background image

 

 

 

Purpose and Audience 

This

 

document  provides  information  on  the  secure  installation,  setup  and  operation.  All  customers,  but  particularly 

those concerned with secure installation and operation of these devices, should follow these guidelines. 

Overview 

This document lists some important customer information and guidelines

1

 that will ensure that your device is operated 

and maintained in a secure manner.   

Background 

These devices are currently undergoing Common Criteria evaluation and are evaluated in a particular configuration, 

referred to in the rest of this document as the “evaluated configuration”. Section 1 describes how to install and configure 
the machine so that it is in the same configuration as it is for evaluation.  

Customers are advised that changes to the evaluated configuration may be required to support business goals and 
for compliance with policies applicable to their environment

2

. After careful review of this document, customers should 

document  settings  to  be  applied  to  devices  in  their  environment  establishing  a  unique  benchmark  configuration  to 
support processes such as installation, change management and audit. Xerox Professional Services, which can be 
contacted  vi

http://www.xerox.com/about-xerox/customer-training/tab1-ab-enus.html

,  can  assist  in  evaluating  and 

configuring these devices. 

The information provided here is consistent with the security functional claims made in the applicable Security Targets

 

3

. Upon completion of the evaluation, the Security Target will be available from the Common Criteria Certified Product 

website  (

http://www.commoncriteriaportal.org/products.html

)  list  of  evaluated  products,  from  the  Xerox  security 

website  (http://www.xerox.com/information-security/common-criteria-certified/enus.html),  or  from  your  Xerox 
representative. 

 

 

                     

1

 All guidelines in this document apply to the System Administrator unless explicitly stated otherwise. 

2

 For example, if the customer security policy requires that passwords are reset on a quarterly basis, the Reset Policy for the Admin Password will 

need to be enabled. Also, many customers choose to manage user credentials centrally, rather than on individual devices through local 

authorization. 

3

Xerox Multi-Function Security Target, Xerox® WorkCentre® 3655/3655i 2016 Xerox® ConnectKey® Technology, Version 1.2, July 2016 

Xerox Multi-Function Security Target, Xerox® WorkCentre® 5845/5855/5865/5865i/5875/5875i/5890/5890i 2016 Xerox® ConnectKey® 

Technology, Version 1.2, July 2016; Xerox Multi-Function Security Target, Xerox® WorkCentre® 5945/5945i/5955/5955i 2016 Xerox® 

ConnectKey® Technology, Version 1.2, July 2016; Xerox Multi-Function Security Target, Xerox® WorkCentre® 6655/6655i 2016 Xerox® 

ConnectKey® Technology, Version 1.2, July 2016; Xerox Multi-Function Security Target, Xerox® WorkCentre® 7220/7220i/7225/7225i 2016 

Xerox® ConnectKey® Technology, Version 1.2, July 2016; Xerox Multi-Function Security Target, Xerox® WorkCentre® 7830/7830i/7835/7835i 

2016 Xerox® ConnectKey® Technology, Version 1.2, July 2016; Xerox Multi-Function Security Target, Xerox® WorkCentre® 

7845/7845i/7855/7855i 2016 Xerox® ConnectKey® Technology, Version 1.2, July 2016; Xerox Multi-Function Security Target, Xerox® 

WorkCentre® 7970/7970i 2016 Xerox® ConnectKey® Technology, Version 1.2, July 2016. 

Summary of Contents for WorkCentre 3655

Page 1: ...ntre 5845 5855 5865 5865i 5875 5875i 5890 5890i WorkCentre 5945 5945i 5955 5955i WorkCentre 6655 6655i WorkCentre 7220 7220i 7225 7225i WorkCentre 7830 7830i 7835 7835i 7845 7845i 7855 7855i WorkCentr...

Page 2: ...from the Common Criteria Certified Product website http www commoncriteriaportal org products html list of evaluated products from the Xerox security website http www xerox com information security c...

Page 3: ...Accessing Administration and Configuration Settings in Section 2 of the applicable System Administration Guide SAG 5 To log in to the Local User Interface denoted hereafter in this document as the Con...

Page 4: ...ructions in Section 4 of the SAG Set up unique user accounts with appropriate privileges on the device for all users who require access to the device by following the User Database instructions in Sec...

Page 5: ...ed certificate is installed by default on the device If a CA certificate is desired a Certificate Signing Request CSR will have to be sent to a Certificate Authority to obtain the CA Certificate befor...

Page 6: ...number for the Audit Log Server Enter the directory path to the filename where the transferred Audit Log is to be stored Enter the login name and password to access the Audit Log server Either schedu...

Page 7: ...re print job only the submitter of a held print job can release the job and only the System Administrator can delete any print job 16 802 1x Device Authentication Enable and configure 802 1x device au...

Page 8: ...ption and signing Workflow Scanning Scan to Mailbox Scan to USB Print from USB Print from Mailbox NTP SMB Filing When setting up the device to be in the evaluated configuration perform the following s...

Page 9: ...Fax in Section 8 of the SAG Makes sure the Delete on Print option is selected for Received Documents The Local Polling option and embedded fax mailboxes should not be set up or used at any time Remot...

Page 10: ...encryption and signing of Scan to Email jobs by following the instructions for Configuring Email Encryption Settings and Configuring Email Signing Settings respectively under Configuring Email Securit...

Page 11: ...0 of the SAG II Secure Acceptance Secure acceptance once device delivery and installation is completed should be done by Printing out a Configuration Report from the Web UI by following the Printing t...

Page 12: ...age will persist until an On Demand Image overwrite is initiated by the System Administrator In the case that the copy controller is reset at the same time a copy job is being processed by the device...

Page 13: ...certificate should be uploaded to the device so the device can verify the certificate provided by the remote repository When an SSL certificate for a remote SSL repository fails its validation checks...

Page 14: ...rvice calls for example through appropriate signage in order to discourage unauthorized physical attacks such as attempts to remove the internal hard disk drive s Ensure that office personnel are made...

Page 15: ...vice Allows the user to pause an active copy print workflow scanning scan to email Internet Fax or Embedded Fax job while it is being processed Is accessible by selecting the Stop machine hard button...

Page 16: ...Filter guess algorithm will use a strict or loose interpretation Is accessible by typing http IP Address diagnostics postScriptTokens php Web Services IP Lockout Reset Allows the System Administrator...

Page 17: ...t be displayed for a device in the evaluated configuration Scan Image Compression Allows the System Administrator to manage the asymmetric sub sampling options of scan image processing Is accessible b...

Page 18: ...m the Web User Interface with no user login and authentication required Site Map Provides the user with hyperlink pointers to each Web User Interface screen organized by Web UI tab Is accessible by se...

Page 19: ...oss of business profits or special damages even if Xerox Corporation has been advised of the possibility of such damages Some states do not allow the exclusion or limitation of liability for consequen...

Reviews:

Related manuals for WorkCentre 3655