00:00 Introduction
01:09 Start of the scan journey
02:26 Local network scanning
03:36 Cloud scanning
05:12 End of the scan journey
07:05 Summary
Links to all other videos in the Brother security fundamentals series:
Introduction: Brother security fundamentals (Part 1 of 12)
[ Ссылка ]
Secure print release: Brother security fundamentals (Part 2 of 12)
[ Ссылка ]
Secure network printing: Brother security fundamentals (Part 3 of 12)
[ Ссылка ]
Secure scanning: Brother security fundamentals (Part 4 of 12)
[ Ссылка ]
Device access restrictions: Brother security fundamentals (Part 5 of 12)
[ Ссылка ]
User access restrictions: Brother security fundamentals (Part 6 of 12)
[ Ссылка ]
Attack limitation: Brother security fundamentals (Part 7 of 12)
[ Ссылка ]
Recovery: Brother security fundamentals (Part 8 of 12)
[ Ссылка ]
Auditing: Brother security fundamentals (Part 9 of 12)
[ Ссылка ]
Secure firmware: Brother security fundamentals (Part 10 of 12)
[ Ссылка ]
Protecting network access: Brother security fundamentals (Part 11 of 12)
[ Ссылка ]
Online protection: Brother security fundamentals (Part 12 of 12)
[ Ссылка ]
Summary: Brother security fundamentals
[ Ссылка ]
Ещё видео!