Loading...
Loading...
To prevent malicious access to a device, you can restrict the number of invalid login attempts and require a lockout time before a user can try to log in again. Many organizations establish login restrictions for information assets such as workstations and servers Ensure that device login restrictions also comply with organizational security policies. From the Embedded Web Server, click Settings > Security > Login Restrictions . Set the login restrictions. Login Failures : Specify the number of times a user can attempt to log in before being locked out. Failure Time Frame : Specify how long a user can attempt to log in before lockout takes place. Lockout Time : Specify how long the lockout lasts. Web Login Timeout : Specify how long a user can be logged in remotely before being logged out automatically. Login Failures : Specify the number of times a user can attempt to log in before being locked out. Failure Time Frame : Specify how long a user can attempt to log in before lockout takes place. Lockout Time : Specify how long the lockout lasts. Web Login Timeout : Specify how long a user can be logged in remotely before being logged out automatically. Click Save .
Click on a version to see all relevant bugs
Xerox Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.