background image

 

 

5

 

Deletion of a print or scan job or deletion of a scan-to-mailbox job from its scan-to-mailbox folder may not be recorded 
in the Audit Log.   

 

Extraneous  process  termination  events  (Event  50)  may  be  recorded  in  the  Audit  Log  when  the  device  is  rebooted  or 
upon  a  Power  Down  /  Power  Up.  Extraneous  security  certificate  completion  status  (Created/Uploaded/Downloaded) 
events (Event 38) may also be recorded. 

t).

 

The System  Administrator should download and review  the Audit Log on a daily basis. In downloading the  Audit Log the 
System  Administrator  should  ensure  that  Audit  Log  records  are  protected  after  they  have  been  exported  to  an  external 
trusted IT product and that the exported records are only accessible by authorized individuals. 

 

u).

 

Be careful not to create an IP Filtering rule that rejects incoming TCP traffic from all addresses with source port set to 80; 
this will disable the Web UI. Also, the System Administrator should configure IP filtering so that traffic to open ports from 
external users (specified by subnet mask) is dropped and so that following ports for web services are closed: tcp ports 53202, 
53303, 53404 and tcp/udp port 3702. 

IP  Filtering  is  not  available  for  either  the  AppleTalk  protocol  or  the  Novell  protocol  with  the  ‘IPX’  filing  transport.  Also,  IP 
Filtering will not work if IPv6 is used instead of IPv4.

 

v).

 

To enable disk encryption: 

 

At the Web UI, select the 

Properties

 tab. 

 

Select the following entries from the 

Properties

 '

Content

 menu’: 

Security

 

 

User Data Encryption

 

Select the 

Enabled

 checkbox in the 

User Data Encryption Enablement

 group box. 

 

Select  the  [

Apply

]  button.  This  will  save  the  indicated  setting.  After  saving  the  changes  the  Network  Controller  will 

reboot; once this reboot is completed the System Administrator will have to access the Web UI again. 

Before  enabling  disk  encryption  the  System  Administrator  should  make  sure  that  the  WorkCentre™ 
7525/7530/7535/7545/7556 is not in diagnostics mode and that there are no active or pending scan jobs. 

w).

 

The System Administrator should ensure that the Embedded Fax Card and fax software is properly installed.  The System 
Administrator can then set Embedded Fax parameters and options via the Local User Interface on the machine by following 
the instructions on pages 140 through 148 in the SAG. 

x).

 

To  enable  and  configure  IPSec,  follow  the  instructions  starting  on  page  83  of  the  SAG.  IPSec  should  be  used  to  secure 
printing jobs; HTTPS (SSL) should be used to secure scanning jobs.   

Use the default values for IPSec parameters listed in the IPSec discussion starting on page 83 in the SAG

 

whenever possible 

for secure IPSec setup.  

y).

 

To enable the session inactivity timers (termination of an inactive session) from the Web UI follow the instructions on page 
95 of the SAG. 

z).

 

There is a software verification test feature that checks the integrity of the executable code by comparing a calculated hash 
value against a pre-stored value to ensure the value has not changed. To initiate this feature perform the following from the 
Web UI: 

 

Select the 

Properties

 tab. 

 

Select the following entries from the 

Properties

 '

Content

 menu’: 

Security

 

 

Software Verification Test

 

Select the [

Start

] button to initiate the software verification test. 

aa).

 

To enable the Scan to Mailbox feature from the Web UI: 

 

Select the 

Properties

 tab. 

 

Select the following entries from the 

Properties

 '

Content

 menu’: 

Services

 

 

Scan to Mailbox 

 

Enablement

 

 

Select the [

Enable Scan to Mailbox

] button and then select the [

On Scan tab, view Mailboxes by default

] button.  

 

Select the [

Apply

] button. This will save the indicated settings. 

For the purposes of the evaluation, the Scan to Mailbox feature was set to store scanned documents only in private folders.  

To set the scan policies for the Scan to Mailbox feature, select the following entries from the 

Properties

 '

Content

 menu’: 

Services

 

 

Scan  to  Mailbox 

 

Scan  Policies.

  Public  folders  are  not  allowed  in  the  evaluated  configuration.  The  scan 

policies should therefore be set as follows: 

 

Deselect [

Allow Scanning to Default Public Folder

].

 

 

Deselect [

Require per Job password to public folders

].

 

 

Select [

Allow additional folders to be created

 

Содержание WorkCentre 7525

Страница 1: ...Version 1 4 Dec 09 2011 Secure Installation and Operation of Your WorkCentre 7525 7530 7535 7545 7556...

Страница 2: ...ementing the guidelines and recommendations specified in this document To log in to the Web UI as an authenticated System Administrator follow the instructions under Accessing CentreWare Information S...

Страница 3: ...if set from the Local UI or Admin Only if set from the WebUI Follow the instructions for Setting Job Deletion Options at the Control Panel on page 5 of the User Guide Supplement 4 from the Local UI or...

Страница 4: ...d For any previously initiated On Demand Image Overwrite request the confirmation sheet must have printed The Embedded Fax card must have the correct software version and must be properly configured W...

Страница 5: ...not be sent as a connection to the server could not be established o To be consistent with the evaluated configuration the HTTPS protocol should be used to send scan jobs to a remote IT product p To b...

Страница 6: ...o active or pending scan jobs w The System Administrator should ensure that the Embedded Fax Card and fax software is properly installed The System Administrator can then set Embedded Fax parameters a...

Страница 7: ...ish up to five fax forward rules from the WebUI follow the instructions for Fax Forwarding starting on page 146 of the SAG The evaluation assumes that after normal business hours Fax Forwarding on Rec...

Страница 8: ...ard office environment Office personnel should be made aware of authorized service calls for example through appropriate signage in order to discourage unauthorized physical attacks such as attempts t...

Страница 9: ...k Setup Wizard 17 The following windows are available to any authenticated and authorized user from the Local User Interface These windows provide standard machine services or job management capabilit...

Страница 10: ...e help Certificate Key Length Allows the System Administrator to define the minimum encryption key length Is accessible by selecting the Properties tab and then selecting the following entries from th...

Страница 11: ...ics postScriptTokens php Web Services IP Lockout Reset Allows the System Administrator to clear the Web Services IP Address Lockout cache Is accessible by typing http IP Address diagnostics ipLockout...

Страница 12: ...r messages are enabled disabled Is accessible by typing http IP Address diagnostics CRULowReorderMessageSuppression php Install Software View Scan Templates Created by WIA Driver Allows the System Adm...

Отзывы: