CONTENTS 5CONTENTSPreface................................................................................................................................................. 3How to read this manual ............................................................................................................................................ 3Chapter 1 The High Security ModePrecautions on Using the High Security Mode .......................................................................................... 8Confirmation of the mode ........................................................................................................................................... 9Operational conditions.............................................................................................................................................. 10Chapter 2 UNIQUE FUNCTIONSTemporary Password .......................................................................................................................... 14Conditions when a temporary password is used ..................................................................................................... 14Operation by a user when a temporary password is used....................................................................................... 14Hold (Fax)........................................................................................................................................... 15Printing a job in the Hold (Fax) queue ...................................................................................................................... 15Chapter 3 THE INITIAL VALUESPrecautions on the Initial Values .......................................................................................................... 18Logging in ................................................................................................................................................................... 18Initial value list ........................................................................................................................................................... 19Chapter 4 APPENDIXList of target events for monitoring and logs to be sent to the Syslog server ............................................ 26CC Certification obtained version list .................................................................................................... 29