Xerox WorkCentre 5845 Installation And Operation Manual Download Page 2

Secure Installation and Operation of Your WorkCentre™ 5845 / 
5855 / 5865 / 5875 / 5890,  WorkCentre™ 7220 / 7225, 
WorkCentre™ 7830 / 7835 / 7845 / 7855 and ColorQube™ 9301 / 
9302 / 9303 

 

Purpose and Audience 

This

 

document provides information on the  secure installation, setup and  operation.  All customers, but particularly those 

concerned with secure installation and operation of these devices, should follow these guidelines. 

Overview 

This document lists some important customer information and guidelines

1

 that will ensure that your device is operated and 

maintained in a secure manner.   

Background 

These  devices  are  currently  undergoing  Common  Criteria  evaluation  and  are  evaluated  in  a  particular  configuration, 
referred to in the rest of this document as the “evaluated configuration”. Section 1 describes how to install and configure 
the machine so that it is in the same configuration as it is for evaluation.  

Customers  are  advised  that  changes  to  the  evaluated  configuration  may  be  required  to  support  business  goals  and  for 
compliance  with  policies  applicable  to  their  environment

2

.  After  careful  review  of  this  document,  customers  should 

document settings to be applied to devices in their environment establishing a unique benchmark configuration to support 
processes  such  as  installation,  change  management  and  audit.  Xerox  Professional  Services,  which  can  be  contacted  via 

http://www.xerox.com/about-xerox/customer-training/tab1-ab-enus.html

,  can  assist  in  evaluating  and  configuring  these 

devices. 

The  information  provided  here  is  consistent  with  the  security  functional  claims  made  in  the  Security  Target

3

.  Upon 

completion  of  the  evaluation,  the  Security  Target  will  be  available  from  the  Common  Criteria  Certified  Product  website 
(

http://www.commoncriteriaportal.org/products.html

)  list  of  evaluated  products,  from  the  Xerox  security  website 

(http://www.xerox.com/information-security/common-criteria-certified/enus.html ), or from your Xerox representative. 

I.

 

Secure Installation and Set-up in the Evaluated Configuration

 

To set up the machines in the evaluated configuration, follow the guidelines below: 

a.

 

Set up and configure the following security protocols and functions in the evaluated configuration: 

 

Immediate Image Overwrite 

 

On Demand Image Overwrite 

 

Data Encryption 

 

FIPS 140-2 Mode 

 

IP Filtering  

 

Audit Log 

 

Security Certificates, Secure Sockets Layer (SSL) and HTTPS 

 

IPSec 

 

Local, Remote or Smart Card Authentication 

 

Local Authorization  

 

User Permissions 

 

Personalization 

 

802.1x Device Authentication 

 

Session Inactivity Timeout 

 

USB Port Security 

 

Software Verification Self-Test 

 

SFTP Filing 

 

Embedded Fax Secure Receive  

                     

1

 All guidelines in this document apply to the System Administrator unless explicitly stated otherwise. 

2

 For example, if the customer security policy requires that passwords are reset on a quarterly basis, the Reset Policy for the Admin Password will 

need to be enabled. Also, many customers choose to manage user credentials  centrally,  rather than on individual devices through local 
authorization. 

3

 Xerox Multifunction Device Security Target WorkCentre 5845, 5855, 5865, 5875, 5890, 7220, 7225, 7830, 7835, 7845, 7855, 7965, 7975 & 

ColorQube 9301, 9302, 9303, Latest Version issued 

Summary of Contents for WorkCentre 5845

Page 1: ...Version 1 3 May 6 2013 Secure Installation and Operation of Your WorkCentre 5845 5855 5865 5875 5890 WorkCentre 7220 7225 WorkCentre 7830 7835 7845 7855 and ColorQube 9301 9302 9303...

Page 2: ...he information provided here is consistent with the security functional claims made in the Security Target 3 Upon completion of the evaluation the Security Target will be available from the Common Cri...

Page 3: ...assword Reset security feature so it is not used To disable this feature perform the following At the Web UI select the Properties tab Select the following entries from the Properties Content menu Sec...

Page 4: ...self signed certificate is installed by default on the device If a CA certificate is desired a Certificate Signing Request CSR will have to be sent to a Certificate Authority to obtain the CA Certific...

Page 5: ...ure Print Settings in Section 5 of the SAG Make sure the Release Policies for Secure Print Jobs Requiring Passcode When the User is Already Logged In option is set to Prompt for Passcode Before Releas...

Page 6: ...nd SFTP Filing Settings under FTP SFTP Filing in Section 3 of the SAG c The following protocols services and functions are considered part of the evaluated configuration and should be enabled when nee...

Page 7: ...ction 8 of the SAG Makes sure the Delete on Print option is selected for Received Documents The Local Polling option and embedded fax mailboxes should not be set up or used at any time Remote Polling...

Page 8: ...disable when complete Software upgrades can be enabled disabled by following the instructions for Enabling Upgrades under Updating the Printer Software in Section 10 of the SAG II Secure Acceptance Se...

Page 9: ...nd Image Overwrite should be run This error message will persist until an On Demand Image overwrite is initiated by the System Administrator In the case that the copy controller is reset at the same t...

Page 10: ...can job will be deleted and not transferred to the remote SSL repository In this case the job status reported in the Completed Job Log for this job will read Job could not be sent as a connection to t...

Page 11: ...nter to report the suspected problem and initiate the SPAR Software Problem Action Request 10 process for addressing problems found by Xerox customers d Depending upon the configuration of the device...

Page 12: ...can to email LAN Fax or Embedded Fax job fails The error message informs the user to notify the System Administrator that an On Demand Overwrite should be run and persists on the Control Panel screen...

Page 13: ...ler LDAP server and other kerberized services as they are developed Is accessible by typing http IP Address diagnostics kerberosSettings php Download DLM PCL Forms Allows the System Administrator to d...

Page 14: ...nters to each Web User Interface screen organized by Web UI tab Is accessible by selecting the Site Map button in the upper right hand corner of every Web User Interface page Exit from Sleep Mode Auto...

Reviews: