CONTENTS 5
CONTENTS
Preface................................................................................................................................................. 3
How to read this manual ............................................................................................................................................ 3
Chapter 1 The High Security Mode
Precautions on Using the High Security Mode .......................................................................................... 8
Confirmation of the mode ........................................................................................................................................... 9
Operational conditions.............................................................................................................................................. 10
Chapter 2 UNIQUE FUNCTIONS
Temporary Password .......................................................................................................................... 14
Conditions when a temporary password is used ..................................................................................................... 14
Operation by a user when a temporary password is used....................................................................................... 14
Hold (Fax)........................................................................................................................................... 15
Printing a job in the Hold (Fax) queue ...................................................................................................................... 15
Chapter 3 THE INITIAL VALUES
Precautions on the Initial Values .......................................................................................................... 18
Logging in................................................................................................................................................................... 18
Initial value list........................................................................................................................................................... 19
Chapter 4 APPENDIX
List of target events for monitoring and logs to be sent to the Syslog server ............................................ 26
CC Certification obtained version list .................................................................................................... 29