Downloading Logs.................................................................................................................................... 196
Number of Logs That Can Be Kept on the Machine...............................................................................197
Notes on Operation When the Number of Log Entries Reaches the Maximum.................................. 198
Printer Job Logs..........................................................................................................................................201
Deleting All Logs........................................................................................................................................202
Disabling Log Transfer to the Log Collection Server...............................................................................202
Managing Logs from the Machine...............................................................................................................203
Specifying Log Collect Settings................................................................................................................ 203
Disabling Log Transfer to the Log Collection Server...............................................................................203
Specifying Delete All Logs........................................................................................................................ 204
Managing Logs from the Log Collection Server..................................................................................... 204
Configuring the Home Screen for Individual Users.................................................................................... 205
Warnings About Using a User's Own Home Screens............................................................................205
Configuring the Browser Settings................................................................................................................. 207
Precautions for Using the Browser Function............................................................................................ 207
Troubleshooting.........................................................................................................................................207
Managing Device Information..................................................................................................................... 209
Exporting Device Information...................................................................................................................210
Importing Device Information...................................................................................................................212
Periodically Importing Device Information..............................................................................................213
Manually Importing the Device Setting Information File of a Server.................................................... 214
Troubleshooting.........................................................................................................................................215
Managing the Address Book........................................................................................................................218
Specifying Auto Deletion for Address Book Data...................................................................................218
Deleting All Data in the Address Book.................................................................................................... 218
Specifying the Extended Security Functions................................................................................................ 219
Other Security Functions............................................................................................................................... 226
Scanner Function.......................................................................................................................................226
System Status............................................................................................................................................. 226
Checking Firmware Validity......................................................................................................................226
Restricting a Customer Engineer Operation................................................................................................ 227
Additional Information for Enhanced Security............................................................................................ 228
Settings You Can Configure Using the Control Panel............................................................................ 228
5