Do you have a question about the Xerox WorkCentre 7845 and is the answer not in the manual?
Print Resolution | Up to 1200 x 2400 dpi |
---|---|
Copy Resolution | Up to 600 x 600 dpi |
Monthly Duty Cycle | Up to 200, 000 pages |
Duplex | Yes |
Functions | Print, Copy, Scan, Fax |
Processor | 1.2 GHz |
Memory | 2 GB |
Hard Drive | 160 GB |
Fax Resolution | Up to 400 x 400 dpi |
Print Speed | Up to 45 ppm (pages per minute) |
Scan Resolution | 600 x 600 dpi |
Scan Speed | Up to 70 ipm (black/white) |
Connectivity | Ethernet, USB |
Paper Sizes | A3, A4, A5, B4, B5 |
Display | color touchscreen |
First Page Out Time | Less than 5.5 seconds (black/white) |
Identifies the Security Target and Target of Evaluation details.
Provides a general overview of the Target of Evaluation's features and capabilities.
Details the components and scope of the Target of Evaluation.
Details the features enabled in the evaluated configuration.
Claims conformance to Common Criteria standards and components.
Claims conformance to the IEEE Std 2600.2 Protection Profile.
Claims conformance to EAL2 package and additional SFR packages.
Explains the rationale behind the conformance claims made.
Defines key terms and concepts used in the document.
Outlines conditions assumed to be true for security objectives.
Describes potential security risks and threat agents.
Lists security rules and guidelines applicable to the TOE.
Specifies security objectives the TOE itself must fulfill.
Defines security objectives for the TOE's operational environment.
Defines security objectives for the non-IT environment.
Provides justification for the stated security objectives.
Explains conventions used for identifying security requirements.
Defines security policies enforced by the TOE Security Functionality.
Details specific functional security requirements for the TOE.
Lists specific requirements explicitly stated for the TOE.
Outlines the assurance requirements for the TOE.
Provides an overview of the security functions implemented by the TOE.
Details the function for overwriting temporary files on the HDD.
Describes controls and restrictions on data flow from interfaces.
Implements role-based access control and user authentication.
Controls the use of resources and data disclosure/modification.
User granted authority to manage TOE or its portions.
Security measure that verifies a claimed identity.
A functional requirement enforcing the security policy.
Common Criteria.
Evaluation Assurance Level.
Multifunctional Device.
Target Of Evaluation.