Administrator Tools
This section describes the user tools in the Administrator Tools menu under [System Settings].
For details on how to access Screen Features, see Accessing System Settings.
Administrator Tools are used by the administrator. To change these settings, contact the administrator.
We recommend specifying Administrator Authentication before making Administrator Tools settings.
Address Book Management
You can add, change, or delete information registered in the Address Book.
For details, see "Address Book", For First-time Users.
Program / Change
You can register and change names as well as user codes.
Names
You can register a name, key display, registration number, display priority, and title selection.
Auth. Info
You can register a user code, and specify the functions available to each user code. You can also register user names and passwords to be used when sending e-mail, sending files to folders, or accessing an LDAP server. User codes or user names and passwords registered here are also used for the print volume use limitation function.
Protection
You can register a protection code.
Fax Dest.
You can register a fax number, international TX mode, fax header, label insertion, IP-Fax destination, and protocol.
Email
You can register an e-mail destination.
Folder
You can register the protocol, path, port number, and server name.
Add to Group
You can register a user or group of users registered in the Address Book to a group.
Delete
You can delete a name from the Address Book.
For details about each setting under "Address Book Management", see "Address Book", For First-time Users.
You can register information up to 2,000 users.
You can register up to 1,000 user codes and login user names in total.
You can also register and manage names in the Address Book using a web browser from networked computers. (We use Web Image Monitor installed on this machine.)
For details about the print volume use limitation setting under the Protection tab, see "Specifying the Maximum Use Count per User", Security.
Address Book: Program / Change / Delete Group
Names registered in the Address Book can be added into a group. You can then easily manage the names registered in each group.
You can register up to 100 groups.
Program/Change
You can register and change groups.
Names
You can register a name, key display, registration number, display priority, and title selection.
Programmed User/Group
You can check the names or groups registered in each group.
Protection
You can register a protection code.
Add to Group
You can put groups registered in the Address Book into a group.
Delete
You can delete a group from the Address Book.
For details on how to register names to a group, see "Managing Names with a Group", For First-time Users.
You can also register and manage groups in the Address Book using a web browser from networked computers. (We use Web Image Monitor installed on this machine.)
Address Book: Change Order
You can change the order of registered names.
For details about changing the order of the names in the Address Book, see "Changing Order of Registered Names", For First-time Users.
Print Address Book: Destination List
You can print destination lists registered in the Address Book.
Print in Title 1 Order
Prints the Address Book in the Title 1 order.
Print in Title 2 Order
Prints the Address Book in the Title 2 order.
Print in Title 3 Order
Prints the Address Book in the Title 3 order.
Print Group Dial List
Prints the group Address Book.
For details about printing destination lists, see "Printing Destination Lists", For First-time Users.
Address Book: Edit Title
You can edit the title to easily find a user.
For details on how to edit titles, see "Editing Titles", For First-time Users.
Address Book: Switch Title
Select a sorting title for user names from [Title 1] to [Title 3].
Default: [Title 1]
For details about sorting titles, see "Registering User Information to the Address Book", For First-time Users.
Backup/Restore: User Custom Settings & Address Book
Using an SD card, you can back up the machine's Address Book and user settings, and also restore those backup data to the machine.
For details about installing and removing the SD card, see "Installing SD Card Options", Setup.
Restoring data overwrites Address Book data stored on the machine, and clears the counter of each registered user of the machine.
You can also back up and restore the machine's Address Book using a web browser from networked computers. (We use Web Image Monitor installed on this machine.) For details, see Web Image Monitor Help.
Back Up
You can back up the machine's Address Book and user settings to an SD card.
Restore
You can restore the backup copy of the Address Book and user settings from an SD card.
Format
You can format an SD card.
Obtain Memory Device Info
You can check the free space and contents of the SD card.
Data Carry-over Setting for Address Book Auto-program
By using Data Carry-over Setting for Address Book Auto-program, you can carry over user authentication information that has already been registered to the Address Book of the Windows authentication or LDAP authentication.
Default: [Do not Carry-over]
If you select [Carry-over Data], use the number keys to enter the registration number of the data you want to carry over from an Address Book.
Windows authentication or LDAP authentication must be specified to use this function. For details about Windows Authentication, see "Windows Authentication", Security. For details about LDAP Authentication, see "LDAP Authentication", Security.
Auto Delete User in Address Book
If the maximum registerable limit has been reached and adding a new account is requested, the oldest account can be deleted and a new account can be registered according to the user settings.
The new account described above is an account which is automatically registered in the Address Book, and is not arbitrarily registered in the Address Book by a user.
Default: [Off]
Delete All Data in Address Book
You can delete all data in the Address Book.
Conditions to Search Address Book/LDAP
Specify the default search conditions for Address book / LDAP search.
Address Book
Specify the default search conditions for Address book search.
Beginning Word
End Word
Exact Match
Include one Word
Exclude Words
Default: [Beginning Word]
LDAP
Specify the default search conditions for LDAP search.
Beginning Word
End Word
Exact Match
Include one Word
Exclude Words
Fuzzy Search
Default: [Beginning Word]
Display / Print Counter
Allows you to view and print the number of prints.
Display / Print Counter
Display the number of prints for each function (Total, Copier, Printer, Fax Prints, Duplex, Send / TX Total, Fax Transmission, Scanner Send, Coverage).
Print Counter List
Print out a list of the number of prints made under each function.
Display / Clear / Print Counter per User
Allows you to view and print the numbers of prints accessed with user codes, and to set those values to 0.
Press [Previous] and [Next] to show all the numbers of prints.
The number of prints may differ from the counter values shown in Display/Print Counter.
All Users
Print Counter List
Print the counter value for all the users.
Clear
Reset the counter value for all the users.
Per User
Print Counter List
Print the counter value for each user.
Clear
Reset the counter value for each user.
Select All on the Page
Select all the users on the page.
For details about printing the counter, see "Printing the Counter", For First-time Users.
Display / Clear Eco-friendly Counter
For details about this function, see "Resetting a Machine's Eco-friendly Counter", Security.
Display / Clear Eco-friendly Counter per User
For details about this function, see "Resetting Users’ Eco-friendly Counters", Security.
Eco-friendly Counter Period / Administrator Message
For details about this function, see "Configuring Eco-friendly Counters", Security.
Machine action when limit is reached
For details about this function, see "Managing Print Volume per User", Security.
Print Volume Use Limitation: Unit Count Setting
For details about this function, see "Managing Print Volume per User", Security.
Enhanced Print Volume Use Limitation
You can enable the Enhanced Print Volume Use Limitation function using Software Development Kit applications. This setting can be selected for "Tracking Permission" and "Stop Printing". Tracking refers to the trace records of machine information.
Default for "Tracking Permission": [Off]
Default for "Stop Printing": [Off]
If you set "Tracking Permission" to [On], the Software Development Kit application collects the tracking information from the machine and calculates the count.
If you set "Stop Printing" to [On], the Software Development Kit application will cancel a print job from the machine if one is underway.
Print Volum. Use Limit.: Default Limit Value
For details about this function, see "Managing Print Volume per User", Security.
Media Slot Use
For details about this function, see "Restricting Media Slot Access", Security.
User Authentication Management
User Code Auth.
Using User Code Authentication, you can limit the available functions and supervise their use.
When using User Code Authentication, register user codes.
Using the Printer PC Control function, you can obtain a log of prints corresponding to the codes entered using the printer driver.
Functions to Restrict
[Copier], [Document Server], [Fax], [Printer: PC Control], [Scanner], [Browser]
Printer Job Authentication:
[Entire], [Simple (Limitation)], [Simple (All)]
Basic Auth.
Windows Auth.
LDAP Auth.
Off
Default: [Off]
For details about Basic Authentication, see "Basic Authentication", Security. For details about Windows Authentication, see "Windows Authentication", Security. For details about LDAP Authentication, see "LDAP Authentication", Security.
Application Authentication Management
Specify whether or not to enable authentication for each application. This function is available only when [User Authentication Management] is enabled. For details about User Code Authentication, see "User Code Authentication", Security. For details about Basic Authentication, see "Basic Authentication", Security. For details about Windows Authentication, see "Windows Authentication", Security. For details about LDAP Authentication, see "LDAP Authentication", Security.
Enhanced Authentication Management
For details about this function, see "Authentication Using an External Device", Security.
Administrator Authentication Management
For details about this function, see "Configuring Administrator Authentication", Security.
Program / Change Administrator
For details about this function, see "Registering and Changing Administrators", Security.
Key Counter Management
Specify the functions you want to manage with the key counter.
Functions to Manage
[Copier], [Document Server], [Printer], [Fax], [Scanner], [Browser]
External Charge Unit Management
You can use the key card to specify an upper limit on machine use.
Functions to Manage
[Copier], [Document Server], [Printer], [Fax], [Scanner], [Browser]
For details about this function, consult your administrator.
Enhanced External Charge Unit Management
Specify whether or not to enable enhanced features for the enhanced external charge unit management.
For details about this function, consult your administrator.
Extended Security
Specify whether or not to use the extended security functions. For details about the extended security functions, see "Specifying the Extended Security Functions", Security.
Document Server Function
For details about this function, see "Disabling the Document Server Function", Security.
Default Privilege for Stored File
For details about this function, see "Default Privilege for Stored File", Security.
Auto Delete File in Document Server
Specify whether documents stored in the Document Server will or will not be deleted after a specified period of time.
Default: [Specify Days], [3 day(s)]
Documents stored after this function is activated are subject to automatic deletion in a specified period.
If you select [Specify Days], enter a number of days from 1 to 180 (in steps of 1 day).
If you select [Specify Hours], enter a number of hours from 1 to 96 (in steps of 1 hour).
In the default setting, stored documents are automatically deleted 3 days (72 hours) after they are stored.
Delete All Files in Document Server
You can delete files stored in the Document Server, including files stored for Sample Print, Locked Print, Hold Print, and Stored Print under the printer function.
Files stored with passwords are also subject to deletion.
Select [Yes] on the confirmation screen to delete all files.
Capture Function
Although the ScanRouter delivery software is needed to configure this setting, it is no longer available and support to it has been terminated. For details about this function, consult your administrator.
ADF Original Double Feed Detection
Specify whether to enable or disable the ADF Original Double Feed Detection function.
Default: [On]
Program / Change / Delete LDAP Server
Program the LDAP server to find up e-mail destinations in the LDAP server Address Book directly.
This function is possible when sending scan files by e-mail using the scanner or fax function.
Name
Server Name
Search Base
Port No.
Use Secure Connection (SSL)
Authentication
User Name
Password
Realm Name
Japanese Character Code
Search Conditions
Search Options
This function supports LDAP Version 2.0 and 3.0. Digest authentication can only be used under LDAP Ver.3.0.
To use the LDAP server, select [On] under “LDAP Search”.
For details about how to program the LDAP Server, see Configuring the LDAP Server.
LDAP Search
Specify whether or not to use the LDAP server for searching.
Default: [Off]
If you select [Off], LDAP server list will not appear on the searching display.
Main Power On by Remote Operation
You can turn on the main power from a computer on the network using Wake-On-LAN.
Default: [Inactive]
Service Test Call
You can make a test call to the RICOH @Remote center.
This function is available only if the RICOH @Remote service is enabled and active.
This function is unavailable when "Notify Machine Status" is in use.
Notify Machine Status
You can send notification of the machine's status to the RICOH @Remote center.
This function is available only if the RICOH @Remote service is enabled and active.
This function is unavailable when "Service Test Call" is in use.
Service Mode Lock
For details about this function, see "Restricting a Customer Engineer Operation", Security.
Firmware Version
You can check the version of the software installed in this machine.
Network Security Level
For details about this function, see "Specifying Network Security Levels", Security.
Auto Erase Memory Setting
For details about this function, see "Deleting Data on the Machine", Security.
Erase All Memory
For details about this function, see "Deleting Data on the Machine", Security.
Delete All Logs
For details about this function, see "Specifying Delete All Logs", Security.
Transfer Log Setting
For details about this function, see "Disabling Log Transfer to the Log Collection Server", Security.
Detect Data Security for Copying
For details about this function, see "Enabling Detect Data Security for Copying", Security.
Unauthorized Copy Prevention Printing: Copier
You can set the unauthorized copy prevention for the pattern and data security for copying to data to prevent unauthorized copying of the document.
Compulsory Unauthorized Copy Prevention
Choose whether or not to specify compulsory unauthorized copy prevention on the machine.
Default: [Off]
Unauthorized Copy Prevention Type
Select the Unauthorized Copy Prevention type to use.
Data Security for Copying
If the printed document is copied, scanned, or stored in the Document Server using a copier or MFP, images in the document are covered with gray overprint.
Unathd. Copy Prev.: Patn.
Embed texts and background images for Unathd. Copy Prev.: Patn. on the printed document. When the printed document is copied, scanned, or stored in the Document Server, a text pattern appears on the background of the document to prevent illegal copying.
Default: [Unathd. Copy Prev.: Patn.]
Data Security for Copying Effect
Select the effect of data security for copying that will be applied to the copied or printed document.
Text and Background
Background Only
Default: [Text and Background]
Unauthorized Copy Prevention of Patterns Effect
Select the effect of unauthorized copy prevention for pattern that will be applied to the copied or printed document.
Text and Background
Background Only
Text Only
Reverse Patterns(Text/Background)
Default: [Text and Background]
Mask Type for Pattern
Select the pattern to be embedded in the background of the printed documents. The available options are as follows:
None, Type 1, Type 2, Type 3, Type 4, Type 5, Type 6, Type 7, Type 8, Type 9, Type 10
Default: [None]
Pattern Density
Select the density of the background pattern.
Default: "3"
Text Selection
Enter the text to be embedded on the printed documents to prevent unauthorized copying. The available options are as follows:
User Name, Date & Time, User Name + Date & Time, User Text 1, User Text 2
Default: [Date & Time]
Register any text that you want to be embedded for unauthorized copy prevention. Once registered, the text you want to use can be selected from [Text Selection]. You can enter a user text up to 64 characters. To register the user text, press [Change] under [User Text 1] or [User Text 2].
Point Size
Specify the font size of the copy prevention text by entering a value between 50 and 150 points using the number keys.
Default: "70" points
Carriage Return Space
Specify the spacing of the lines between texts by entering a value from 50 to 150 points using the number keys. This setting is displayed if a value other than [Off] is specified for [Repeat Text].
Default: "70" points
Text Angle
Specify the rotation angle of the text. When a larger number is specified, the text is rotated counter-clock wise around the middle of the text string. Specify an angle between 0 and 90 degrees using the number keys.
Default: "30" degree(s)
Repeat Text
The text is printed repeatedly and down the page beginning the upper left corner of the page.
Default: [Off]
Text Position
Select the position where the text is inserted. This setting is displayed if 0 degrees is specified as the value for [Text Angle] and [Off] is specified as the value for [Repeat Text]. The available options are as follows:
Top Left, Top Center, Top Right, Center, Bottom Left, Bottom Center, Bottom Right
Default: [Center]
Unauthorized Copy Prevention Printing: Document Server
You can set the unauthorized copy prevention for the pattern and data security for copying to data to prevent unauthorized copying of the document.
Compulsory Unauthorized Copy Prevention
Choose whether or not to specify compulsory unauthorized copy prevention on the machine.
Default: [Off]
Unauthorized Copy Prevention Type
Select the Unauthorized Copy Prevention type to use.
Data Security for Copying
If the printed document is copied, scanned, or stored in the Document Server using a copier or MFP, images in the document are covered with gray overprint.
Unathd. Copy Prev.: Patn.
Embed texts and background images for Unathd. Copy Prev.: Patn. on the printed document. When the printed document is copied, scanned, or stored in the Document Server, a text pattern appears on the background of the document to prevent illegal copying.
Default: [Unathd. Copy Prev.: Patn.]
Data Security for Copying Effect
Select the effect of data security for copying that will be applied to the copied or printed document.
Text and Background
Background Only
Default: [Text and Background]
Unauthorized Copy Prevention of Patterns Effect
Select the effect of unauthorized copy prevention for pattern that will be applied to the copied or printed document.
Text and Background
Background Only
Text Only
Reverse Patterns(Text/Background)
Default: [Text and Background]
Mask Type for Pattern
Select the pattern to be embedded in the background of the printed documents. The available options are as follows:
None, Type 1, Type 2, Type 3, Type 4, Type 5, Type 6, Type 7, Type 8, Type 9, Type 10
Default: [None]
Pattern Density
Select the density of the background pattern.
Default: "3"
Text Selection
Enter the text to be embedded on the printed documents to prevent unauthorized copying. The available options are as follows:
User Name, Date & Time, User Name + Date & Time, User Text 1, User Text 2
Default: [Date & Time]
Register any text that you want to be embedded for unauthorized copy prevention. Once registered, the text you want to use can be selected from [Text Selection]. You can enter a user text up to 64 characters. To register the user text, press [Change] under [User Text1] or [User Text2].
Point Size
Specify the font size of the copy prevention text by entering a value between 50 and 150 points using the number keys.
Default: "70" points
Carriage Return Space
Specify the spacing of the lines between texts by entering a value from 50 to 150 points using the number keys. This setting is displayed if a value other than [Off] is specified for [Repeat Text].
Default: "70" points
Text Angle
Specify the rotation angle of the text. When a larger number is specified, the text is rotated counter-clock wise around the middle of the text string. Specify an angle between 0 and 90 degrees using the number keys.
Default: "30" degree(s)
Repeat Text
The text is printed repeatedly and down the page beginning the upper left corner of the page.
Default: [Off]
Text Position
Select the position where the text is inserted. This setting is displayed if 0 degrees is specified as the value for [Text Angle] and [Off] is specified as the value for [Repeat Text]. The available options are as follows:
Top Left, Top Center, Top Right, Center, Bottom Left, Bottom Center, Bottom Right
Default: [Center]
Unauthorized Copy Prevention Printing: Printer
You can set the unauthorized copy prevention for the pattern and data security for copying to data to prevent unauthorized copying of the document.
Unauthorized Copy Prevention Setting
Choose whether or not to specify unauthorized copy prevention on the machine.
Default: [Off]
Compulsory Unauthorized Copy Prevention
Select the unauthorized copy prevention setting on which to prioritize.
Driver / Command
Print documents using the settings specified in the printer driver or commands.
Driver/Command (Most Settings)
Print the background pattern and density as specified on the machine. For other items, the settings configured in the printer driver or commands are applied when printing.
Machine Setting(s)
Print documents using the settings specified on the machine regardless of the printer driver settings.
Default: [Driver / Command]
Unauthorized Copy Prevention Type
Select the Unauthorized Copy Prevention type to use.
Data Security for Copying
If the printed document is copied, scanned, or stored in the Document Server using a copier or MFP, images in the document are covered with gray overprint.
Unathd. Copy Prev.: Patn.
Embed texts and background images for Unathd. Copy Prev.: Patn. on the printed document. When the printed document is copied, scanned, or stored in the Document Server, a text pattern appears on the background of the document to prevent illegal copying.
Default: [Unathd. Copy Prev.: Patn.]
Data Security for Copying Effect
Select the effect of data security for copying that will be applied to the copied or printed document.
Text and Background
Background Only
Default: [Text and Background]
Unauthorized Copy Prevention of Patterns Effect
Select the effect of unauthorized copy prevention for pattern that will be applied to the copied or printed document.
Text and Background
Background Only
Text Only
Reverse Patterns(Text/Background)
Default: [Text and Background]
Mask Type for Pattern
Select the pattern to be embedded in the background of the printed documents. The available options are as follows:
None, Type 1, Type 2, Type 3, Type 4, Type 5, Type 6, Type 7, Type 8, Type 9, Type 10
Default: [None]
Pattern Density
Select the density of the background pattern.
Default: "3"
Text Selection
Enter the text to be embedded on the printed documents to prevent unauthorized copying. The available options are as follows:
Do not Specify, Unauthorized Copy, Illegal Copy, Void, Do not copy, Copy Restricted, Copy Prohibited, Controlled Document, Confidential Document, In Confidence, In Strictest Confidence, Confidential, User Name, File Name, Date & Time, User Name + File Name, User Name + Date & Time, File Name + Date & Time, User Name + File Name + Date & Time, User Text 1, User Text 2
Default: [Unauthorized Copy]
Register any text that you want to be embedded for unauthorized copy prevention. Once registered, the text you want to use can be selected from [Text Selection]. You can enter a user text up to 64 characters. To register the user text, press [Change] under [User Text 1] or [User Text 2].
PCL Fonts for Texts
Specify the font type to be used for the copy prevention text when using the PCL.
Default: [NimbusSans Bold]
PS Fonts for Texts
Specify the font type to be used for the copy prevention text when using PostScript 3.
Default: [NimbusSans Bold]
Point Size
Specify the font size of the copy prevention text by entering a value between 50 and 300 points using the number keys.
Default: "70" points
Carriage Return Space
Specify the spacing of the lines between texts by entering a value from 50 to 300 points using the number keys. This setting is displayed if a value other than [Off] is specified for [Repeat Text].
Default: "70" points
Text Angle
Specify the rotation angle of the text. When a larger number is specified, the text is rotated counter-clock wise around the middle of the text string. Specify an angle between 0 and 359 degrees using the number keys.
Default: "30" degree(s)
Repeat Text
The text is printed repeatedly and down the page beginning the upper left corner of the page. If [On: Rotate 180deg on Return] is selected, each line of the text that is separated by a line feed will be rotated 180 degrees.
On
On: Rotate 180deg on Return
Off
Default: [Off]
Text Position
Select the position where the text is inserted. This setting is displayed if 0 degrees is specified as the value for [Text Angle] and [Off] is specified as the value for [Repeat Text]. The available options are as follows:
Top Left, Top Center, Top Right, Center, Bottom Left, Bottom Center, Bottom Right
Default: [Center]
Fixed USB Port
If this function is activated, you can avoid reinstalling the printer driver when connecting a computer pre-installed with the driver to an identical machine model to this machine.
Default: [Off]
If set to [Level 1]
It is not necessary to install a new driver when the printer driver of this machine has already been installed on the computer.
If set to [Level 2]
For details about this function, consult your administrator.
Program / Change / Delete Realm
Program the realm to be used for Kerberos authentication.
Realm Name
KDC Server Name
Domain Name
Be sure to set both the realm name and KDC server name when programming a realm.
For details about Program/Change/Delete Realm, see Configuring the Realm.
Machine Data Encryption Settings
For details about this function, see "Encrypting Data on the Machine", Security.
Program / Change / Delete Remote Machine
You can link this machine with other devices at maximum of six by specifying their IP addresses or host names.
For details about this function, see "How Remote Fax Works", Fax.
Program / Delete Device Certificate
You can program and delete a self-generated device certificate and also check status of the certificate.
For details about this function, see "Protecting Communication Paths via a Device Certificate", Security.
Device Setting Information: Import Setting (Server)
For details about this function, see "Periodically Importing Device Information", Security.
Device Setting Information: Run Import (Server)
For details about this function, see "Manually Importing the Device Setting Information File of a Server", Security.
Device Setting Information: Export (Memry Strge Devc)
For details about this function, see "Exporting Device Information", Security.
Device Setting Information: Import (Memry Strge Devc)
For details about this function, see "Importing Device Information", Security.
PDF File Type: PDF/A Fixed
If this setting is activated, available PDF file format is limited to PDF/A.
Default: [Off]
Stop Key to Suspend Print Job
Specify the range of print jobs to be suspended when [Stop] is pressed.
Default: [All Print Jobs]
Compulsory Security Stamp:Copier
This setting allows to print security stamps on output documents using the copier function. You can adjust where the stamps are printed.
Default: [Off]
Available stamp settings: [Date/Time], [Printout User Name], [Machine ID], [Machine IP Address], [Adjust Stamp Position]
Compulsory Security Stamp:Doc. Srvr.
This setting allows to print security stamps on output documents using the Document Server function. You can adjust where the stamps are printed.
Default: [Off]
Available stamp settings: [Date/Time], [Printout User Name], [Machine ID], [Machine IP Address], [Adjust Stamp Position]
Compulsory Security Stamp: Fax
This setting allows to print security stamps on output documents using the facsimile function. You can adjust where the stamps are printed.
Default: [Off]
Available stamp settings: [Date/Time], [Printout User Name], [Machine ID], [Machine IP Address], [Adjust Stamp Position]
Compulsory Security Stamp:Printer
This setting allows to print security stamps on output documents using the printer function. You can adjust where the stamps are printed.
Default: [Off]
Available stamp settings: [Date/Time], [Printout User Name], [Machine ID], [Machine IP Address], [Adjust Stamp Position]
Volume Use Counter: Scheduled/Specified Reset Settings
For details about this function, see "Configuring the Auto-Reset Function", Security.
Ready State After Printing
You can specify the state the machine return to after printing documents during Sleep Mode.
Control Panel On
The machine does not return to Sleep Mode and the [Home] screen appears on the control panel.
Contrl Panl Off (Enrgy Savng)
The machine returns to Sleep Mode.
Default: [Contrl Panl Off (Enrgy Savng)]
Collect Logs
You can specify whether or not to collect job logs, access logs, and eco-friendly logs.
Active
Inactive
Default for "Job Log ": [Inactive]
Default for "Access Log ": [Inactive]
Default for "Eco-friendly Logs ": [Inactive]
For details about this function, see "Specifying Log Collect Settings", Security.
Central Management
You can set Management Server that centrally manages address book information and Managed Client.
The address book information registered in Management Server can be shared with Managed Client by synchronizing Management Server with the other machines to be registered as Managed Client.
Only the machine administrator can specify the settings.
Management Server
Managed Client
Do not Manage Centrally
Default: [Do not Manage Centrally]
Management Server
You can specify the settings for the management server, such as referring to the client device list, removing the client device, and synchronizing with the address book.
Machine Name
[Machine Name] specified under [Interface Settings] is displayed.
Location
The name specified for "Location" is displayed.
Central Management Password
Specify the password for central management. The password is used to register Managed Client.
Enter a password between 4 and 16 characters using the number keys.
Managed Client
You can specify the settings for the managed client, such as synchronizing with the address book of the management server.
Machine Name
[Machine Name] specified under [Interface Settings] is displayed.
Location
The name specified for "Location" is displayed.
Server IP Address/Host Name
Enter the server IP address/host name.
Enter the IP Address and Host Name up to 128 characters using the number keys.
Central Management Password
Enter the central management password specified for [Central Management Password] in [Management Server].
Enter a password between 4 and 16 characters using the number keys.
Allow Log In If Disconnected
Specify whether or not to allow login.
Connection Test
Test the connection with the management server.
If either [Server IP Address/Host Name] or [Central Management Password] is blank, you cannot perform a test connection.
If [Managed Client] is specified for [Central Management], the following settings are not available:
Address Book Management
Address Book: Program / Change / Delete Group
Address Book: Change Order
Address Book: Edit Title
Backup/Restore: User Custom Settings & Address Book
Delete All Data in Address Book
Program / Change Administrator
If you forward received fax documents while the Address Book is being updated using Central Address Book Management function, documents may be forwarded to an unintended destination.
For details, see "Forwarding Received Fax Documents", Fax.
Display IP Address
Specify whether or not to display the IPv4 address and host name of the machine. Only the machine administrator can specify the settings.
Default: [Do not Display]
CCC: Save Standard Values
For details about this function, see "Backing Up the Security Information", Security.
CCC: Apply Standard Values
For details about this function, see "Restoring the Security Information", Security.
Shift to Main Power-Off When Network Disconnected (mainly Europe)
Specify whether or not to switch to Off mode if all Ethernet connections, USB2.0 connections, and fax traffic are disconnected for more than two hours.
Default: [On]
Auto Discovery
If this function is activated, RC Gate collects information about devices that are not compatible with RICOH @Remote on the network and then report it along with this machine information to the RICOH @Remote server. Specify the information transmission schedule and destination.
Active (Daily)
Runs Auto Discovery at the specified time every day.
Active (Weekly)
Runs Auto Discovery at the specified day and time every week.
Inactive
SNMP Community String
Enter the SNMP community used for searching the devices.
Display Paper Size Confirmation Screen
Specify whether a confirmation screen for the paper size is displayed when the tray paper size and the size of the fed paper do not match.
On
The confirmation screen appears and the print job is suspended.
Off
The confirmation screen does not appear and the print job completes. However, some of the print job data may not be printed.
Default: [On]
Allow Log Collection
Specify whether to allow log collection by RICOH @Remote.
Default: [Prohibit]
Unauthorized copy prevention can be specified in Web Image Monitor controlled from networked computers and in the printer driver. (Web Image Monitor is a management tool installed on this machine to monitor this machine or configure settings for this machine by using a web browser.) For details about how to configure the settings, see "Printing Documents That Are Not Authorized for Duplication", Print.