Restricting device use, What can be done with use restrictions, Usage limitations – Oki MC363dn User Manual

Page 143: P. 143, Restricting device use” (p. 143)

Advertising
background image

- 143 -

9. Restricting Device Use

9. Restricting Device Use

What Can Be Done With Use Restrictions

The use of a device can be restricted by specifying restriction targets from the user name,
document name, host name and application name, and setting limit items for a registered
device.
Setting use restrictions for each device prevents unintended use of devices and enables
management of information leakage risks.

Usage Limitations

Restriction Targets that Can Be Registered

Use one of the following methods to specify the restriction target and register use restrictions.

Restriction Targets

that Can Be

Registered

Description

[User Name]

Register the user to restrict from printing from a computer or
accessing the panel.

(1) [User]

Select the user name/user group name registered in sPSV
(including those added from Active Directory) and register use
restrictions. ⇒ P. 147

(2) [Direct Input]

Enter the user name manually and register use restrictions.

P. 149

(3) [Job Log]

Select from the user names extracted from the job log acquired by
the device, and register use restrictions. ⇒ P. 150

(4) [File]

Select the user name from those extracted from the specified file
name, and register use restrictions. ⇒ P. 150

(5) [Other Computers] Select the user name from those extracted from the computers

that can participate in the network, and register use restrictions.

P. 151

(6) [Other Users]

Associate a different user name to the PIN registered in the device,
and register use restrictions. ⇒ P. 152

(7) [Role]

Registers usage restrictions to roles. Roles are used to set whether
an operation is permitted or prohibited, and are assigned to device
user information. ⇒ P. 153

[Document Name]

Register the document name to be restricted from printing from the
computer.

(8) [Job Log]

Select from the document names extracted from the job log
acquired by the device, and register use restrictions. ⇒ P. 157

(9) [Direct Input]

Enter the document name manually and register use restrictions.

P. 157

[Hosts]

Register the hosts to be restricted from printing from the computer.

(10) [Job Log]

Use restrictions are applied to hosts extracted from the job log
acquired by the device. ⇒ P. 158

Advertising