5
•
Deletion of a print or scan job or deletion of a scan-to-mailbox job from its scan-to-mailbox folder may not be recorded
in the Audit Log.
•
Extraneous process termination events (Event 50) may be recorded in the Audit Log when the device is rebooted or
upon a Power Down / Power Up. Extraneous security certificate completion status (Created/Uploaded/Downloaded)
events (Event 38) may also be recorded.
t).
The System Administrator should download and review the Audit Log on a daily basis. In downloading the Audit Log the
System Administrator should ensure that Audit Log records are protected after they have been exported to an external
trusted IT product and that the exported records are only accessible by authorized individuals.
u).
Be careful not to create an IP Filtering rule that rejects incoming TCP traffic from all addresses with source port set to 80;
this will disable the Web UI. Also, the System Administrator should configure IP filtering so that traffic to open ports from
external users (specified by subnet mask) is dropped and so that following ports for web services are closed: tcp ports 53202,
53303, 53404 and tcp/udp port 3702.
IP Filtering is not available for either the AppleTalk protocol or the Novell protocol with the ‘IPX’ filing transport. Also, IP
Filtering will not work if IPv6 is used instead of IPv4.
v).
To enable disk encryption:
•
At the Web UI, select the
Properties
tab.
•
Select the following entries from the
Properties
'
Content
menu’:
Security
User Data Encryption
.
•
Select the
Enabled
checkbox in the
User Data Encryption Enablement
group box.
•
Select the [
Apply
] button. This will save the indicated setting. After saving the changes the Network Controller will
reboot; once this reboot is completed the System Administrator will have to access the Web UI again.
Before enabling disk encryption the System Administrator should make sure that the WorkCentre™
7525/7530/7535/7545/7556 is not in diagnostics mode and that there are no active or pending scan jobs.
w).
The System Administrator should ensure that the Embedded Fax Card and fax software is properly installed. The System
Administrator can then set Embedded Fax parameters and options via the Local User Interface on the machine by following
the instructions on pages 140 through 148 in the SAG.
x).
To enable and configure IPSec, follow the instructions starting on page 83 of the SAG. IPSec should be used to secure
printing jobs; HTTPS (SSL) should be used to secure scanning jobs.
Use the default values for IPSec parameters listed in the IPSec discussion starting on page 83 in the SAG
whenever possible
for secure IPSec setup.
y).
To enable the session inactivity timers (termination of an inactive session) from the Web UI follow the instructions on page
95 of the SAG.
z).
There is a software verification test feature that checks the integrity of the executable code by comparing a calculated hash
value against a pre-stored value to ensure the value has not changed. To initiate this feature perform the following from the
Web UI:
•
Select the
Properties
tab.
•
Select the following entries from the
Properties
'
Content
menu’:
Security
Software Verification Test
.
•
Select the [
Start
] button to initiate the software verification test.
aa).
To enable the Scan to Mailbox feature from the Web UI:
•
Select the
Properties
tab.
•
Select the following entries from the
Properties
'
Content
menu’:
Services
Scan to Mailbox
Enablement
•
Select the [
Enable Scan to Mailbox
] button and then select the [
On Scan tab, view Mailboxes by default
] button.
•
Select the [
Apply
] button. This will save the indicated settings.
For the purposes of the evaluation, the Scan to Mailbox feature was set to store scanned documents only in private folders.
To set the scan policies for the Scan to Mailbox feature, select the following entries from the
Properties
'
Content
menu’:
Services
Scan to Mailbox
Scan Policies.
Public folders are not allowed in the evaluated configuration. The scan
policies should therefore be set as follows:
•
Deselect [
Allow Scanning to Default Public Folder
].
•
Deselect [
Require per Job password to public folders
].
•
Select [
Allow additional folders to be created
]