background image

 

 

 

Deselect 

Allow Scanning to Default Public Folder

 

 

Deselect 

Require per Job password to public folders

 

 

Select 

Allow additional folders to be created

 

 

 

Select 

Require password when creating additional folders

 

 

 

Select 

Prompt for password when scanning to private folder

 

  Deselect 

Allow access to job log data

  

5. 

Scan to Email

:  

 

Set the domain filtering to limit the domains to which Scan to E-mail jobs can be sent. Enable the domain 
filtering  option  by  following  the  instructions  under  “Editing  Domain  and  Email  Filter  Settings”  under 
“Configuring Email Security Settings” under “Scanning to an Email Address” in Section 7 of the SAG. 

 

Configure encryption and signing of Scan to Email jobs by following the instructions for “Configuring Email 
Encryption  Setting

s”  and  “Configuring  Email  Signing  Settings”,  respectively,  under  “Configuring  Email 

Security Settings” under “Scanning to an Email Address” in Section 7 of the SAG. Set the ‘Email Encryption 
Enablement’ option to 

Always On; Not Editable by user

 

Configure encryption of Scan to Email jobs sent from the device over SMTP by following the instructions 
for “Configuring SMTP Connection Encryption Settings” under “SMTP” in Section 3 of the  SAG. Set the 
‘Email Signing Enablement’ option to 

Always On; Not Editable by user

 

Configure authentication of SMTP to send Scan to Email jobs or to forward received Embedded Faxes via 
email 

by following the instructions for “Configuring SMTP Authentication Settings” under “SMTP” in Section 

3 of the SAG. 

 

 

Summary of Contents for WorkCentre 3655

Page 1: ...ntre 5845 5855 5865 5865i 5875 5875i 5890 5890i WorkCentre 5945 5945i 5955 5955i WorkCentre 6655 6655i WorkCentre 7220 7220i 7225 7225i WorkCentre 7830 7830i 7835 7835i 7845 7845i 7855 7855i WorkCentr...

Page 2: ...from the Common Criteria Certified Product website http www commoncriteriaportal org products html list of evaluated products from the Xerox security website http www xerox com information security c...

Page 3: ...Accessing Administration and Configuration Settings in Section 2 of the applicable System Administration Guide SAG 5 To log in to the Local User Interface denoted hereafter in this document as the Con...

Page 4: ...ructions in Section 4 of the SAG Set up unique user accounts with appropriate privileges on the device for all users who require access to the device by following the User Database instructions in Sec...

Page 5: ...ed certificate is installed by default on the device If a CA certificate is desired a Certificate Signing Request CSR will have to be sent to a Certificate Authority to obtain the CA Certificate befor...

Page 6: ...number for the Audit Log Server Enter the directory path to the filename where the transferred Audit Log is to be stored Enter the login name and password to access the Audit Log server Either schedu...

Page 7: ...re print job only the submitter of a held print job can release the job and only the System Administrator can delete any print job 16 802 1x Device Authentication Enable and configure 802 1x device au...

Page 8: ...ption and signing Workflow Scanning Scan to Mailbox Scan to USB Print from USB Print from Mailbox NTP SMB Filing When setting up the device to be in the evaluated configuration perform the following s...

Page 9: ...Fax in Section 8 of the SAG Makes sure the Delete on Print option is selected for Received Documents The Local Polling option and embedded fax mailboxes should not be set up or used at any time Remot...

Page 10: ...encryption and signing of Scan to Email jobs by following the instructions for Configuring Email Encryption Settings and Configuring Email Signing Settings respectively under Configuring Email Securit...

Page 11: ...0 of the SAG II Secure Acceptance Secure acceptance once device delivery and installation is completed should be done by Printing out a Configuration Report from the Web UI by following the Printing t...

Page 12: ...age will persist until an On Demand Image overwrite is initiated by the System Administrator In the case that the copy controller is reset at the same time a copy job is being processed by the device...

Page 13: ...certificate should be uploaded to the device so the device can verify the certificate provided by the remote repository When an SSL certificate for a remote SSL repository fails its validation checks...

Page 14: ...rvice calls for example through appropriate signage in order to discourage unauthorized physical attacks such as attempts to remove the internal hard disk drive s Ensure that office personnel are made...

Page 15: ...vice Allows the user to pause an active copy print workflow scanning scan to email Internet Fax or Embedded Fax job while it is being processed Is accessible by selecting the Stop machine hard button...

Page 16: ...Filter guess algorithm will use a strict or loose interpretation Is accessible by typing http IP Address diagnostics postScriptTokens php Web Services IP Lockout Reset Allows the System Administrator...

Page 17: ...t be displayed for a device in the evaluated configuration Scan Image Compression Allows the System Administrator to manage the asymmetric sub sampling options of scan image processing Is accessible b...

Page 18: ...m the Web User Interface with no user login and authentication required Site Map Provides the user with hyperlink pointers to each Web User Interface screen organized by Web UI tab Is accessible by se...

Page 19: ...oss of business profits or special damages even if Xerox Corporation has been advised of the possibility of such damages Some states do not allow the exclusion or limitation of liability for consequen...

Reviews:

Related manuals for WorkCentre 3655