EasyManua.ls Logo

Xerox WorkCentre 7225

Xerox WorkCentre 7225
61 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
WorkCentre 7220-7225 Information Assurance Disclosure Paper
Ver. 1.0, January 2013 Page 4 of 61
3.3.2.
Network Scanning ........................................................................................................................................................................ 35
4. SECURITY ASPECTS OF SELECTED FEATURES ...................................................................... 36
4.1.
McAfee Enhanced Security / Integrity Control ..................................................................................................... 36
4.1.1
Enhanced Security ........................................................................................................................................................................ 36
4.1.2
Integrity Control (Optional Feature) .................................................................................................................................... 36
4.1.3
ePolicy Orchestrator .................................................................................................................................................................... 36
4.2.
Audit Log .............................................................................................................................................................................. 37
4.3.
Xerox Standard Accounting .......................................................................................................................................... 46
4.4.
User Permissions Role Based Access Control (RBAC) .......................................................................................... 47
4.5.
SMart eSolutions ............................................................................................................................................................... 48
4.6.
Encrypted Partitions ........................................................................................................................................................ 48
4.7.
Image Overwrite ............................................................................................................................................................... 49
4.7.1.
Algorithm ......................................................................................................................................................................................... 49
4.7.2.
User Behavior ................................................................................................................................................................................. 49
4.7.3.
Overwrite Timing .......................................................................................................................................................................... 50
4.7.4.
Overwrite Completion Reporting............................................................................................................................................ 50
4.8.
FIPS ........................................................................................................................................................................................ 51
4.8.1.
FIPS 140-2 Compliance .............................................................................................................................................................. 51
4.8.2.
Enabling FIPS 140 Mode ........................................................................................................................................................... 52
4.9.
Email Signing and Encryption to Self ........................................................................................................................ 52
4.10.
Software Self Test ............................................................................................................................................................ 52
5.1.
Responses to Known Vulnerabilities .......................................................................................................................... 53
5.1.1.
Security @ Xerox (www.xerox.com/security) ..................................................................................................................... 53
APPENDICES ................................................................................................................................................. 54
Appendix A – Abbreviations .......................................................................................................................................................... 54
Appendix B – Supported MIB Objects ....................................................................................................................................... 56
Appendix C –Standards ................................................................................................................................................................... 59
Appendix E – References ................................................................................................................................................................. 61

Table of Contents

Other manuals for Xerox WorkCentre 7225

Related product manuals