Changing the System Manager ID and PIN .............................................................................................. 583
Conguring the Department ID Management Settings .............................................................................. 585
Using Department IDs to Manage Printing or Remote Scanning via Computer ............................................. 587
Conguring Personal Folders ....................................................................................................................... 588
Using ACCESS MANAGEMENT SYSTEM ........................................................................................................... 591
Deleting User Setting Information ...................................................................................................................... 592
Conguring the Network Security Settings ............................................................................................................ 594
Restricting Communication by Using Firewalls ..................................................................................................... 596
Specifying IP Addresses in Firewall Settings ................................................................................................... 597
Specifying MAC Addresses in Firewall Settings ................................................................................................ 600
Setting a Proxy ................................................................................................................................................. 602
Conguring the Key and Certicate for TLS .......................................................................................................... 604
Generating the Key and Certicate for Network Communication ...................................................................... 606
Conguring the IPSec Settings ........................................................................................................................... 608
Conguring the IEEE 802.1X Authentication Settings ............................................................................................. 613
Restricting the Machine's Functions ...................................................................................................................... 616
Restricting Access to Address Book and Sending Functions .................................................................................... 617
Restricting Use of the Address Book ............................................................................................................. 618
Limiting Available Destinations ..................................................................................................................... 621
Restricting the Fax Sending Functions ........................................................................................................... 623
Restricting Printing from a Computer .................................................................................................................. 625
Restricting the Use of Memory Media .................................................................................................................. 628
Increasing the Security of Documents .................................................................................................................... 629
Printing User Information on Documents ............................................................................................................ 631
Embedding Invisible Text (Forced Secure Watermark) ........................................................................................... 633
Embedding Information That Restricts Copying (Forced Document Scan Lock) ......................................................... 636
Using TL Code to Restrict Copying ................................................................................................................ 638
Using QR Code to Restrict Copying ............................................................................................................... 640
Adding a Digital Signature to Sent Files ............................................................................................................... 642
Generating a Device Signature Certicate ...................................................................................................... 643
Registering a User Signature Certicate ........................................................................................................ 644
Managing the Machine from a Computer (Remote UI) ............................................................................................ 646
Starting the Remote UI ...................................................................................................................................... 648
Checking the Status and Logs ............................................................................................................................ 652
Turning OFF/Restarting the Machine ................................................................................................................... 657
Registering Destinations via the Remote UI ......................................................................................................... 658
Sharing an Address List with Specic Users .......................................................................................................... 662
Registering User Groups ................................................................................................................................... 664
Registering a Key and Certicate for Network Communication ............................................................................... 666
Generating a Key and Certicate Signing Request (CSR) ......................................................................................... 671
Managing Stored Files ....................................................................................................................................... 674
Managing the Logs ........................................................................................................................................... 680
Importing/Exporting the Setting Data ................................................................................................................. 682
Importing/Exporting All Settings .................................................................................................................. 684
Importing/Exporting the Settings Individually ................................................................................................ 688
Backing Up/Restoring Data ................................................................................................................................ 694
VII