All in One Printer User Manual

XEROX WorkCentre
5735/5740/5745/5755/5765/5775/5790
Information Assurance Disclosure Paper
Ver. 2.00, March 2011 Page 4 of 50
3.2.
Login and Authentication Methods ........................................................................................................................... 24
3.2.1.
System Administrator Login [All product configurations] ........................................................................................... 24
3.2.2.
User authentication ..................................................................................................................................................................... 24
3.3.
System Accounts ............................................................................................................................................................... 26
3.3.1.
Printing [Multifunction models only] .................................................................................................................................... 26
3.3.2.
Network Scanning [Multifunction models only] .............................................................................................................. 26
3.4.
Diagnostics .......................................................................................................................................................................... 27
3.4.1.
Service [All product configurations] ...................................................................................................................................... 27
3.4.2.
Alternate Boot via Serial Port .................................................................................................................................................. 27
3.4.3.
tty Mode ........................................................................................................................................................................................... 27
3.4.4.
Diagnostics via Portable Service Workstation (PSW) Port ........................................................................................... 27
3.4.5.
Summary .......................................................................................................................................................................................... 30
4. SECURITY ASPECTS OF SELECTED FEATURES ...................................................................... 31
4.1.
Audit Log .............................................................................................................................................................................. 31
4.2.
Xerox Standard Accounting .......................................................................................................................................... 39
4.3.
Automatic Meter Reads ................................................................................................................................................. 40
4.4.
Encrypted Partitions ........................................................................................................................................................ 40
4.5.
Image Overwrite ............................................................................................................................................................... 40
4.5.1.
Algorithm ......................................................................................................................................................................................... 41
4.5.2.
User Behavior ................................................................................................................................................................................. 41
4.5.3.
Overwrite Timing .......................................................................................................................................................................... 41
5. RESPONSES TO KNOWN VULNERABILITIES ......................................................................... 42
5.1.
Security @ Xerox (www.xerox.com/security) .......................................................................................................... 42
6. APPENDICES ....................................................................................................................................... 43
6.1.
Appendix A – Abbreviations ......................................................................................................................................... 43
6.2.
Appendix B – Supported MIB Objects ....................................................................................................................... 45
6.3.
Appendix C –Standards .................................................................................................................................................. 48
6.4.
Appendix E – References ................................................................................................................................................ 50