Do you have a question about the Xerox WorkCentre 5875 and is the answer not in the manual?
Functions | Print, Copy, Scan, Fax |
---|---|
Print Resolution | 1200 x 1200 dpi |
Monthly Duty Cycle | 300, 000 pages |
Duplex Printing | Yes |
Scan Resolution | 600 x 600 dpi |
Memory (Standard) | 2 GB |
Hard Drive | 160 GB |
Print Speed (Black) | 75 pages per minute |
Maximum Paper Capacity | 4, 700 sheets |
Scan Speed (Black) | 200 images per minute |
Scan Speed (Color) | 200 images per minute |
Connectivity | USB 2.0, 10/100/1000Base-T Ethernet |
Control Panel | Touchscreen |
Processor | 1.2 GHz |
Operating System Compatibility | Windows, Mac, Linux |
Identifies the Security Target and Target of Evaluation details for CC evaluation.
Describes the Target of Evaluation, its capabilities, and features.
Details the physical and logical scope of the TOE.
Lists features enabled and not included in the evaluated configuration.
Claims conformance to Common Criteria version 3.1.
Claims conformance to the IEEE Standard Protection Profile for Hardcopy Devices.
Claims conformance to EAL2 package and additional packages.
Explains rationale for TOE type, SPD, objectives, and requirements.
Defines key terms like Users, Objects (Assets), Functions, Operations, and Channels.
Lists conditions assumed to be true for the security objectives and SFRs.
Identifies threat agents and threats to user and TSF data.
Outlines organizational security policies applied to the TOE.
Specifies security objectives the TOE must fulfill.
Lists security objectives for the IT environment supporting the TOE.
Lists security objectives for non-IT methods in the TOE environment.
Demonstrates how objectives mitigate threats, enforce policies, and uphold assumptions.
Defines requirements to restrict data forwarding between external interfaces.
Defines conventions used for identifying SFRs and SARs.
Defines security policies enforced by the TSF.
Details the security functions the TOE must perform.
Lists specific requirements not covered by standard CC classes.
Lists security assurance requirements from IEEE Std. 2600.2 and EAL2+.
Provides rationale for completeness and sufficiency of SFRs.
Explains rationale for the chosen security assurance requirements and EAL level.
Cross-references SFR dependencies and their satisfaction status.
Overviews the security functions performed by the TOE.
Details the image overwrite security function for temporary files.
Describes how the TOE controls data flow via network interfaces.
Explains the role-based access control and authentication mechanisms.
Covers configuration for external identity servers for network authentication.
Describes the generation, availability, and storage of audit logs.
Details cryptographic operations like encryption, signing, and key establishment.
Explains the use of AES encryption for temporary user data on the hard disk.
Describes the configuration of network traffic filtering rules.
Covers support for secure communication protocols like TLS, SFTP, and IPsec.
Outlines how security functions and attributes are managed by administrators.
Explains role-based access control for MFD functions.
Details how copy operations are performed and controlled.
Describes submission and control of print jobs, including secure print.
Explains scan operations, mailbox access, and image transfer.
Covers fax submission, reception, and forwarding processes.
Describes self-test procedures for verifying TOE integrity.