Secure Installation and Operation of Your WorkCentre™ 5845 / 
5855 / 5865 / 5875 / 5890,  WorkCentre™ 7220 / 7225, 
WorkCentre™ 7830 / 7835 / 7845 / 7855 and ColorQube™ 9301 / 
9302 / 9303 
 
Purpose and Audience 
This document provides information on the secure installation, setup and operation. All customers, but particularly those 
concerned with secure installation and operation of these devices, should follow these guidelines. 
Overview 
This document lists some important customer information and guidelines
1
 that will ensure that your device is operated and 
maintained in a secure manner.   
Background 
These  devices  are  currently  undergoing  Common  Criteria  evaluation  and  are  evaluated  in  a  particular  configuration, 
referred to in the rest of this document as the “evaluated configuration”. Section 1 describes how to install and configure 
the machine so that it is in the same configuration as it is for evaluation.  
Customers  are  advised  that  changes  to  the  evaluated  configuration  may  be  required  to  support  business  goals  and  for 
compliance  with  policies  applicable  to  their  environment
2
.  After  careful  review  of  this  document,  customers  should 
document settings to be applied to devices in their environment establishing a unique benchmark configuration to support 
processes  such  as  installation,  change  management  and  audit.  Xerox  Professional  Services,  which  can  be  contacted  via 
http://www.xerox.com/about-xerox/customer-training/tab1-ab-enus.html,  can  assist  in  evaluating  and  configuring  these 
devices. 
The  information  provided  here  is  consistent  with  the  security  functional  claims  made  in  the  Security  Target
3
.  Upon 
completion  of  the  evaluation,  the  Security  Target  will  be  available  from  the  Common  Criteria  Certified  Product  website 
(http://www.commoncriteriaportal.org/products.html)  list  of  evaluated  products,  from  the  Xerox  security  website 
(http://www.xerox.com/information-security/common-criteria-certified/enus.html ), or from your Xerox representative. 
I.  Secure Installation and Set-up in the Evaluated Configuration 
To set up the machines in the evaluated configuration, follow the guidelines below: 
a.  Set up and configure the following security protocols and functions in the evaluated configuration: 
•  Immediate Image Overwrite 
•  On Demand Image Overwrite 
•  Data Encryption 
•  FIPS 140-2 Mode 
•  IP Filtering  
•  Audit Log 
•  Security Certificates, Secure Sockets Layer (SSL) and HTTPS 
•  IPSec 
•  Local, Remote or Smart Card Authentication 
•  Local Authorization  
•  User Permissions 
•  Personalization 
•  802.1x Device Authentication 
•  Session Inactivity Timeout 
•  USB Port Security 
•  Software Verification Self-Test 
•  SFTP Filing 
•  Embedded Fax Secure Receive  
   
1
 All guidelines in this document apply to the System Administrator unless explicitly stated otherwise. 
2
 For example, if the customer security policy requires that passwords are reset on a quarterly basis, the Reset Policy for the Admin Password will 
need to be enabled. Also, many customers choose to manage user credentials  centrally,  rather than on individual devices through local 
authorization. 
3
 Xerox Multifunction Device Security Target WorkCentre 5845, 5855, 5865, 5875, 5890, 7220, 7225, 7830, 7835, 7845, 7855, 7965, 7975 & 
ColorQube 9301, 9302, 9303, Latest Version issued