Ricoh Mp C2003 User Guide
Here you can view all the pages of manual Ricoh Mp C2003 User Guide. The Ricoh manuals for All in One Printer are available online for free. You can easily download all the documents as PDF.
Page 21
• To send a fax, print from the Windows application you are working with, select LAN-Fax asthe printer, and then specify the destination. • You can also check the sent image data. • For details about the machine's settings, see "Network Settings Requirements", Connecting the Machine/ System Settings. • For details about how to use the function, see "Sending Fax Documents from Computers", Fax. Sending and Receiving Faxes without Paper 19CJQ605
Page 22
Sending and Receiving Faxes via the Internet E-mail Transmission and ReceptionThis machine converts scanned document images to e-mail format, and transmits and receives the e-mail data over the Internet. • To send a document, specify an e-mail address instead of dialing the destination telephone number (Internet Fax and e-mail transmission). See "Specifying an Internet Fax Destination by Entering It Manually", Fax. • This machine can receive e-mail messages via Internet Fax or from computers...
Page 23
• For details about the machine's settings, see "Network Settings Requirements", Connecting theMachine/ System Settings. Sending and Receiving Faxes via the Internet 21
Page 24
Sending and Receiving Faxes by Using the Machine without Fax Unit Installed You can send and receive faxes through a different machine's fax functions via a network (Remote Fax). • To use the remote fax function, install the fax connection unit on the main-machine and sub- machine. • The procedure for sending faxes is as same as that of for the machine with the fax unit. When a job has finished, confirm results displayed on sending history or printed on reports. • You can forward documents received...
Page 25
Using the Facsimile and the Scanner in a Network Environment • You can send scan files to a specified destination using e-mail (Sending scan files by e-mail). See "Overview of E-mail Transmission Function", Fax. See "Basic Procedure for Sending Scan Files by E-mail", Scan. • You can send scan files directly to folders (Sending scan files by Scan to Folder). See "Overview of Folder Transmission Function", Fax. See "Basic Procedure When Using Scan to Folder", Scan. • You...
Page 26
Embedding Text Information in Scanned Files You can extract text information from a scanned document and embed it in the file without using a computer. If you scan a document using this function, embedded text can be searched by using the text search function or copied to another document. • To use this function, the optional OCR unit is required. • You can select a file type from [PDF], [High Compression PDF], or [PDF/A]. • This function can optically recognize characters in various languages and up to...
Page 27
Preventing Information Leakage (Security Functions) • You can protect documents from unauthorized access and stop them from being copied without permission. • You can control the use of the machine, as well as prevent machine settings from being changed without authorization. • By setting passwords, you can prevent unauthorized access via the network. • You can erase or encrypt the data on the hard disk to minimize the risk of information leakage. • You can limit the usage of functions for each user. •...
Page 28
Centrally Controlling Scan Conditions and Distribution You can use the distributed scan management (DSM) system in Windows Server 2008 R2 to manage the destinations and scan settings for each individual user in a group and to use the information when distributing scanned data. You can also use this system to centrally manage information about people using the network and the machine's scanner functions. Both delivered files and user information can be controlled. • You must set up and configure a...
Page 29
Monitoring and Setting the Machine Using a Computer Using Web Image Monitor, you can check the machine's status and change the settings. You can check which tray is running out of paper, register information in the Address Book, specify the network settings, configure and change the system settings, manage jobs, print the job history, and configure the authentication settings. • See "Using Web Image Monitor", Connecting the Machine/ System Settings. • See Web Image Monitor Help. Monitoring...
Page 30
Preventing Unauthorized CopyingYou can print embedded patterns on printouts to prevent unauthorized copying. • Using the copier function or the printer driver, you can embed a pattern in the printed document. If the document is copied on a machine with the Copy Data Security unit, protected pages aregrayed out in the copy. This can minimize the risk of confidential information being copied. Protected fax messages are grayed out before being transmitted or stored. If a document protected by unauthorized...