Ricoh Mp C6502 User Guide
Here you can view all the pages of manual Ricoh Mp C6502 User Guide. The Ricoh manuals for All in One Printer are available online for free. You can easily download all the documents as PDF.
Page 31
Sending and Receiving Faxes via the Internet E-mail Transmission and ReceptionThis machine converts scanned document images to e-mail format, and transmits and receives the e-mail data over the Internet. • To send a document, specify an e-mail address instead of dialing the destination telephone number (Internet Fax and e-mail transmission). See "Specifying an Internet Fax Destination by Entering It Manually", Fax. • This machine can receive e-mail messages via Internet Fax or from computers...
Page 32
• For details about the machine's settings, see "Network Settings Requirements", Connecting theMachine/ System Settings . 1. What You Can Do with This Machine 22
Page 33
Sending and Receiving Faxes by Using the Machine without Fax Unit Installed You can send and receive faxes through a different machine's fax functions via a network (Remote Fax). • To use the remote fax function, install the fax connection unit on the main-machine and sub- machine. • The procedure for sending faxes is as same as that of for the machine with the fax unit. When a job has finished, confirm results displayed on sending history or printed on reports. • You can forward documents received...
Page 34
Using the Facsimile and the Scanner in a Network Environment • You can send scan files to a specified destination using e-mail (Sending scan files by e-mail). See "Overview of E-mail Transmission Function", Fax. See "Basic Procedure for Sending Scan Files by E-mail", Scan. • You can send scan files directly to folders (Sending scan files by Scan to Folder). See "Overview of Folder Transmission Function", Fax. See "Basic Procedure When Using Scan to Folder", Scan. • You...
Page 35
Embedding Text Information in Scanned Files You can extract text information from a scanned document and embed it in the file without using a computer. If you scan a document using this function, embedded text can be searched by using the text search function or copied to another document. • To use this function, the optional OCR unit is required. • You can select a file type from [PDF], [High Compression PDF], or [PDF/A]. • This function can optically recognize characters in various languages and up to...
Page 36
Preventing Information Leakage (Security Functions) • You can protect documents from unauthorized access and stop them from being copied without permission. • You can control the use of the machine, as well as prevent machine settings from being changed without authorization. • By setting passwords, you can prevent unauthorized access via the network. • You can erase or encrypt the data on the hard disk to minimize the risk of information leakage. • You can limit the usage of functions for each user. •...
Page 37
Centrally Controlling Scan Conditions and Distribution You can use the distributed scan management (DSM) system in Windows Server 2008 R2 to manage the destinations and scan settings for each individual user in a group and to use the information when distributing scanned data. You can also use this system to centrally manage information about people using the network and the machine's scanner functions. Both delivered files and user information can be controlled. • You must set up and configure a...
Page 38
Monitoring and Setting the Machine Using a Computer Using Web Image Monitor, you can check the machine's status and change the settings. You can check which tray is running out of paper, register information in the Address Book, specify the network settings, configure and change the system settings, manage jobs, print the job history, and configure the authentication settings. • See "Using Web Image Monitor", Connecting the Machine/ System Settings. • See Web Image Monitor Help. 1. What You...
Page 39
Preventing Unauthorized CopyingYou can print embedded patterns on printouts to prevent unauthorized copying. • Using the copier function or the printer driver, you can embed a pattern in the printed document. If the document is copied on a machine with the Copy Data Security unit, protected pages aregrayed out in the copy. This can minimize the risk of confidential information being copied. Protected fax messages are grayed out before being transmitted or stored. If a document protected by unauthorized...