Operation Manual

35
3.2 E-mail Alarm (Fortsetzung)
.OLFNHQ6LH[Alert Settings] LP+DXSWPHQXPGLH(PDLO$ODUP(LQVWHOOXQJHQ
YRU]XQHKPHQ
:lKOHQVLHXQGNRQ¿JXULHUHQVLHDOOH$ODUP(LQVWHOOXQJHQ/HVHQVLHGHQ
$EVFKQLWW$OHUW6HWWLQJV$ODUP(LQVWHOOXQJHQ
20ZHQQVLHZHLWHUH
,QIRUPDWLRQHQEHQ|WLJHQ
.OLFNHQ6LH[Apply] XPGLH(LQVWHOOXQJHQ]XVSHLFKHUQ
)HKOIXQNLRQV:DUQ(PDLOVKDEHQIROJHQGH6WUXNWXU
%HWUHII]HLOH 0DLOWLWOH! 3URMHNWRUQDPH!
7H[W 0DLOWH[W!
'DWH $XVIDOO:DUQGDWXP!
7LPH $XVIDOO:DUQ]HLW!
,3$GGUHVV 3URMHNWRU,3$GUHVVH!
0$&$GGUHVV 3URMHNWRU0$&$GUHVVH!
3. Netzwerk-Funktionen