Administrator's Guide
WorkCentre 7220/7225 Multifunction Printer 67
System Administrator Guide
This chapter includes:
• Setting Access Rights ...................................................................................................................................................... 68
• Configuring Authentication Settings ........................................................................................................................ 70
• Configuring Authorization Settings .......................................................................................................................... 79
• Secure HTTP (SSL) ............................................................................................................................................................ 87
• FIPS 140-2 .......................................................................................................................................................................... 88
• Stored Data Encryption ................................................................................................................................................. 90
• IP Filtering .......................................................................................................................................................................... 91
• Audit Log ............................................................................................................................................................................. 93
• Installation Policies ......................................................................................................................................................... 95
• McAfee Embedded Control .......................................................................................................................................... 96
• IPsec ...................................................................................................................................................................................... 99
• Security Certificates ...................................................................................................................................................... 104
• 802.1X ................................................................................................................................................................................ 109
• System Timeout .............................................................................................................................................................. 111
• Overwriting Image Data ............................................................................................................................................. 112
• PostScript Passwords .................................................................................................................................................... 115
• USB Port Security ........................................................................................................................................................... 116
• Displaying or Hiding Network Settings .................................................................................................................. 117
• Hiding User Names on the Control Panel .............................................................................................................
118
• Verifying the Software ................................................................................................................................................. 119
• Restricting Print File Software Updates ................................................................................................................. 120
• Specifying Email and Internet Fax Recipient Restrictions .............................................................................. 121
• Disabling the System Administrator Password Reset ....................................................................................... 122
See also:
www.xerox.com/security
4
Security