Xerox Versant 80 Press Beveiligingshandleiding - Pagina 3

Blader online of download pdf Beveiligingshandleiding voor {categorie_naam} Xerox Versant 80 Press. Xerox Versant 80 Press 45 pagina's. Entry production color presses
Ook voor Xerox Versant 80 Press: Veiligheidshandboek (26 pagina's), Klantverwachting en installatiehandleiding (48 pagina's)

Xerox Versant 80 Press Beveiligingshandleiding
Xerox® Security Guide for Entry Production Color Class Products

Table of Contents

1
INTRODUCTION ................................................................................................................................ 1-3
................................................................................................................................................. 1-3
................................................................................................................................... 1-3
.............................................................................................................................................. 1-3
......................................................................................................................................... 1-4
...................................................................................................................................... 1-4
................................................................................................................................................. 1-4
..................................................................................................................................... 1-4
........................................................................................................................................... 1-5
2
USER DATA PROTECTION .............................................................................................................. 2-7
3
NETWORK SECURITY .................................................................................................................... 3-10
4
CONTROLS ............................................................................................................................................. 4-19
V
.............................................................................................................................. 4-20
R
S
................................................................................... E
UNTIME
ECURITY
.................................................................................................................................. 4-21
5
CONFIGURATION & SECURITY POLICY MANAGEMENT SOLUTIONS ..................................... 5-22
6
IDENTIFICATION, AUTHENTICATION, AND AUTHORIZATION .................................................. 6-23
.................................................................................................................................... 6-23
7
ADDITIONAL INFORMATION & RESOURCES .............................................................................. 7-26
® ............................................................................................................................ 7-26
APPENDIX A: PRODUCT SECURITY PROFILES ................................................................................ 7-27
V
® 80/180 ................................................................................................................................ 7-28
V
® 2100/3100 ........................................................................................................................... 7-31
March 2019
........................................................................................................................... 1-3
.............................................................................................................................. 1-5
............................................................................................................................. 2-8
.................................................................................................................... 3-10
.......................................................................................................................... 3-11
.................................................................................................................. 3-16
V
...................................................................................................... 3-17
.......................................................................................... 3-17
..................................................................................................................... 4-19
...................................................................................................................... 4-20
............................................................................................................. 4-20
......................................................................................................................... 4-21
) .............................................................................................................. 4-21
V
............................................................................................... 7-26
........................................................................................................................ 7-26
...................................................................................... 2-7
............................................................................... 3-17
) ................................................................................ 6-25
! B
RROR
OOKMARK NOT DEFINED
Page 1-1
.