Improve company productivity with a Business Account.Sign Up

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 845
  • Last Modified:

Permissions for scan to file

I am currently trying to setup our office scanner/copier/printer to be able to use the scan to file function that it supports. I have created a network share that has everyone - full control on the folder. I have setup the "shared" scan folder in the menu of the scanner and the scanner uses SMB to use our netwrok path. This function works fine if we provide credentials, is there a way that we do not need to have the machine provide credentials since "everyone" has full control on the network location folder? Our client machines are using Windows 7 and our copier is a Toshiba e-studio 233 series.
0
cmartineau
Asked:
cmartineau
  • 3
  • 3
1 Solution
 
Thomas Zucker-ScharffSystems AnalystCommented:
This is not an answer to your question, but something to be aware of if you are not already.  Our university policy disallows saving documents on the internal harddrive of the office scanner/copier/printer when using scan to file (you must use scan to email instead).  This is due to security concerns - any file saved to the hard drive is a potential leak - anyone can simply pull the harddrive.
0
 
cmartineauAuthor Commented:
Yeah we are going to disable that option to save to local hard drive, thank you for the heads up though! I was just wondering if we have to create a domain user name for the device to access the network path.
0
 
Thomas Zucker-ScharffSystems AnalystCommented:
Ours has an http interface and uses our mail system to send all files.
0
Improve Your Query Performance Tuning

In this FREE six-day email course, you'll learn from Janis Griffin, Database Performance Evangelist. She'll teach 12 steps that you can use to optimize your queries as much as possible and see measurable results in your work. Get started today!

 
cmartineauAuthor Commented:
yeah i might just use the scan to email and avoid the whole permissions thing.
0
 
Thomas Zucker-ScharffSystems AnalystCommented:
Good Luck!
0
 
cmartineauAuthor Commented:
thank you
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

  • 3
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now