Xerox WorkCentre 6400 Manuale informativo - Pagina 4

Sfoglia online o scarica il pdf Manuale informativo per Scanner Xerox WorkCentre 6400. Xerox WorkCentre 6400 44. Color multifunction printer
Anche per Xerox WorkCentre 6400: Caratteristiche (1 pagine), Specifiche tecniche (1 pagine), Manuale d'uso rapido (17 pagine), Manuale del valutatore (25 pagine), Manuale di installazione (2 pagine), Manuale di configurazione (12 pagine), Manuale del valutatore (24 pagine), Manuale d'uso rapido (17 pagine), Manuale d'uso rapido (16 pagine), Manuale d'uso rapido (16 pagine), Manuale (32 pagine)

Xerox WorkCentre 6400 Manuale informativo
XEROX WorkCentre 6400 Information Assurance Disclosure Paper
3.2.
Login and Authentication Methods ........................................................................................................................25
3.2.1. System Administrator Login [All product configurations] ...........................................................................................25
3.2.2. User authentication.....................................................................................................................................................................25
3.3.
System Accounts ...........................................................................................................................................................27
3.3.1. Printing [Multifunction models only]....................................................................................................................................27
3.3.2. Network Scanning [Multifunction models only] ..............................................................................................................27
3.4.
Diagnostics......................................................................................................................................................................27
3.4.1. Service [All product configurations]......................................................................................................................................27
3.4.2. tty Mode...........................................................................................................................................................................................27
3.4.3. Summary..........................................................................................................................................................................................28
4.
SECURITY ASPECTS OF SELECTED FEATURES ...................................................................... 29
4.1.
Audit Log..........................................................................................................................................................................29
4.2.
Xerox Standard Accounting.......................................................................................................................................33
4.3.
Automatic Meter Reads ..............................................................................................................................................33
4.4.
Encrypted Partitions.....................................................................................................................................................33
4.5.
Image Overwrite............................................................................................................................................................34
4.5.1. Algorithm .........................................................................................................................................................................................34
4.5.2. User Behavior .................................................................................................................................................................................34
4.5.3. Overwrite Timing ..........................................................................................................................................................................35
5.
RESPONSES TO KNOWN VULNERABILITIES ......................................................................... 36
5.1.
Security @ Xerox (www.xerox.com/security)........................................................................................................36
6.
APPENDICES....................................................................................................................................... 37
6.1.
Appendix A - Abbreviations ......................................................................................................................................37
6.2.
Appendix B - Supported MIB Objects ....................................................................................................................39
6.3.
Appendix C -Standards...............................................................................................................................................42
6.4.
Appendix E - References.............................................................................................................................................44
Ver. 1.00, May 2010
4
Page 4 of 44