EasyManua.ls Logo

Xerox AltaLink B8065 User Manual

Xerox AltaLink B8065
70 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Xerox® Product Security Guide and Information Assurance Disclosure
Xerox
®
Security Guide
Office Class Multi-Function Products &
Single-Function Printers
AltaLink
®
Multi-
Function Products
VersaLink
®
Multi-
Function Products
VersaLink
®
Printers
B8045, B8055, B8065,
B8075, B8090
B405, B605, B615,
B7025, B7030, B7035
B400, B600, B610
C8030, C8035, C8045,
C8055, C8070
C405, C505, C605,
C7020, C7025, C7030
C400, C500, C600,
C7000, C8000, C9000
February 2018 update

Table of Contents

Other manuals for Xerox AltaLink B8065

Question and Answer IconNeed help?

Do you have a question about the Xerox AltaLink B8065 and is the answer not in the manual?

Xerox AltaLink B8065 Specifications

General IconGeneral
FunctionsPrint, Copy, Scan, Fax
Print Speed (Black & White)65 ppm
Print Resolution1200 x 1200 dpi
Monthly Duty CycleUp to 300, 000 pages
Memory (Standard)4 GB
Standard Paper Capacity1, 150 sheets
Paper Input Capacity (Standard)1, 150 sheets
Scan Resolution600 x 600 dpi
FaxYes
Fax Resolution (Max)400 x 400 dpi
Display10.1-inch color touch screen
Duplex PrintingYes
Hard Drive250 GB
ConnectivityEthernet, USB, Wi-Fi
Paper SizesA3, A4, A5
Automatic Document FeederYes
Scan Speed (Simplex)80 ipm
Scan Speed (Duplex)160 ipm
Operating System CompatibilityWindows, macOS, Linux
Security FeaturesSecure Print, User Authentication

Summary

3 User Data Protection

Data Protection Methods

Covers encryption, TPM, media sanitization, and overwrite features for data security.

4 Network Security

Network Access Control

Manages network access through authentication protocols and security platforms.

5 Device Security: BIOS, Firmware, OS, Runtime, and Operational security controls

Pre-Boot and Boot Process Security

Secures the system before OS loading, focusing on BIOS and firmware integrity.

Runtime Security and Monitoring

Protects during operation with intrusion detection, logging, and firmware controls.

6 Configuration & Security Policy Management Solutions

7 Identification, Authentication, and Authorization

Authentication Methods

Details various methods for verifying user identity and credentials.

Access Control and Permissions

Manages user permissions and access levels based on roles and location.

Appendix A: Product Security Profiles

Appendix B: Security Events

Related product manuals