Security
Security and tracking levels are fully configurable. The administrator can define the access level for each operator to different machine operations.
The event and operator logging feature may be de-activated when not required for convenience.