Xerox WorkCentre 6400 Informatie handleiding - Pagina 4

Blader online of download pdf Informatie handleiding voor {categorie_naam} Xerox WorkCentre 6400. Xerox WorkCentre 6400 44 pagina's. Color multifunction printer
Ook voor Xerox WorkCentre 6400: Kenmerken (1 pagina's), Specificaties (1 pagina's), Gebruiksaanwijzing (17 pagina's), Handleiding voor beoordelaars (25 pagina's), Installatiehandleiding (2 pagina's), Configuratiehandleiding (12 pagina's), Handleiding voor beoordelaars (24 pagina's), Gebruiksaanwijzing (17 pagina's), Gebruiksaanwijzing (16 pagina's), Gebruiksaanwijzing (16 pagina's), Handmatig (32 pagina's)

Xerox WorkCentre 6400 Informatie handleiding
XEROX WorkCentre 6400 Information Assurance Disclosure Paper
3.2.
Login and Authentication Methods ........................................................................................................................25
3.2.1. System Administrator Login [All product configurations] ...........................................................................................25
3.2.2. User authentication.....................................................................................................................................................................25
3.3.
System Accounts ...........................................................................................................................................................27
3.3.1. Printing [Multifunction models only]....................................................................................................................................27
3.3.2. Network Scanning [Multifunction models only] ..............................................................................................................27
3.4.
Diagnostics......................................................................................................................................................................27
3.4.1. Service [All product configurations]......................................................................................................................................27
3.4.2. tty Mode...........................................................................................................................................................................................27
3.4.3. Summary..........................................................................................................................................................................................28
4.
SECURITY ASPECTS OF SELECTED FEATURES ...................................................................... 29
4.1.
Audit Log..........................................................................................................................................................................29
4.2.
Xerox Standard Accounting.......................................................................................................................................33
4.3.
Automatic Meter Reads ..............................................................................................................................................33
4.4.
Encrypted Partitions.....................................................................................................................................................33
4.5.
Image Overwrite............................................................................................................................................................34
4.5.1. Algorithm .........................................................................................................................................................................................34
4.5.2. User Behavior .................................................................................................................................................................................34
4.5.3. Overwrite Timing ..........................................................................................................................................................................35
5.
RESPONSES TO KNOWN VULNERABILITIES ......................................................................... 36
5.1.
Security @ Xerox (www.xerox.com/security)........................................................................................................36
6.
APPENDICES....................................................................................................................................... 37
6.1.
Appendix A - Abbreviations ......................................................................................................................................37
6.2.
Appendix B - Supported MIB Objects ....................................................................................................................39
6.3.
Appendix C -Standards...............................................................................................................................................42
6.4.
Appendix E - References.............................................................................................................................................44
Ver. 1.00, May 2010
4
Page 4 of 44