5
Attributes of Logs You Can Download ............................................................................................................... 145
Common items (Job log and Access log) ........................................................................................................................ 146
Access log information items ......................................................................................................................................... 152
Job log (source) .............................................................................................................................................................. 165
Job log (target) ............................................................................................................................................................... 166
Eco-friendly log information items ................................................................................................................................. 166
Specifying Log Collect Settings .......................................................................................................................... 169
Downloading Logs ............................................................................................................................................. 170
Number of Logs That Can Be Kept on the Machine .......................................................................................... 171
Notes on Operation When the Number of Log Entries Reaches the Maximum ................................................ 172
Printer Job Logs ................................................................................................................................................. 175
Deleting All Logs ................................................................................................................................................ 176
Disabling Log Transfer to the Log Collection Server .......................................................................................... 176
MANAGING LOGS FROM THE MACHINE .......................................................................................................................... 176
Specifying Log Collect Settings .......................................................................................................................... 176
Disabling Log Transfer to the Log Collection Server .......................................................................................... 177
Specifying Delete All Logs.................................................................................................................................. 177
Managing Logs from the Log Collection Server ................................................................................................ 178
CONFIGURING THE HOME SCREEN FOR INDIVIDUAL USERS ................................................................................................. 178
Warnings About Using a User's Own Home Screens ......................................................................................... 178
CONFIGURING THE BROWSER SETTINGS .......................................................................................................................... 179
Precautions for Using the Browser Function ..................................................................................................... 179
Troubleshooting ................................................................................................................................................ 180
MANAGING DEVICE INFORMATION ................................................................................................................................ 180
Exporting Device Information ........................................................................................................................... 182
Importing Device Information ........................................................................................................................... 183
Periodically Importing Device Information ....................................................................................................... 184
Manually Importing the Device Setting Information File of a Server ................................................................ 188
Troubleshooting ................................................................................................................................................ 189
MANAGING ECO-FRIENDLY COUNTER ............................................................................................................................. 191
Configuring Eco-friendly Counters .................................................................................................................... 191
Resetting a Machine's Eco-friendly Counter ..................................................................................................... 192
Resetting Users’ Eco-friendly Counters ............................................................................................................. 192
MANAGING THE ADDRESS BOOK ................................................................................................................................... 192
Specifying Auto Deletion for Address Book Data .............................................................................................. 193
Deleting All Data in the Address Book .............................................................................................................. 193
SPECIFYING THE EXTENDED SECURITY FUNCTIONS ............................................................................................................. 193
OTHER SECURITY FUNCTIONS ....................................................................................................................................... 200
System Status .................................................................................................................................................... 200
Checking Firmware Validity .............................................................................................................................. 201
RESTRICTING A CUSTOMER ENGINEER OPERATION ............................................................................................................ 201
ADDITIONAL INFORMATION FOR ENHANCED SECURITY ....................................................................................................... 201
Settings You Can Configure Using the Control Panel ........................................................................................ 202
Settings You Can Configure Using Web Image Monitor.................................................................................... 203
Settings You Can Configure When IPsec Is Available/Unavailable .................................................................... 205
Settings you can configure when IPsec is available ........................................................................................................ 205
Settings you can configure when IPsec is unavailable .................................................................................................... 206
TROUBLESHOOTING........................................................................................................................................... 206
IF A MESSAGE IS DISPLAYED ......................................................................................................................................... 207