Kyocera ECOSYS M3550idn ECOSYS M3040idn/M3540idn/M3550idn/M3560idn Operation G - Page 80

Additional Preparations for the Administrator, Sending Documents to a PC, Strengthening the Security

Page 80 highlights

Installing and Setting up the Machine > Additional Preparations for the Administrator Additional Preparations for the Administrator In addition to the information provided in this chapter, the administrator of this machine should check the following, and configure the settings as needed. Sending Documents to a PC To Send to a Shared Folder (Send to Folder (SMB)) To send a document that has been loaded, you need to create a shared folder to receive the document on your computer. For details, refer to Preparation for Sending a Document to a Shared Folder in a PC on page 3-25. To E-mail Scanned Images (Send as E-mail) You can send a scanned original image as an E-mail attachment. For registration method, refer to E-mail Settings on page 2-41. Strengthening the Security This machine is shipped with two default users registered one with Machine Administrator rights, and another with Administrator rights. Logging in as this user will allow you to configure all settings; therefore, please change the login user name and password. In addition, this machine is equipped with user authentication function, which can be configured to limit the access to this machine to only those who have a registered login name and password. For each setting procedure, refer to User Authentication and Accounting (User Login, Job Accounting) (page 9-1). I want to... Restrict the users of the machine. Restrict the basic functions that can be used. Prevent another user from handling the documents stored in the machine. Prevent the data stored in the machine from being leaked. Function User Login Auto Panel Reset ID Card Settings*1 Local Authorization Group Authorization Set. Custom Box*2 Data Overwrite*3 Encryption*3 PDF Encryption Functions Completely delete the data on the machine before disposing of the machine. Data Sanitization *1 The optional Card Authentication Kit is required. *2 The optional SSD is required. *3 The optional Data Security Kit is required. Reference page page 9-2 page 8-37 page 9-29 page 9-19 page 9-20 page 5-43 Refer to the Data Security Kit (E) Operation Guide. page 6-25 page 8-36 2-32

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427

2-32
Installing and Setting up the Machine > Additional Preparations for the Administrator
Additional Preparations for the Administrator
In addition to the information provided in this chapter, the administrator of this machine should check the following, and
configure the settings as needed.
Sending Documents to a PC
To Send to a Shared Folder (Send to Folder (SMB))
To send a document that has been loaded, you need to create a shared folder to receive the document on your computer.
For details, refer to
Preparation for Sending a Document to a Shared Folder in a PC
on page 3-25
.
To E-mail Scanned Images (Send as E-mail)
You can send a scanned original image as an E-mail attachment. For registration method, refer to
E-mail Settings
on
page 2-41
.
Strengthening the Security
This machine is shipped with two default users registered one with Machine Administrator rights, and another with
Administrator rights. Logging in as this user will allow you to configure all settings; therefore, please change the login
user name and password.
In addition, this machine is equipped with user authentication function, which can be configured to limit the access to this
machine to only those who have a registered login name and password. For each setting procedure, refer to
User
Authentication and Accounting (User Login, Job Accounting)
(page 9-1)
.
I want to...
Function
Reference page
Restrict the users of the machine.
User Login
page 9-2
Auto Panel Reset
page 8-37
ID Card Settings
*1
*1
The optional Card Authentication Kit is required.
page 9-29
Restrict the basic functions that can be used.
Local Authorization
page 9-19
Group Authorization Set.
page 9-20
Prevent another user from handling the
documents stored in the machine.
Custom Box
*2
*2
The optional SSD is required.
page 5-43
Prevent the data stored in the machine from
being leaked.
Data Overwrite
*3
*3
The optional Data Security Kit is required.
Refer to the
Data
Security Kit (E)
Operation Guide
.
Encryption
*3
PDF Encryption Functions
page 6-25
Completely delete the data on the machine
before disposing of the machine.
Data Sanitization
page 8-36