Contents
Overview.....................................................................................................3
Requirements..............................................................................................4
Recommended devices................................................................................5
Features.......................................................................................................6
Configuration...............................................................................................7
Enabling the application............................................................................................................................7
Configuring the application.......................................................................................................................7
Printing information pages......................................................................................................................10
Print Server Setup Page ....................................................................................................................................10
Lexmark Mobile Direct Connected Clients........................................................................................................10
Security Audit Log .............................................................................................................................................10
Connection.................................................................................................11
Android devices.......................................................................................................................................11
Windows devices.....................................................................................................................................11
iOS devices..............................................................................................................................................11
Other non-peer-to-peer devices.............................................................................................................12
Usage.......................................................................................................................................................12
Security......................................................................................................13
Notices.......................................................................................................14
Contents 2