Xerox
®
WorkCentre
®
7970 Multifunction Printer 67
System Administrator Guide
This chapter includes:
• Setting Access Rights .......................................................................................................................................................... 68
• Configuring Authentication Settings ........................................................................................................................... 70
• Configuring Authorization Settings ............................................................................................................................. 79
• Secure HTTP (SSL) ................................................................................................................................................................ 88
• FIPS 140-2 ............................................................................................................................................................................... 89
• Stored Data Encryption ..................................................................................................................................................... 91
• IP Filtering ............................................................................................................................................................................... 92
• Audit Log ................................................................................................................................................................................. 94
• Installation Policies ............................................................................................................................................................. 96
• McAfee Embedded Control .............................................................................................................................................. 97
• IPsec ........................................................................................................................................................................................ 100
• Security Certificates .......................................................................................................................................................... 105
• 802.1X ..................................................................................................................................................................................... 110
• System Timeout .................................................................................................................................................................. 112
• Overwriting Image Data ................................................................................................................................................. 113
• PostScript Passwords ........................................................................................................................................................ 117
• USB Port Security ............................................................................................................................................................... 118
• Displaying or Hiding Network Settings ..................................................................................................................... 119
• Hiding User Names on the Control Panel ................................................................................................................
120
• Verifying the Software ..................................................................................................................................................... 121
• Restricting Print File Software Updates .................................................................................................................... 122
• Specifying Email and Internet Fax Recipient Restrictions ................................................................................ 123
•
Disabling the System Administrator Password Reset ......................................................................................... 124
See also:
www.xerox.com/security
Security