<Device Management>
You can specify settings related to the management of the device and optional products.
<Device Information Settings>
<Management Settings>
<Device Management>
Enter the name and the installation location to identify the machine.
<Import/Export from Addr. Book Management Software>
<Management Settings>
<Device Management>
Set whether to import or access the address books of address book management software.
|
When user authentication is performed, setting <Use User Authentication When Importing> to <On> enables only address books for which user authentication has been performed to be imported. |
<Confirm Device Signature Certificate>
<Management Settings>
<Device Management>
Check the detailed settings of a device signature certificate. You can also check whether the certificate is valid.
<Confirm User Signature Certificate>
<Management Settings>
<Device Management>
Check the detailed settings of a user signature certificate available for the logged-in user. You can also check whether the certificate is valid.
<Certificate Settings>
<Management Settings>
<Device Management>
You can manage the keys/certificates, CA certificates, or certification revocation list (CRL) used in the machine. You can also set the Online Certificate Status Protocol (OCSP).
<Display Job Status Before Authentication>
<Management Settings>
<Device Management>
Select whether to restrict access to the <Status Monitor> screen when using a login service.
<Restrict Access to Other User Jobs>
<Management Settings>
<Device Management>
Select whether to restrict users from performing operations on the jobs of other users on the <Status Monitor> screen when User Authentication is used.
<Display Job Log>
<Management Settings>
<Device Management>
Select whether to display job logs on the <Status Monitor> screen. You can also select whether to allow device management software to retrieve job logs from the machine.
Basic Screens on the Touch Panel Display<Save Audit Log>
<Management Settings>
<Device Management>
Select whether to start log recording. For information on the types of logs, see
System Specifications.
|
If this is set to <On>, the <Adjust Time> setting cannot be used. |
|
Changes in settings are effective after performing <Apply Set. Chng.>. |
<Retrieve Network Authentication Log>
<Management Settings>
<Device Management>
Select whether to start log recording for authentication performed when the machine is accessed via the network, such as when printing from a computer or accessing the Advanced Box.
<Store Key Operation Log>
<Management Settings>
<Device Management>
Select whether to save a log of the key operations performed by users. By analyzing the stored logs, you can survey how the machine is being used.
|
When the log is output, PINs, passwords, and information obfuscated by the settings for <Restrict Access to Other User Jobs>, etc., are output as masked characters. Therefore, confidential information cannot be leaked externally. For information on interpreting and outputting saved logs, contact your local authorized Canon dealer. |
<Restrict Service Representative Access>
<Management Settings>
<Device Management>
You can set the machine to restrict changes in user information or security-related settings when the machine is inspected or repaired by your local authorized Canon dealer.
|
Even when this is not set to <On>, you can check the audit log for past operations if the service representative has changed user information or security-related settings. |
<Synchronize Custom Settings (Client)>
<Management Settings>
<Device Management>
You can synchronize the personalized data of multiple Canon multifunction printers on a network. Even for the server machine, it is necessary to enable this setting if you wish to operate the machine as the client machine.
Starting Setting Synchronization<Enable Use of Personal Settings>
<Management Settings>
<Device Management>
<Manage Personal Settings>
Select whether to enable users that are logged into the machine to use the Personalization function, such as the display language, accessibility settings, and the screen to display after startup/restoration.
<Action When Maximum Number of Users Exceeded>
<Management Settings>
<Device Management>
<Manage Personal Settings>
Select how the machine processes personal settings for users or groups (user setting information) when the number for which the machine can save various settings exceeds the limit.
|
For information on the limit of user or group personal settings (user setting information) that the machine can save, see System Specifications. |
<Use Default Screen After Startup/Restoration>
<Management Settings>
<Device Management>
<Manage Personal Settings>
Select whether to enable each user to set the screen displayed on startup/restoration.
<Prohibit Initialization of Administrator Password>
<Management Settings>
<Device Management>
Specify whether to restrict operations of <Initialize Admin. Password> ([Counter/Device Information] key
<Device Info./Other>).
<Restrict Special Mode Operations>
<Management Settings>
<Device Management>
Select whether to restrict use of Special Mode, which is provided for the purpose of maintenance by service representatives.