Loading...
Loading...
The Security Dashboard displays both user-defined and default security configurations, and also allows the user to monitor the security status of the device The majority of the security features are user-specified and few security features cannot be altered To configure the security features, in the embedded web server, click Properties > Security Dashboard and navigate to list of security options available in the Security Dashboard window and click GoTo icon for the specific security feature. Authentication These features identify users and grant access. Confidentiality These features keep user data private. Integrity These features keep device policies safe. Availability These features monitor hardware components. Quick Links • Security Dashboard Access: This feature allows you to restrict the security dashboard access for other users. Methods: This feature allows the user to set the authentication method, enable personalization options, and configure related settings. Permissions: This feature sets permissions for both guest and logged-in users and configures the role for all users who are not logged in to the printer. System Timeout: This feature allows users to specify a duration for an inactive user to remain logged-in to the printer and the Embedded Web Server before being logged out automatically. Admin Password: This feature allows you to set a new password and to configure the password requirements for local authenticated users, and also unlocks settings in the Embedded Web Server or in the device control panel. Print Jobs: The Print Jobs page has various security features that allow users to configure data privacy and security in all phases of the jobs being printed and also removes all stored data associated with print jobs. User-Name (PII): This feature hides the user name of a logged-in user and completed jobs from the control panel display. Scan Jobs: The Scan Jobs page has various security features that allow users to define data privacy and security policies in all scanning phases, as well as store and manage scan data locally and remove all stored data associated with scan jobs. Configuration Policies: This security feature allows you to ensure devices stay in the appropriate configuration throughout the day with no need for external device monitoring. File System Protection: This feature maintains the integrity of device software and enhances security features with the ability to monitor and prevent unauthorized files. Tracking (Logs): The Tracking (Logs) page has various security features that allow users to configure log settings, device authentication log details, and security solutions that help the device to recognize and alert the user about potential threats. USB Ports: This feature allows the user to enable or disable USB host ports and to manage the Connection Timeout value for USB device port. Mobile Devices: This feature allows the devices to connect to each other without requiring a wireless access point. Drive Storage: This feature stores the data on the optional drive when installed and on the internal storage through the User Data Encryption protocol.
Click on a version to see all relevant bugs
Xerox Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.