Xerox Versant 180 Press Podręcznik bezpieczeństwa - Strona 23
Przeglądaj online lub pobierz pdf Podręcznik bezpieczeństwa dla Drukarka Xerox Versant 180 Press. Xerox Versant 180 Press 45 stron. Quick reference for printing extra large sheets (xls) on the ex 180 and ex-i 180 print servers, powered by fiery
Również dla Xerox Versant 180 Press: Skrócona instrukcja obsługi (6 strony), Skrócona instrukcja obsługi (2 strony)
Xerox® Security Guide for Entry Production Color Class Products
Time
The time that the event happened in hh:mm:ss format.
ID
The type of event. The number corresponds to a unique description.
Description An abbreviated description of the type of event.
Additional
Columns 6–10 list other information about the event, such as:
Details
Identity: User Name, Job Name, Computer Name, Printer Name, Folder Name, or
Accounting Account ID display when Network Accounting is enabled.
Completion Status
Image Overwrite Status: The status of overwrites completed on each job. Immediate
Image must be enabled.
A maximum of 15,000 events can be stored on the device. When the number of events exceeds 15,000,
audit log events will be deleted in order of timestamp, and then new events will be recorded. The audit
log be exported at any time by a user with administrative privileges. Note that as a security precaution,
audit log settings and data can only be accessed via HTTPS.
Operational Security
Firmware Restrictions
The list below describes supported firmware delivery methods and applicable access controls.
Local Firmware Upgrade via USB port:
Xerox service technicians can update product firmware using a USB port on the PC UI. This ability is
restricted to CSE installation only.
Additional Service Details
Xerox products are serviced by a tool referred to as the Portable Workstation (PWS). Only Xerox
authorized service technicians are granted access to the PWS. Customer documents or files cannot be
accessed during a diagnostic session, nor are network servers accessible through this port. If a network
connection is required while servicing a Xerox device, service technicians will remove the device from any
connected networks. The technician will then connect directly to the device using an Ethernet cable,
creating a physically secure and isolated network during service operations.
Backup & Restore (Cloning)
Certain system settings can be captured in a 'clone' file that may be applied to other systems of the same
model. Clone files are encoded but not encrypted and have the potential to contain sensitive information
depending on which product feature setting is selected. Access to both create and apply a clone file can
be restricted using role-based access controls. Clone files can only be created and applied through the
Embedded Web Server.
EIP Applications
Xerox products can offer additional functionality through the Xerox Extensible Interface Platform (EIP).
Third party vendors can create Apps that extend the functionality of a product. Xerox signs EIP
applications that are developed by Xerox or Xerox partners. Products can be configured to prevent
installation of unauthorized EIP applications. The Versant® supports EIP applications. ColorPress® does
not support EIP.
March 2019
Page 4-21