Lexmark 11 Patio Umbrella User Manual


 
Contents
4
Contents
Chapter 1: Introduction to MarkVision Professional .................. 7
Introduction..................................................................................................... 7
Terms used in this document ......................................................................... 8
What’s new in MarkVision Professional 11.0 ................................................. 8
MarkVision components................................................................................. 9
System requirements ................................................................................... 11
Chapter 2: Using MarkVision Professional................................ 17
Installing MarkVision Professional................................................................ 17
Getting started.............................................................................................. 29
Basics........................................................................................................... 32
Chapter 3: Configuring MarkVision Professional ..................... 40
Adding and removing devices...................................................................... 40
Creating folders............................................................................................ 44
Using filters................................................................................................... 46
Creating user accounts and user groups ..................................................... 48
Assigning user privileges.............................................................................. 51
Chapter 4: MarkVision Professional Security ........................... 52
Adapter password conformance................................................................... 52
Confidential print job settings....................................................................... 54
Secure communication................................................................................. 56
Secure viewing of encrypted hard disk drives.............................................. 60
User authentication ...................................................................................... 60
Chapter 5: Managing devices ..................................................... 64
Finding the devices you want ...................................................................... 64