XEROX WorkCentre 6400 Information Assurance Disclosure Paper
4
Ver. 1.00, May 2010
Page
4 of 44
3.2.
Login and Authentication Methods ........................................................................................................................25
3.2.1.
System Administrator Login [All product configurations] ...........................................................................................25
3.2.2.
User authentication.....................................................................................................................................................................25
3.3.
System Accounts ...........................................................................................................................................................27
3.3.1.
Printing [Multifunction models only]....................................................................................................................................27
3.3.2.
Network Scanning [Multifunction models only] ..............................................................................................................27
3.4.
Diagnostics......................................................................................................................................................................27
3.4.1.
Service [All product configurations]......................................................................................................................................27
3.4.2.
tty Mode...........................................................................................................................................................................................27
3.4.3.
Summary..........................................................................................................................................................................................28
4.
SECURITY ASPECTS OF SELECTED FEATURES ...................................................................... 29
4.1.
Audit Log..........................................................................................................................................................................29
4.2.
Xerox Standard Accounting.......................................................................................................................................33
4.3.
Automatic Meter Reads ..............................................................................................................................................33
4.4.
Encrypted Partitions.....................................................................................................................................................33
4.5.
Image Overwrite............................................................................................................................................................34
4.5.1.
Algorithm .........................................................................................................................................................................................34
4.5.2.
User Behavior .................................................................................................................................................................................34
4.5.3.
Overwrite Timing ..........................................................................................................................................................................35
5.
RESPONSES TO KNOWN VULNERABILITIES ......................................................................... 36
5.1.
Security @ Xerox (www.xerox.com/security)........................................................................................................36
6.
APPENDICES....................................................................................................................................... 37
6.1.
Appendix A – Abbreviations ......................................................................................................................................37
6.2.
Appendix B – Supported MIB Objects ....................................................................................................................39
6.3.
Appendix C –Standards...............................................................................................................................................42
6.4.
Appendix E – References.............................................................................................................................................44