Step 3 – TROY Group MICR_IRD 4300 Security Printing Solutions User’s Guide User Manual

Page 93

Advertising
background image

Section 5

Installing the TROY Support Files

Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. D

5-7

STEP 3:

Install the
TROY

Software for
Windows

(cont.)

Install the TROY Port Monitor for Windows

98, ME, 2000/NT4.0, XP

The TROY Port Monitor allows each user to embed additional user-defined data and/or print commands (data
encryption and TROY security commands) into the print data stream generated by their Windows application
before it is sent to the printer. Once a port monitor is set up on the host computer, all this functionality takes
place in the background without the need for user intervention.

Using the TROY Port Monitor or custom applications designed to print to TROY Security Printers, certain
printer feature settings can be temporarily changed during a print job. When the print job has finished, the EX
series printer will automatically return to the original default feature configuration set by the administrator. Refer
to Section 6 – Using the TROY Port Monitor for more information.

NOTE: To maintain MICR printing security and to allow users the ability to configure their MICR print jobs, the

TROY Port Monitor must be installed on each host computer that will be used to print MICR documents on
the TROY Security Printer.

1. Close all applications before installing the TROY Port Monitor.

2. Place

the TROY Security Printing Solutions CD into your CD-ROM drive.

3. From

the

Start menu, click on Run, and then click on Browse.

4. Click on the down-arrow in the Look In box at the top of the window, and then click on the drive letter

designated for the CD-ROM drive on your computer.

5. Double-click on the TROY Port Monitor folder.

6. Click on the file named setup.exe, click on Open, and then click on OK to start the installation process.

Follow the screen prompts to complete the installation.

NOTE: The TROY Port Monitor can be uninstalled using the uninstall procedures located at the end of this

section.







Advertising