Xerox WorkCentre 6400 Podręcznik informacyjny - Strona 4

Przeglądaj online lub pobierz pdf Podręcznik informacyjny dla Skaner Xerox WorkCentre 6400. Xerox WorkCentre 6400 44 stron. Color multifunction printer
Również dla Xerox WorkCentre 6400: Cechy (1 strony), Specyfikacje (1 strony), Skrócona instrukcja obsługi (17 strony), Podręcznik oceniającego (25 strony), Instrukcja instalacji (2 strony), Podręcznik konfiguracji (12 strony), Podręcznik oceniającego (24 strony), Skrócona instrukcja obsługi (17 strony), Skrócona instrukcja obsługi (16 strony), Skrócona instrukcja obsługi (16 strony), Podręcznik (32 strony)

Xerox WorkCentre 6400 Podręcznik informacyjny
XEROX WorkCentre 6400 Information Assurance Disclosure Paper
3.2.
Login and Authentication Methods ........................................................................................................................25
3.2.1. System Administrator Login [All product configurations] ...........................................................................................25
3.2.2. User authentication.....................................................................................................................................................................25
3.3.
System Accounts ...........................................................................................................................................................27
3.3.1. Printing [Multifunction models only]....................................................................................................................................27
3.3.2. Network Scanning [Multifunction models only] ..............................................................................................................27
3.4.
Diagnostics......................................................................................................................................................................27
3.4.1. Service [All product configurations]......................................................................................................................................27
3.4.2. tty Mode...........................................................................................................................................................................................27
3.4.3. Summary..........................................................................................................................................................................................28
4.
SECURITY ASPECTS OF SELECTED FEATURES ...................................................................... 29
4.1.
Audit Log..........................................................................................................................................................................29
4.2.
Xerox Standard Accounting.......................................................................................................................................33
4.3.
Automatic Meter Reads ..............................................................................................................................................33
4.4.
Encrypted Partitions.....................................................................................................................................................33
4.5.
Image Overwrite............................................................................................................................................................34
4.5.1. Algorithm .........................................................................................................................................................................................34
4.5.2. User Behavior .................................................................................................................................................................................34
4.5.3. Overwrite Timing ..........................................................................................................................................................................35
5.
RESPONSES TO KNOWN VULNERABILITIES ......................................................................... 36
5.1.
Security @ Xerox (www.xerox.com/security)........................................................................................................36
6.
APPENDICES....................................................................................................................................... 37
6.1.
Appendix A - Abbreviations ......................................................................................................................................37
6.2.
Appendix B - Supported MIB Objects ....................................................................................................................39
6.3.
Appendix C -Standards...............................................................................................................................................42
6.4.
Appendix E - References.............................................................................................................................................44
Ver. 1.00, May 2010
4
Page 4 of 44