Xerox WorkCentre 6400 Manual Informasi - Halaman 4

Jelajahi secara online atau unduh pdf Manual Informasi untuk Pemindai Xerox WorkCentre 6400. Xerox WorkCentre 6400 44 halaman. Color multifunction printer
Juga untuk Xerox WorkCentre 6400: Fitur (1 halaman), Spesifikasi (1 halaman), Panduan Penggunaan Cepat (17 halaman), Panduan Evaluator (25 halaman), Panduan Instalasi (2 halaman), Panduan Konfigurasi (12 halaman), Panduan Evaluator (24 halaman), Panduan Penggunaan Cepat (17 halaman), Panduan Penggunaan Cepat (16 halaman), Panduan Penggunaan Cepat (16 halaman), Manual (32 halaman)

Xerox WorkCentre 6400 Manual Informasi
XEROX WorkCentre 6400 Information Assurance Disclosure Paper
3.2.
Login and Authentication Methods ........................................................................................................................25
3.2.1. System Administrator Login [All product configurations] ...........................................................................................25
3.2.2. User authentication.....................................................................................................................................................................25
3.3.
System Accounts ...........................................................................................................................................................27
3.3.1. Printing [Multifunction models only]....................................................................................................................................27
3.3.2. Network Scanning [Multifunction models only] ..............................................................................................................27
3.4.
Diagnostics......................................................................................................................................................................27
3.4.1. Service [All product configurations]......................................................................................................................................27
3.4.2. tty Mode...........................................................................................................................................................................................27
3.4.3. Summary..........................................................................................................................................................................................28
4.
SECURITY ASPECTS OF SELECTED FEATURES ...................................................................... 29
4.1.
Audit Log..........................................................................................................................................................................29
4.2.
Xerox Standard Accounting.......................................................................................................................................33
4.3.
Automatic Meter Reads ..............................................................................................................................................33
4.4.
Encrypted Partitions.....................................................................................................................................................33
4.5.
Image Overwrite............................................................................................................................................................34
4.5.1. Algorithm .........................................................................................................................................................................................34
4.5.2. User Behavior .................................................................................................................................................................................34
4.5.3. Overwrite Timing ..........................................................................................................................................................................35
5.
RESPONSES TO KNOWN VULNERABILITIES ......................................................................... 36
5.1.
Security @ Xerox (www.xerox.com/security)........................................................................................................36
6.
APPENDICES....................................................................................................................................... 37
6.1.
Appendix A - Abbreviations ......................................................................................................................................37
6.2.
Appendix B - Supported MIB Objects ....................................................................................................................39
6.3.
Appendix C -Standards...............................................................................................................................................42
6.4.
Appendix E - References.............................................................................................................................................44
Ver. 1.00, May 2010
4
Page 4 of 44