Security and tracking levels are fully configurable. The administrator can define the access level for each operator to different machine operations.

The event and operator logging feature may be de-activated when not required for convenience.