hit counter script
Table of Contents

Advertisement

Security

Confidential information is handled by information devices everywhere, including computers and printers, and any of
these devices may become a target for malicious third parties at anytime. Attackers may directly gain unauthorized
access to your devices, or indirectly take advantage of negligence or improper use. Either way, you may incur
unanticipated losses when your confidential information is leaked. To counter these risks, the machine is equipped
with a variety of security functions. Set the necessary configuration depending on your network environment.
You can configure the best security system by building an environment that inhibits access to printers on your
in-house network via the Internet and using such environment together with the machine's security features.
Preventing Unauthorized Access(P. 204)
Establishing the Basics of Information Security
Protecting the Machine from Unauthorized Access(P. 203)
Preparing for Risks from Negligence or Misuse
Restricting the Machine's Functions(P. 230)
Implementing Robust Security Features
Implementing Robust Security Features(P. 234)

Security

Printing a Document Secured by a PIN (Secure
Print) (LBP252dw)(P. 109)
202
0W20-03X

Advertisement

Table of Contents
loading

This manual is also suitable for:

Lbp252Lbp252dwLbp251dw

Table of Contents