
.........................................................2-2
Control software version
.............................................2-2
D
Data access .................................................................2-5
Data exempted from the protection of Enhanced Security
mode
...........................................................................2-6
Data protected by the Enhanced Security mode
........2-6
Deleting All Data
........................................................2-17
Deleting Temporary Data ..........................................2-14
Deleting user data
.....................................................2-42
E
Enhanced passwords ..................................................2-4
Enhanced Security mode ............................................2-3
Environment for Enhanced Security mode
..................2-3
H
HDD lock password ..................................................2-10
I
IC card .........................................................................2-5
M
Machine NIC settings ..................................................2-5
N
Normal mode ...............................................................2-3
O
Outputting audit log ..................................................2-20
P
Protecting and Deleting of Remaining Data After Being
Used
............................................................................2-6
Protecting and deleting of remaining data on memory or
HDD after being used
..................................................2-4
R
ROM version display function of control software ......2-2
T
Turning Enhanced Security mode ON/OFF .................2-6
Turning the Enhanced Security mode ON/OFF
...........2-7
U
USB port functions ......................................................2-5
User authentication in Enhanced Security mode
......2-26
Seitenansicht 57
1 2 ... 53 54 55 56 57 58 59 60 61 62 63 ... 67 68

Kommentare zu diesen Handbüchern

Keine Kommentare