To cancel scanning, press the [Stop] key. Check the information displayed in the dialog box, and then press any button. You can also store a scan file and simultaneously send it by e-mail. For details, see Simultaneous Storage and Sending by E-mail. After an e-mail is sent, the destination, sender, subject, text, and file name fields will be automatically cleared.
If you want to preserve the information in these fields, contact your local dealer. You cannot switch the screen while e-mail or other destinations are being specified.
To clear the specified destination, display the destination in the destination field of each screen, and then press the [Stop] key. Settings Help. Scan while specifying what computer documents will be saved to; whether to scan documents in color or black and white; whether to save documents as PDFs or JPEGs; and other settings.
Place the document s. Placing Documents. This screen is not displayed if only a computer is connected to the machine via USB. Scan type. The settings in the table above are all factory default settings. You can change settings from MF Scan Utility. The higher the resolution, the more detailed the image and the more memory and drive space the image will use. Available dpi values are:. The higher the quality, the larger the resulting file. You can customize the quality options by entering new values in the fields.
Available quality options are:. Select the file format to save the scanned images. Available file formats are:. This program only supports bundled OCR software. The availability of the OCR software may vary depending on the scanner model you purchase. You can fine tune settings like which ports to scan and limit scanning to certain vulnerability checks QIDs only. Think about creating a few option profiles for the different types of scans you want to perform.
The following settings can be tweaked to meet your specific needs: TCP ports scanned, UDP ports scanned, vulnerability checks QIDs to scan, load balancer detection, performance settings, authentication types and more.
The option profile you choose determines the depth of the scan. If you're not sure which options to use, start with the default profile. We provide "Initial Options" to get you started.
This profile has the most common settings and should meet most of your needs. We'll run all vulnerability checks that apply to each system, and we'll scan a list of standard ports. You can see this list in the option profile. By creating your own profile, you can fine tune settings like ports to scan and limit scanning to certain vulnerability checks. Do you want to use authentication? To use authentication, make sure you choose an option profile that has authentication enabled and make sure the IPs you want to scan are included in authentication records.
At scan time, we'll use the information provided in your records to log into the target hosts. Are you trying to meet PCI compliance? This profile has specific configuration settings that are required for compliance. Authenticated scanning is an important feature because many vulnerabilities require authenticated scanning for detection. In other words, are you scanning IPs on your network perimeter external or inside your corporate network internal?
External scanning is always available using our cloud scanners set up around the globe at our Security Operations Centers SOCs. For this option, choose External from the Scanner Appliance menu. Internal scanning uses scanner appliances placed inside your network. Choose the "Build my list" option to select one or more scanner appliances for your scan task. Don't have one? If you're doing internal scanning on asset groups, you can choose a scanner appliance by name or select one of these options:.
Select this option to use the default scanner in each asset group. Edit an asset group to assign the default scanner for the group. All Scanners in Asset Group.
0コメント