HP PRINTER SECURITY PLUG-IN

Size: px
Start display at page:

Download "HP PRINTER SECURITY PLUG-IN"

Transcription

1 HP PRINTER SECURITY PLUG-IN For Microsoft System Center Configuration Manager (SCCM) CONTENTS Overview... 2 Installation... 2 SQL Permissions... 3 Using a Different SQL Account... 4 Licensing... 5 Launching HP Printer Security Plug-in... 5 Discovery... 6 Groups... 9 Credential Management Policies Tasks Reports Executive Summary Devices Assessed Automated

2 OVERVIEW HP Printer Security Plug-in is a policy-based printer security compliance tool that integrates with the industry standard Microsoft System Center Configuration Manager (SCCM). While compliance settings in System Center Configuration Manager provide the tools and resources required to manage the configuration and compliance of devices such as computers, servers, and mobile devices, the HP Printer Security Plug-in allows for discovery of HP printers to ensure they remain compliant with desired security standards. Managing security is important to minimize data breaches and vulnerabilities across the print fleet. As technology improves, malicious users may target MFPs and other network peripherals to misuse resources or to gain access to networks or the internet. INSTALLATION Installation of HP Printer Security Plug-in into Microsoft System Center Configuration Manager (SCCM) is a quick and easy process. The plug-in requires a Microsoft SQL Server database on the back end. The installer can create a new MS SQL Express instance and database on the MS SCCM server, or it can be instructed to use any existing MS SQL instance (local or remote), including the same as MS SCCM is using. Requirements for HP Printer Security Plug-in are as such: Operating system: MS SCCM versions: Windows Server 2012 above.net Framework: SP1 and Database: Microsoft System Center 2012 R2 Configuration Manager SP, SP1, or SP2, with or without cumulative update 1 (CU1) or later MS SQL 2014 or later Installation screens offer the option to enable the required IIS configuration options as well as the desired MS SQL server and instance. 2

3 NOTE: HP JetAdvantage Security Manager is a for fee security compliance tool that includes many more security features and the ability to manage device certificates among many other features. Because HP Printer Security Plug-in and HP JetAdvantage Security Manager have many similar core components, the two cannot co-exist on the same server. If the HP Printer Security Plug-in is already installed on the MS SCCM server, and it is desired to upgrade to HP Security Manager, the installer for Security Manager will recognize that the plug-in is installed and will display a message as such indicating that the plug-in must be installed on a different server before proceeding. HP JetAdvantage Security Manager and HP Printer Security Plug-in cannot be installed on the same server simultaneously. The same message appears if the plug-in is attempted to be installed on same machine where Security Manager is running. Of course, nothing prevents Security Manager from running on one server and HP Printer Security Plug-in running on another server. The two tools can co-exist in an environment, but caution should be exercised to recognize that one tool can affect the other if they are both changing security settings on the printer fleet. The same concern exists if HP Web Jetadmin is running on a server in the environment as it too can change security settings on the fleet. Versions of MS SQL Server or Express that have been tested include the following: MS SQL Server Express 2014 (Bundled) MS SQL Server 2016 While HP Printer Security Plug-in only tests the two most recent SQL versions at the time of release, there should be no issues using older or newer SQL versions as the plug-in uses basic calls into the SQL database and isn t using SQL features that require later versions. Backward and forward compatibility should be present, there just isn t capacity to test the multitude of SQL versions offered over the years. Whether using local or remote SQL Server, Express or Full, the rules are essentially the same. In every case, HP Printer Security Plug-in needs access to a SQL server instance. It can either create a new database, upgrade an existing database, or attach to an existing database, depending upon the situation and the user rights. If the plug-in is instructed to install SQL Express on the local machine, a SQL Express 2014 instance and database will be created by the installer. If HP Printer Security Plug-in is pointed to a remote SQL server and instance during installation, proper rights must be present for the user running the installation to be able to create or update a SQL database wherever SQL server may reside. Proper rights must also exist on the remote database itself for the user which the HP Printer Security Plug-in service runs under to be able to read from and write to the database. KEY POINT: Just to reiterate, for installing and upgrading HP Printer Security Plug-in, the user who is logged into the machine and running the installer executable must have proper rights on the SQL server to either create a database or update an existing database. All the installer does is run SQL scripts to create or alter a database, and naturally any user running those commands needs to have proper SQL rights. In this case it is the Windows user who is running the installer. For normal operation of the plug-in after installation, the user running the HP Printer Security Plug-in service (default as Network Service) needs to have permissions to at least read and write to the database (explained later). Both a named and default instance are supported when instructing the plug-in to use a remote SQL Server database. SQL Permissions There are four scenarios where HP Printer Security Plug-in will interact with Microsoft SQL: Creating a database during installation of the plug-in Upgrading a database during upgrading the plug-in from one version to another Connect to an existing database during installation Running the plug-in to manage security features on a fleet of devices 3

4 Each scenario requires SQL rights for potentially different users. Create Database Windows user running the installer executable needs at minimum Create Database rights (sysadmin preferred). Upgrade Database Windows user running the installer executable to upgrade versions needs DBO rights to perform potential commands on the database such as insert, update, alter, create table. Connect to an existing database - Windows user running the installer executable needs Public rights on the instance to connect to it. The HPIPSC database will have previously been created by a database administrator by using SQL scripts available from HP support. The database needs to provide DBO rights to the user running the plug-in service and application pool. Run HP Printer Security Plug-in the Windows account that runs the HP Printer Security Plug-in service (default of Network Service) and the user running the HPSM application pool need DBO rights to perform operations such as reading and writing. Using a Different SQL Account The HP Printer Security Plug-in service runs under Network Service, a limited service account that is meant to run standard privileged services. The Network Service account manifests itself remotely on the network as the machine account. If it is prohibited in the environment to allow a machine account to have DBO rights on a database, it is still possible to allow the plug-in to use a remote database by allowing a domain user account to have DBO rights to the database. Merely add a new login for the domain user account and assign it DBO rights to the HPIPSC database. The IIS application pool named HPSM needs to be changed to the domain user account as well in order for the web interface to be able to access the remote database. This is done by clicking on Application Pools in the left-hand pane. All application pools are displayed in the main content pane, right-click the one called HPSM and click Advanced Settings. 4

5 LICENSING Unlimited, non-expiring licenses are included by default in HP Printer Security Plug-in that allow for complete security management of the printer fleet. Three services are added when the plug-in is installed: Flexera Licensing Service HP Print License Service HP Printer Security Plug-in Service All three are configured for automatic startup. If manual startup is required, start the services in the order listed above: Flexera, HP Print License, HP Printer Security Plug-in. Manual startup can also be a basic troubleshooting step for licensing issues. The HP Print License Service interacts with the Flexera Licensing Service that handles the HP Printer Security Plug-in license assignment and management task. The Flexera Licensing Service must be in a ready state before the HP Print License Service can interact. The Flexera service runs under the Local Service account while the HP Print License service runs under the Network Service. This might need to be changed depending upon the environment. LAUNCHING HP PRINTER SECURITY PLUG-IN Once installed, HP Printer Security Plug-in appears in the SCCM navigation tree with several icons beneath it for: Discovery Policies Tasks Reports Settings A Test Connection operation under Settings, General should be performed to ensure communication between HP Security Manager and HP Printer Security Plug-in. 5

6 Clicking on any of the categories the first time pops up a login screen to authenticate a user to use the plug-in. Members of the local Administrators group have automatic access to the plug-in since those members would be the ones running SCCM DISCOVERY Discovering devices involves selecting either manual or automatic discovery. Devices can be manually added by entering the device information into the IP Address/Hostname box and choosing Add to list for Discovery. To discover devices automatically, select either of two discovery types: Number of Network Hops this method uses a multicast UDP discovery mechanism to ask HP imaging and printing devices to identify themselves. The user may choose the number of network hops or routers to traverse in the multicast query. The default is 4 hops. Range this discovery method scans the given IP address range for all devices. Depending on the discovery type, either adjust the Number of Network Hops or type a Start IP Address and End IP Address for an IP range. The group name that is viewed during the discovery of devices process is the group that populates the Group to Add field. However, another group can be substituted here by selecting it from the drop-down selection. 6

7 During discovery, IP Addresses are always resolved to hostnames, and hostnames are always resolved to IP Addresses via DNS. Newly discovered devices appear in the device list initially with a Device Status of No Information. Use the Verify icon to verify support for a device or group of devices. Unsupported devices are indicated in the devices panel. A verification queries additional attributes for the devices to populate the device list columns. 7

8 The Device Status can indicate any of several possible conditions: Network Connection Error - This error typically indicates an issue trying to communicate with a device over a specific protocol. Many times the plug-in is trying to securely connect to the device over SSL/TLS and cannot for some reason. Most common reasons for either of these errors include: o No response from device on basic network communications such as ping. Device may be powered off or disconnected from network. Pings may be filtered at router or firewall. o Device responds to pings but does not respond to Web Services (WS*) queries. o Can t browse to EWS page, perhaps EWS has been disabled. o SSL/TLS handshake fails so transaction cannot be encrypted. Operating system controls the TLS versions in the handshake, not HPSM. You can select the device and click Do Not Enforce SSL/TLS. o ACL (Access Control List) blocking. o No certificate support, already set to not enforce SSL/TLS (grayed out). o Ports blocked, perhaps by firewall o Some cases have been reported whereby DAT indicates SNMPv1/v2 passes for Gets and Sets yet SNMPv3 cannot be enabled using SNMPv1/v2 and this error is generated. Many times a second remediation clears the error. Connection Refused / Invalid Identity Certificate - If SSL/TLS enforcement is selected, HP Printer Security Plug-in will enforce trust for future communications. This error can occur if the following is true: 8

9 o Removed, expired, or revoked certificates. o Cannot connect to CRL (certificate revocation list) to check revocation. This error can also occur if a self-signed certificate has an MD5 hash which Microsoft no longer supports, so the SSL/TLS handshake is rejected. Regenerate the self-signed certificate under EWS (might require newer Jetdirect firmware) to generate a new certificate with a supported hash. Credentials Failed - a mismatch occurred between what is stored in the database for the specific credential and what is on the device. HP Print Security Plug-in will always try what is stored in database first, then public/blank in case the credential was erased on the device, and finally any credential stored in the Global Credential Store. If all three attempts fail, the plug-in posts Credentials Failed as it needs proper credentials in order to communicate with the device. o SNMP behavior is to not respond to SNMP REQ packet when community name is wrong. o Older devices had two locations under EWS for Admin Password. Device Not Supported - device does not support enough security related items to be deemed supported by HP Printer Security Plug-in. Error - this is a rarely seen state that seems to occur on the devices that answer so little to queries that the plug-in deems it not manageable. Hostname Resolution Error - the hostname cannot be resolved, the DNS name server does not recognize the hostname that is being presented by HP Printer Security Plug-in that once represented the device. License Required for Assessment - not enough licenses are available, a license has not been assigned to the device yet. No Information - a Verify task has not yet been performed where the plug-in gathers a dozen or so attributes about the device and populates the columns. Just adding a device will only perform a hostname lookup, but the device will remain in No Information status until a Verify is performed or an Assessment which begins with a Verify task. The Assessment Status column is defined as such: - Not assessed - Assessed and all settings in compliance - Assessed with only low risk items out of compliance - Assessed with medium risk items (and possibly low) items out of compliance - Assessed with high risk items (and possibly low/medium) items out of compliance Assessment status has nothing to do with the state or status of the device, it merely indicates which settings were in or out of compliance during the last assessment task. GROUPS Any discovered device will always be present in the All Devices group. Devices can be added to custom groups as desired. The primary purpose of groups is to represent a security policy. For example, if the entire fleet will receive the exact same security settings, you could merely create a remediation task that applies your one security policy to the All Devices group. If different regions will receive different security settings per region, then you could create a group for each region and schedule a remediation for each group applying its respective security policy. To create a group, select Groups from the left-hand side of the screen and choose the New icon. Groups can be nested as subgroups. 9

10 CREDENTIAL MANAGEMENT When credentials are present on a device, HP Printer Security Plugin needs to know those credentials before it can communicate with the device to read or write information. The term Credential Store refers to an area of the database where credentials are stored for each device so the plug-in knows how to communicate with it using read and write operations. All data in the Credential Store is securely encrypted in the database for protection. If no credentials are present on a device when it is discovered, HP Printer Security Plug-in will use public or blank credentials in order to perform read and write operations on the device. Once a remediation is performed to set credentials on the device, those credentials are stored in the Credential Store for future attempts to communicate with the device for read and write operations. If credentials are already present on a device when it is discovered, credentials can be manually added to the Credential Store by selecting the device and choosing the icon for Set Credentials, Configure. This operation can be performed on a single device, multi-selected devices, or a group. 10

11 Credentials are tested during a Verify task, and if credentials are present on a device that HP Printer Security Plug-in does not know, a Credentials Failed status is posted. Global Credentials are values entered into HP Printer Security Plug-in to be used in cases credentials are needed but are not available in the Credential Store. If the Global Credential value is used by the plug-in and results in success, that value is now stored for that device within the Credential Store. Global Credentials are added by clicking Settings in the navigation tree and choosing Global Credentials. 11

12 If the Admin (EWS) Password is claiming Credentials Failed, this means that the test HP Printer Security Plug-in performs to determine if an Admin (EWS) password is present is failing. For Futuresmart devices, the plug-in attempts to use web services to retrieve a system configuration page. Proper EWS credentials are required to retrieve such a page. If the page is not returned, it is assumed the Admin (EWS) Password that the plug-in has stored for the device in the database or in the global store is incorrect. For older non-futuresmart devices, an attempt is made over an HTTP request to retrieve the Security Status page under EWS. Again, if the page is not returned, it is assumed the Admin (EWS) Password that Security Manager has stored for the device in the database or in the global store is incorrect. One technique to resolve this issue is to add the Admin (EWS) Password to the database (credential store) for the device by selecting it and choosing the Set Credentials icon and clicking Configure. Another technique is to clear out the Admin (EWS) Password under EWS, then clear the credentials that are stored in the database under Set Credentials, Reset. Basically, you are just trying to make sure the plug-in and EWS match. Now perform a Verify task and see if credentials failures are cleared. If it still claims Credentials Failed, try deleting the device and rediscovering. SNMP v1/v2 credentials are broken into two types: Read and Read/Write. These equate to the Get Community Name and Set Community Name under EWS. If there are no credentials entered for the Get Community Name under EWS, and if the Disable SNMP v1/v2 default Get Community Name of public box is not checked, the device is wide open to read information using SNMP with just public used as the Community Name for an SNMP GET REQ packet. This isn t uncommon as very little if any sensitive data is passed thru just Read attempts. 12

13 HP Printer Security Plug-in checks both a Set Community Name and a Get Community Name during a Verify task and will post a credential failure if either fails. If either an SNMP GET REQ or SNMP SET REQ packet receives no response, it is assumed a credential failure is present because devices will not respond if a Community Name does not match. To resolve this situation, either clear the credentials on the device under EWS, or add the SNMP v1/v2 Read/Write Community Name or the SNMP Read Community Name to the database (credential store) for the device by selecting it and choosing the Set Credentials icon and clicking Configure. POLICIES A policy contains the security settings to be deployed across the HP imaging and printing fleet to keep them secure. A new policy is created by selecting Policies in the navigation tree and selecting the New Policy icon in the Policies window. Policies can be edited here also by checking the box next to the policy and selecting the Edit icon. Give the policy a name, and the policy editor screen appears with all 15 offered items checked by default. Unwanted items can be unchecked and the policy saved by clicking Summary, Save. 13

14 Severity is customizable by the policy creator and indicates the appropriate risk level for the environment or business impact. These values of low, medium, and high will be reflected in the status of an assessment, worst case bubbles to the top and is displayed as status. The Executive Summary report will also use these values to apply a calculation against the fleet assessment and provide a score. Remediation allows the policy creator to inform the policy to remediate (fix) the setting if it is out of compliance on the device against the value in the policy. Set remediate to enable or disable. 14

15 Unsupported can either be set to Ignore or Fail. If set to Ignore, a particular device that does not support the security setting will indicate Passed in the assessment report. If set to Fail, reports display the status as Not Supported by Device if a particular device does not support the setting. Help is offered in the UI for each setting. Additional information about each setting is contained below. Admin (EWS) Password The Admin (EWS) Password feature helps protect the device from unauthorized access through remote applications such as Embedded Web Server (EWS) or HP Web Jetadmin. With the Admin (EWS) Password configured, the device will not allow changes to configuration settings unless the correct password is provided. The Admin (EWS) Password is also called the Administrator Password or Device Password in some applications. Account Lockout can be enabled to define how many incorrect attempts occur before lockout (3-30), reset attempts after ( seconds), how long for lockout duration ( seconds), and minimum password length (1-16). Password Complexity enables a password complexity check on the device to ensure the password is complex enough so it cannot be easily compromised. This feature can vary from device to device on complexity rules. SNMP v1/v2 These settings provide support for specific tools that rely on SNMPv1/v2 for device discovery and status. If you select Read Only, enter the Read Community Name and then re-enter it to confirm. If you select Read and Write Enabled, enter the Read/Write Community Name, and then re-enter it to confirm. According to the RFC for Community Names, a Read/Write Community Name can be used for performing SNMP Set Requests and SNMP Get Requests. Thus, Security Manager will attempt to use the Read/Write Community Name for Gets and Sets. Enable Default SNMPv1/v2 Credential Access if it is desired to allow Public to be used for SNMP Get Requests. 15

16 SNMPv3 SNMPv3 employs a user-based security model (RFC 2574), and features user authentication and data privacy through encryption. To fully assess SNMPv3, you must typically create an SNMPv3 account on the device and implement the account information on the SNMPv3 management application. To create the account, provide a user name, an authentication key, a privacy key, and an encryption algorithm. Note: If FIPS 140 is enabled, the SNMPv3 Encryption Algorithms must be set to SHA-1/AES. MD5/DES is not allowed. Best Possible can be chosen to instruct Security Manager to choose the best Encryption Algorithm in accordance to other security settings being enabled such as FIPS 140. Many organizations opt to protect just Set operations with SNMPv3 to encrypt the data because Set operations may contain sensitive data such as passwords, but they will leave Get operations open to use SNMPv1/v2 since little to no sensitive data will be passed on Get operations. It then just becomes a matter of whether Get operations should be left open to public or protected with a Read Community Name (aka Get Community Name). Certainly it is much less work to not have to manage a Read Community Name on the fleet for data that is not seen as sensitive, but it still may be desired to control who can read any information from devices. 16

17 File System Password The File System Password prevents unauthorized users from making changes to the file system configuration options and from performing a secure storage erase. File System Passwords are no longer used in Futuresmart devices and newer. The File System Password feature helps protect the MFP data storage system options from unauthorized access. With the File System password configured, the MFP requires the password before it will allow configuration of features that affect the data storage system. Some of these features are the File Erase mode, the Secure Storage Erase feature, and the File System Access options. To configure the Files System Password, type 8 or fewer characters into the Enter Password and Confirm password fields. PJL Password Printer Job Language (PJL) commands provide two-way communication with the printer and can be used to change control panel settings. Note: In order for HP Printer Security Plug-in to assess the PJL Password item, the PJL Access Commands item must be set to Enable. Otherwise, assessment of the PJL Password cannot occur and the password will always be remediated, even if it matches. The PJL password feature helps protect the MFP from unauthorized configurations through Print Job Language (PJL) commands. It does not affect ordinary print jobs. Once the PJL password is configured, the MFP requires it before it will process any of these commands. The PJL password is different from the option to disable PJL Disk Access (another setting in the EWS Security page). Configure both settings for better security. Set the PJL password by typing any number between 1 and 256 into the Enter Password and Confirm password fields. PJL Access Commands Select the check box to assess whether access to PJL commands is restricted. If set to Disable, the HP Embedded Web Server (EWS) restricts access to PJL commands. Note: In order for the plug-in to assess the 17

18 PJL Password item, the PJL Access Commands item must be set to Enable. Otherwise, assessment of the PJL password cannot occur and the password will always be remediated, even if it matches. PJL is unique compared to all other config items. To implement the match function, HP Printer Security Plug-in uses port 9100 and the PJL access commands to change a PJL timeout value and if it changes, the password matches. Then the plug-in changes the timeout back the way it was. If the password is not set, then the process is very fast as SNMP informs if set/not set. If P9100 is closed, or if the PJL access commands are disabled, then the match logic is skipped and the plug-in will remediate the password to insure it matches the policy. When the PJL Device Access Commands setting is disabled on the device, the following PJL commands are no longer executed: PJL Command DEFAULT OPMSG, RDYMSG, STMSG DMINFO, DMCMD INITIALIZE SET Description Sets default values for environment variables. Ready, Status and Operator messages SNMP over PJL commands Resets PJL values to factory default Sets environment variable to specified value for duration of a PJL job. File System Access Protocols The File System Access Protocols settings shuts down access to the MFP file system (storage devices and configuration settings) through protocols and ports. They eliminate access from various types of management tools. HP recommends shutting down all unused access to the file system. PML (Printer Management Language) is an HP proprietary protocol that manages HP devices. Web Jetadmin uses PML for many of its configuration settings. Disabling this PML access eliminates the PML commands that affect access to the storage devices even for Web Jetadmin. If you wish to make changes to the file system, enable PML access to make the changes, and disable it again. With this setting, MFPs will ignore PML commands that attempt to access the file system. 18

19 Network File System (NFS) is primarily used by UNIX, and Linux, and Norton systems. Disabling it disables the entire protocol for the MFPs. With this setting, MFPs will ignore all NFS requests. PostScript enables programs such as Adobe products to access the MFPs directly for printing and for access to fonts. Some of the commands it uses can access MFP storage devices. Disabling PostScript access to the file system disables only the commands that affect the file system. PJL (Printer Job Language) includes capabilities to manage configurations in the form of commands inside print jobs. Some of these commands can access MFP storage devices. Disabling PJL access to the file system disables only the commands that affect the file system. Standard TCP/IP Printing Standard TCP/IP printing, also called standard network printing or AppSocket, is the most common method for printing over the network and is the standard printing protocol used by HP print devices. It is the fastest, most reliable way to print over the network. Because this is the standard network printing method, remediation is disabled by default. TCP Port 9100 succeeded line printer remote (LPR), which had been widely adopted as the de facto standard in TCP/IP network printing for many years. Due to LPR limitations, TCP port 9100 became the fastest and most efficient way of delivering data to a printer using the TCP/IP protocol suite. Raw data delivered over TCP is sent to the printer as if it had been delivered over a parallel port, serial port, or any other port. With Port 9100 enabled, clients are able to bypass print servers and print directly to the device. Device access control lists can limit the amount of this behavior. This could be of concern to those who track job accounting at the print server level. Upgrading firmware is accomplished through Port Extra safeguards should be established to protect against malicious firmware uploading. The most common vulnerability for TCP Port 9100 is print jobs with embedded PJL commands. These PJL commands can do a variety of things, some extremely malicious. TCP/IP headers are stripped and data is presented to the printer as if it were directly connected to a PC. Years ago, printer drivers would use the PJL command suite to control the PC attached printer in a variety of ways. In the networking world, this presents an obvious potential for misuse. The PJL Password setting is linked as a Relative Technology to the Port 9100 setting. Since Port 9100 will remain enabled in most environments as the network printing protocol of choice, it is suggested that security be applied to the PJL settings. If Port 9100 is to be disabled in a customer environment, this usually indicates a more uncommon printing protocol such as LPD, IPP or IPPS may be in use. Make sure the policy is set accordingly or print productivity could be affected. 19

20 File Transfer Protocol (FTP) File transfer protocol (FTP) printing sends print files from a client system to the print device using a TCP control and data connection. Although FTP provides user name and password authentication, the credentials are sent unencrypted over the network. FTP (File Transfer Protocol) is a basic TCP/IP connectivity utility to transfer data between systems. FTP printing is a way to use FTP to send print files from a client system to an HP Jetdirect-connected printer. In an FTP printing session, the client connects and sends a print file to the HP Jetdirect FTP server which in turn passes the print file to the printer. The HP Jetdirect FTP server transfers print files to the printer but does not interpret them. For proper printing, print files must be in a language recognized by the printer (such as PostScript, PCL, or unformatted text). For formatted print jobs, you must first print to a file from your application using the driver for the selected printer, then transfer the print file to the printer through an FTP session. FTP printing can be somewhat secured via a login and password, but both are sent unencrypted over the network. FTP print and download (for firmware updates) were introduced into JetDirect products many years ago. Certain customers still require this feature in the printers and print server products they purchase. User access to the FTP server is available using the standard FTP clients that are supported on most operating systems. The FTP client is an Internet standard for file transfers. The FTP print and download features were tightly coupled in Jetdirect at one time, but are now decoupled into separate functionality packages. The download functionality is now referred to as FTP Firmware Update. Both FTP print and download use two TCP connections to transfer a file, just as in standard FTP. The control connection is established through the wellknown TCP port (21) that passively awaits a client connection. Once connection is established, it will stay active the entire time that the client communicates with the server. The second connection, a data connection is created each time a file is transferred between client and server. Security vulnerabilities related to HP Jetdirect FTP (and FTP in general), have existed for almost as long as FTP functionality itself. FTP servers are prone to remote denial-of-service (DoS) vulnerabilities that can affect device access for legitimate users. DoS attacks such as buffer overflows, rogue commands and malformed packets have been historically known to crash FTP print servers or destroy firmware. If FTP printing is not required in the environment, this protocol should be disabled. If required on legacy HP devices where FTP print and download are coupled together, only enable FTP for the firmware download, then disable when complete. 20

21 AppleTalk AppleTalk is an obsolete protocol used by the original Apple networking. Apple no longer supports AppleTalk. Released by Apple in 1985 with the original Macintosh, AppleTalk was a protocol suite that provided addressing, routing, data stream services, naming services and file/print sharing. AppleTalk remained available as a Macintosh communications suite until 2009 when support was dropped due to its diminishing usefulness on large enterprise networks. Using a very simplistic approach, AppleTalk connected Macs together in small local area networks and automatically managed a name-based approach to host identification and network communication. Much of the AppleTalk feature set was later introduced in Bonjour and Universal Plug and Play. AppleTalk contained several primary protocols; AppleTalk Address Resolution Protocol (AARP), Name Binding Protocol (NBP), Printer Access Protocol (PAP), Routing Table Maintenance Protocol (RTMP) and Zone Information Protocol (ZIP), just to name a few. AARP allowed hosts to generate their own addresses and NBP was a dynamic system for mapping network addresses to user-readable names. PAP managed printer connections and other servers, plus conveyed status and coordinate actual data transfer. RTMP managed routing information over AppleTalk networks and ZIP managed the relationship between network numbers and zones. The AppleTalk protocol is available on many of HP s existing installed base of legacy printing devices, but has since been eliminated on newer Future Smart devices. On HP devices that support it, AppleTalk is enabled by default. At AppleTalk startup, a socket is created and set to listen for any print requests. Printer status and the printer s ability to accept jobs is provided to the network at this time. When a client request for print is received, a peripheral channel is locked for Printer Access Protocol (PAP) exclusive use. Data is then forwarded to the printer and the printer establishes reverse channel communication to complete the handshake. Synchronization between the client and printer continues during the forwarding of data. The client then sends a connection close request when data transfer is complete, signaling the peripheral to unlock the PAP channel for future use. Security risks associated with AppleTalk are minimal, although Denial of Service (DoS) attacks over AppleTalk networks have been recorded. For devices that still support AppleTalk, disabling is recommended unless the protocol is required in the print environment. Once again, it is important to note that AppleTalk is unsupported on Mac OS X v10.6 (2009) and later operating systems. Today, it would be rare to find any AppleTalk use in most enterprise print environments. 21

22 Novell (IPX/SPX) Internetwork packet exchange (IPX) and sequenced packet exchange (SPX) are protocols primarily used on networks that run the Novell NetWare operating system. These protocols are obsolete. Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) was a very popular protocol suite throughout the 1980 s and midway into the 1990 s. In it s prime, the IPX/SPX protocol stack was supported by a number of network operating systems, including Windows. However, IPX/SPX was mostly thought of as the protocol for Novell Networks and specifically brought forth the practice of connecting multiple networks together, or internetworking. IPX and SPX connection services are very similar to TCP/IP and were primarily designed for local area networks. The efficiency of the IPX/SPX stack contributed to performance that typically exceeded TCP/IP on a local area network. However, TCP/IP became the industry standard due to its superior performance over wide area networks and the internet. Novell attempted to support TCP/IP with NetWare/IP by tunneling IPX in IP packets, but complex implementation and performance loss due to the tunneling overhead kept NetWare/IP from being widely adopted. TCP/IP is now the primary Novell NetWare internetwork protocol. Although IPX usage has declined dramatically in recent years due to TCP/IP being the pervasive internet protocol, it wouldn t be rare to find IPX/SPX still being used in some Windows environments. In addition, some supported legacy system management tools still support the stack. Many of the HP Future Smart devices do not provide support for the IPX/SPX stack. The HP JetDirect implementation of the Novell NetWare Printing subsystem is composed of the IPX/SPX stack, IPX Direct Mode, Queue Server, Remote Printer, and NetWare Configuration modules. For many of the Future Smart devices, this capability no longer exists. When IPX/SPX is enabled on devices that support this protocol suite, the generation of Service Advertising Protocol (SAP) packets are also enabled. The JetDirect print server name and service type are broadcast via SAP packets, allowing for unique identification of the device on the IPX network. SAP packets are broadcast only after an IPX network and supported frame type are detected. Once detected, SAP packets are periodically broadcast (at some configured interval) on all sensed frame types. Jetdirect responds to service queries with a service response packet that includes the specific object type of 030c. This object type allows Netware configuration tools to identify the print server as JetDirect. Most IPX security vulnerabilities are associated with Denial of Service (DoS) attacks. Malicious users have created malformed packets that match source and destination addresses, broadcast pings, or fill gateway buffers. HP recommends disabling IPX/SPX if not used in the print environment. If IPX/SPX is required for client printing or device management, HP then recommends disabling Novell Remote Configuration (RCFG), an IPX/SPX related technology used to remotely configure Novell queues. 22

23 Require HTTPS Redirect When HTTPS redirect is enabled, accessing the device via a Web page is redirected through a secure port (HTTPS). HTTPS uses identity certificates in the device. Consider installing CA signed certificates before enabling. Telnet Telnet is a configuration and information protocol that allows you to configure a device from a console directly on the device. The Telnet protocol is used as a communication facility to allow a standard method of interfacing terminal devices or processes. Its well-known port is Port 23. In the context of Jetdirect, Telnet is used for setting or displaying configuration parameters. Jetdirect products have included a Telnet configuration option for a number of years. Although the Web UI may be the configuration method of choice, some customers appreciate the availability of Telnet when browsers are unavailable or the embedded web interface is not accepting connections. Jetdirect configuration items available through Telnet range from Admin password assignment to many of the printing and discovery protocol settings. Telnet only listens for one session at a time. Other Telnet clients cannot see any Telnet menus until their sessions are accepted. The Telnet session can be terminated at any time by either side of the connection. Parameters are not saved if the Telnet session is lost before the user exits from the Telnet main menu. Telnet is sometimes used to easily test TCP/IP connections. Printing is also possible through Telnet by opening up a session using Port 9100, then entering the data to be printed. Enabled Telnet obviously poses a serious security risk in any print environment. Although a Telnet connection may be protected by an administrator password, Telnet connections are not secure. Telnet data is transferred 23

24 over the network in a clear text, unsecured fashion. Once able to establish a Telnet session, a hacker would almost have complete access to the printer s configuration. Latest reports have shown that hackers appear to be using the telnet remote access protocol approximately 10% of the time to attack corporate servers over mobile networks. Fairly significant statistics considering Telnet is ~40 years old. Due to these Telnet related vulnerabilities, it is becoming increasingly common to see Secure Shell (SSH) replacing Telnet access methods. It is recommended to disable telnet and use a more secure method to configure HP devices. If telnet is required to transport data, it is recommended that an encrypted Telnet solution be deployed. Remote Firmware Upgrade (RFU) Allows the firmware upgrade file to be downloaded from the Internet and installed remotely. The firmware upgrade operation updates or replaces device operating system code on HP printers and multifunction devices, and is commonly referred to as a remote firmware update (RFU). The Remote Firmware Upgrade setting determines if the firmware update process is allowed to be performed. Performing a Remote Firmware Update (RFU) is typically the responsibility of an administrator within an organization. For security reasons, RFU is an option that should only be enabled when new firmware is being loaded. RFU should be disabled at all other times. FTP Firmware Update Select the check box to assess File Transfer Protocol (FTP) firmware update. If File Transfer Protocol (FTP) printing is allowed, you can start an FTP session and transfer the updated firmware image to the device. 24

25 TASKS The Tasks tab in the navigation tree offers the ability to perform Assess Only or Assess and Remediate tasks. An Assess Only task (assessment) reads policy security settings from devices and indicates which settings are in or out of compliance. An Assess and Remediate task (remediation) fixes any settings on devices that are out of compliance by placing them back into compliance. The result of the assessment task is indicated in the Assessment Status column in the device list. If the assessment status indicates Passed, all settings on the device matched the settings in the policy. Otherwise, assessment status will indicate any off High/Medium/Low with the most severe taking precedence for the status. Assessment and remediation tasks on a policy for a group can be scheduled to occur at any desired frequency. 25

26 Remember, when scheduling an assessment, the Assess Only option provides a report but does not change any device settings. The Assess and Remediate option actually fixes out-of-compliance devices. Assessment identifies and reports any noncompliant features during the scheduled assessment Remediation applies the correct policy settings to all noncompliant features REPORTS HP Printer Security Plug-in offers two reports to indicate which devices are in or out compliance. These reports could potentially be used to pass audits, as one example. Use the Reports tab in the navigation tree to generate or schedule the following types of reports: Executive Summary Devices Assessed Each report allows for saving the report as PDF by choosing the icon on the far right. Executive Summary The Executive Summary report displays the current state of the system in a dashboard type of display. The report includes the assessment risk by device, devices not assessed, assessment risk by policy item, assessment risk by feature category, and risk summary. The first graph contains pie charts to indicate the percentage of devices that were assessed and their respective risk levels as well as all devices that were not assessed and reasons for not being assessed. The second graph breaks down the assessment risks per policy items to indicate the percentage of policy items that passed or failed with their respective risk levels. It places the policy items into categories including Authentication, Protect the Device, Protect the Document, Protect the Network. The third graph provides a Risk Summary to perform calculations based upon each risk level and indicate a final overall Risk Score. The final box indicates the license summary. 26

27 Devices Assessed The Devices Assessed report lists all the assessed devices. To generate a more detailed report per device, select View next to each individual device. This report indicates every security setting that was assessed, whether it passed or not, and the risk level if it didn t pass. 27

28 Automated HP Printer Security Plug-in includes an Automated feature that sends a preconfigured tickler when an Assessment/Remediation task is complete. The Automated feature must be configured before it can be used. Configuration is performed by selecting Settings in the navigation tree and clicking Automatic . Configure both the server settings used to send the as well as some of the specifics of the to be sent. 28

29 Settings that can be configured include the following: SMTP Server The hostname or IP address of the server. Port The network port used to contact the server. Enable SSL Enables or disables the use of SSL when working with the server. Use Default Credentials Specifies if user credentials are required. If selected, the Username, Password, and Domain fields are disabled. Username The username used to log in to the SMTP ( ) server. Password The password used to log in to the SMTP server. This is a password text box, so the characters are hidden as they are entered. Domain If the username is related to a domain, the domain is required to qualify the username. This value is optional. The settings for the message include the following: Subject The subject used in the . From Address The address used for the sender in the . Recipient(s) One or more recipient addresses. If more than one address is specified, they must be separated by a space, comma, or semicolon. Automation Output s are supported only for Assessment/Remediation tasks. When a task is created, check the Results checkbox on the New Task dialog box to enable the sending of automatic summary reports via . If the Results checkbox is selected, an will be sent when the task completes. This checkbox is visible only if the following occur: A valid SMTP server name is entered in the global Settings dialog. 29

30 The task type is Assess and Remediate. The Results checkbox is not visible if the task type is Assessment only. The message is intended to be a tickler to remind an administrator that a remediation ran. This message, like all s, typically goes over the network in clear text, so only minimal information is included in the . The contains simple information, such as the task name, policy name, and device group. Copyright 2018 HP Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Microsoft and Windows are U.S. registered trademarks of the Microsoft group of companies. 4AA7-2800ENW, April

HP JetAdvantage Security Manager. User Guide

HP JetAdvantage Security Manager. User Guide HP JetAdvantage Security Manager User Guide Copyright 2017 HP Development Company, L.P. Reproduction, adaptation, or translation without prior written permission is prohibited, except as allowed under

More information

HP JETADVANTAGE SECURITY MANAGER. Credential Management

HP JETADVANTAGE SECURITY MANAGER. Credential Management HP JETADVANTAGE SECURITY MANAGER Credential Management CONTENTS Overview... 2 Credential Types... 2 Admin (EWS) Password... 3 SNMPv1/v2... 4 SNMPv3... 5 File System Password... 6 PJL Password... 6 Remote

More information

HP JETADVANTAGE SECURITY MANAGER. Adding and Tracking Devices

HP JETADVANTAGE SECURITY MANAGER. Adding and Tracking Devices HP JETADVANTAGE SECURITY MANAGER Adding and Tracking Devices CONTENTS Overview... 2 General Description... 2 Detailed Description... 5 Resolve IP Address to Hostname... 5 Resolve Hostname/DNS Alias to

More information

HP Imaging and Printing Security Best Practices

HP Imaging and Printing Security Best Practices HP Imaging and Printing Security Best Practices Configuring Security for Multiple LaserJet MFPs and Color LaserJet MFPs Version 5.0 for HP Web Jetadmin 10.1 or above HP LaserJet M3027 MFP HP LaserJet M3035

More information

Configuring Security Mitigation Settings for Security Bulletin HPSBPI03569 Protecting Solution Installation Settings

Configuring Security Mitigation Settings for Security Bulletin HPSBPI03569 Protecting Solution Installation Settings Technical White Paper Configuring Security Mitigation Settings for Security Bulletin HPSBPI03569 Protecting Solution Installation Settings Table of contents Overview... 2 Using the Embedded Web Server

More information

HP JETADVANTAGE SECURITY MANAGER

HP JETADVANTAGE SECURITY MANAGER HP JETADVANTAGE SECURITY MANAGER Policy Editor Settings CONTENTS Introduction... 5 Spoofing Identity... 5 Tampering with Data... 5 Repudiation... 6 Information Disclosure... 6 Denial of Service... 6 Elevation

More information

HP Designjets and HP Security Features

HP Designjets and HP Security Features HP Designjets and HP Security Features Overview and solutions for managing Security features in HP Designjets using the printers Embedded Web Server technology, Front Panel and Web Jetadmin Table of contents

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Version Installation Guide. 1 Bocada Installation Guide

Version Installation Guide. 1 Bocada Installation Guide Version 19.4 Installation Guide 1 Bocada Installation Guide Copyright 2019 Bocada LLC. All Rights Reserved. Bocada and BackupReport are registered trademarks of Bocada LLC. Vision, Prism, vpconnect, and

More information

HP Management Integration Framework 1.7

HP Management Integration Framework 1.7 HP Management Integration Framework 1.7 Administrator Guide Abstract This document describes the use of HP Management Integration Framework interfaces and is intended for administrators involved in the

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Changing the Administrator Password in Web

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

HP Database and Middleware Automation

HP Database and Middleware Automation HP Database and Middleware Automation For Windows Software Version: 10.10 SQL Server Database Refresh User Guide Document Release Date: June 2013 Software Release Date: June 2013 Legal Notices Warranty

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Changing the Administrator Password in Web

More information

HP Device Connect - Software Lite Technical Quick Specs

HP Device Connect - Software Lite Technical Quick Specs HP Device Connect - Software Lite Software Release Version: 4.4 Document Version: 1.3 Document Release Date: January, 2016 Document Last Update Date: December, 2016 Software Release Date: December, 2016

More information

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2012 Equitrac Corporation Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List November 1, 2012

More information

Security Guide: For the safety use of Digital Multifunction Printer (Digital MFP) Version 1.1

Security Guide: For the safety use of Digital Multifunction Printer (Digital MFP) Version 1.1 Security Guide: For the safety use of Digital Multifunction Printer (Digital MFP) Version 1.1 January 10, 2018 Security Measures for Introduction Ensure the following settings before introducing a product.

More information

HP JETADVANTAGE SECURITY MANAGER. Installing with Microsoft SQL Server

HP JETADVANTAGE SECURITY MANAGER. Installing with Microsoft SQL Server HP JETADVANTAGE SECURITY MANAGER Installing with Microsoft SQL Server CONTENTS Overview... 2 Introduction... 2 SQL Permissions... 3 Creating a SQL Database... 3 Upgrading a SQL Database... 3 Using a SQL

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

USB 2.0 Print Server. User s Manual. Rev. 01 (Jan, 2004) Made In Taiwan

USB 2.0 Print Server. User s Manual. Rev. 01 (Jan, 2004) Made In Taiwan USB 2.0 Print Server User s Manual Rev. 01 (Jan, 2004) Made In Taiwan TABLE OF CONTENTS ABOUT THIS GUIDE... 4 INTRODUCTION... 5 PACKAGE CONTENTS... 6 SYSTEM REQUIREMENTS... 6 GENERAL FEATURES... 7 PRODUCT

More information

Multilayered Print Protection: How Dell empowers organizations to take control of printer security

Multilayered Print Protection: How Dell empowers organizations to take control of printer security Multilayered Print Protection: How empowers organizations to take control of printer security How empowers organizations to take control of printer security Abstract Organizations are looking for ways

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...

More information

HP Color LaserJet Managed E55040 Series Firmware Readme

HP Color LaserJet Managed E55040 Series Firmware Readme HP Color LaserJet Managed E55040 Series Firmware Readme Product Name(s): Color LaserJet Managed E55040dw Model Number(s): 3GX98A This document contains information for the firmware revision number: Firmware

More information

HP PageWide Managed Color P75250dn Firmware Readme

HP PageWide Managed Color P75250dn Firmware Readme HP PageWide Managed Color P75250dn Firmware Readme Product Name(s): HP PageWide Managed Color P75250dn Model Number(s): Y3Z49A This document contains information for the firmware revision number: Firmware

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...

More information

Configuring the Cisco APIC-EM Settings

Configuring the Cisco APIC-EM Settings Logging into the Cisco APIC-EM, page 1 Quick Tour of the APIC-EM Graphical User Interface (GUI), page 2 Configuring the Prime Infrastructure Settings, page 3 Discovery Credentials, page 4 Security, page

More information

Facilities Manager Technical Overview

Facilities Manager Technical Overview Facilities Manager Technical Overview Overview Print Audit Facilities Manager is a powerful, easy to use tool designed to remotely collect meter reads, automate supplies fulfillment and report service

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Administrator's Guide Welcome to the Administrator's Guide. For a printable PDF copy of this guide, click here. Note: Not all features mentioned in this Administrator's Guide are

More information

Equitrac Integrated for Konica Minolta

Equitrac Integrated for Konica Minolta Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2014 Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List August 9, 2013 Updated for Equitrac

More information

FieldView. Management Suite

FieldView. Management Suite FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote

More information

OPC UA Configuration Manager PTC Inc. All Rights Reserved.

OPC UA Configuration Manager PTC Inc. All Rights Reserved. 2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 5 Project Properties - OPC UA 5 Server Endpoints 7 Trusted Clients 9 Discovery Servers 10 Trusted Servers 11 Instance

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

OPC UA Configuration Manager Help 2010 Kepware Technologies

OPC UA Configuration Manager Help 2010 Kepware Technologies OPC UA Configuration Manager Help 2010 Kepware Technologies 1 OPC UA Configuration Manager Help Table of Contents 1 Getting Started... 2 Help Contents... 2 Overview... 2 Server Settings... 2 2 OPC UA Configuration...

More information

Infinite Device Management

Infinite Device Management Infinite Device Management Version: Date: 18 04-Dec-2018 15:18 Table of Contents Infinite Device Management Features...................................... 3 Minimal software to install......................................................

More information

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1 OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use

More information

MAGNUM-SDVN Security Administration Manual

MAGNUM-SDVN Security Administration Manual MAGNUM-SDVN Security Administration Manual Revision 19: November 21, 2017 Contents Overview... 3 Administrative Access... 4 Logging Into Terminal Locally... 4 Logging Out Of Local Terminal... 4 Logging

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Using the HP IP/IPX Printer Gateway

Using the HP IP/IPX Printer Gateway Using the HP IP/IPX Printer Gateway Notice The information contained in this document is subject to change without notice. HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL,

More information

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client Version 3.0

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client Version 3.0 OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client Version 3.0 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of

More information

whitepaper Table of Contents:

whitepaper Table of Contents: whitepaper Table of Contents: Discovering Devices Using HP Web Jetadmin 10.0 Overview... 2 Part 1 How Discovery Works... 2 Discovery Settings... 3 Network Device Discovery vs. PC Connected Discovery...

More information

Common Access Card for Xerox VersaLink Printers

Common Access Card for Xerox VersaLink Printers Common Access Card for Xerox VersaLink Printers System Configuration Guide Version 1.3 NOVEMBER 2017 2017 Xerox Corporation. All rights reserved. Unpublished rights reserved under the copyright laws of

More information

Security Guide. security

Security Guide. security Security Guide security PREFACE Every effort has been made to ensure that the information in this document is complete, accurate, and up-to-date. The manufacturer assumes no responsibility for the results

More information

Printer Driver User Guide

Printer Driver User Guide PRINT COPY SCAN FAX ECOSYS M660idn ECOSYS M655idn ECOSYS M65idn ECOSYS M65dn Printer Driver User Guide PRINT COPY SCAN ECOSYS M5idn ECOSTS M5dn Legal Notes Unauthorized reproduction of all or part of this

More information

HP SmartTracker. Installation guide

HP SmartTracker. Installation guide HP SmartTracker Installation guide Edition 1 Copyright 2017 HP Development Company, L.P. Legal notices The information contained herein is subject to change without notice. The only warranties for HP products

More information

Xerox Device Data Collector 1.1 Security and Evaluation Guide

Xerox Device Data Collector 1.1 Security and Evaluation Guide Xerox Device Data Collector 1.1 Security and Evaluation Guide 2009 Xerox Corporation. All rights reserved. Xerox, WorkCentre, Phaser and the sphere of connectivity design are trademarks of Xerox Corporation

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Equitrac Integrated for Océ

Equitrac Integrated for Océ Equitrac Integrated for Océ 1.2 Setup Guide 2014 Equitrac Integrated for Océ Setup Guide Document History Revision Date Revision List November 2, 2012 Updated for Equitrac Office/Express version 4.2.5

More information

Embedded for Xerox EPA-EIP Setup Guide

Embedded for Xerox EPA-EIP Setup Guide Embedded for Xerox EPA-EIP Setup Guide 2016 XRX-EPA-EIP-20160315 Equitrac Embedded for Xerox EPA-EIP Setup Guide Document History Date Description of Revision Changes March 15, 2016 Updated for Equitrac

More information

Fast Ethernet Print Server 1 Parallel, 2 USB

Fast Ethernet Print Server 1 Parallel, 2 USB Fast Ethernet Print Server 1 Parallel, 2 USB User s Manual Rev. 01 (Nov, 2005) Made In Taiwan TABLE OF CONTENTS ABOUT THIS GUIDE... 4 INTRODUCTION... 5 PACKAGE CONTENTS... 6 SYSTEM REQUIREMENTS... 6 GENERAL

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level 1.1 Utilize an Active Discovery Tool 1.2 Use a Passive Asset Discovery Tool 1.3 Use DHCP Logging to Update Asset Inventory 1.4 Maintain Detailed Asset Inventory 1.5 Maintain Asset Inventory Information

More information

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide HPE Security Fortify WebInspect Enterprise Software Version: 17.10 Windows operating systems Installation and Implementation Guide Document Release Date: May 2017 Software Release Date: April 2017 Legal

More information

Udocx for Office 365 HP MFP Deployment Guide

Udocx for Office 365 HP MFP Deployment Guide Udocx for Office 365 HP MFP Deployment Guide Version 1.3 Introduction This document describes the required steps to connect your HP MFP device to Udocx. The result of the configuration is that the Udocx

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module System Management Configuration Guide Part number: 5998-4216 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Simplify printing with HP connectivity solutions

Simplify printing with HP connectivity solutions Sales Guide Simplify printing with HP connectivity solutions Easily add new wireless or wired printing options to your HP printer The challenge secure mobile printing Business moves likes never before

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Configuring F5 for SSL Intercept

Configuring F5 for SSL Intercept Configuring F5 for Welcome to the F5 deployment guide for configuring the BIG-IP system for SSL intercept (formerly called with Air Gap Egress Inspection). This document contains guidance on configuring

More information

Wireless USB Port Multi-Functional Printer Server. Model # AMPS240W. User s Manual. Ver. 1A

Wireless USB Port Multi-Functional Printer Server. Model # AMPS240W. User s Manual. Ver. 1A Wireless USB 2.0 1-Port Multi-Functional Printer Server Model # AMPS240W User s Manual Ver. 1A Table of Contents 1 Introduction...3 1.1 Package Contents... 3 1.2 System Requirements... 3 2 Multi-Functional

More information

ForeScout CounterACT. Configuration Guide. Version 4.1

ForeScout CounterACT. Configuration Guide. Version 4.1 ForeScout CounterACT Network Module: VPN Concentrator Plugin Version 4.1 Table of Contents About the VPN Concentrator Plugin... 3 What to Do... 3 Requirements... 3 CounterACT Requirements... 3 Supported

More information

Privileged Remote Access Appliance Interface (/appliance)

Privileged Remote Access Appliance Interface (/appliance) Privileged Remote Access Appliance Interface (/appliance) 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

HP Color LaserJet Managed E55040 Series Firmware Readme

HP Color LaserJet Managed E55040 Series Firmware Readme HP Color LaserJet Managed E55040 Series Firmware Readme Product Name(s): Color LaserJet Managed E55040dw Model Number(s): 3GX98A This document contains information for the firmware revision number: Firmware

More information

HP Roam - Business Deployment Guide

HP Roam - Business Deployment Guide HP Roam - Business Deployment Guide Copyright 2018 HP Development Company, L.P. January 2019 The information contained herein is subject to change without notice. The only warranties for HP products and

More information

Configuring Client Posture Policies

Configuring Client Posture Policies CHAPTER 19 This chapter describes the posture service in the Cisco Identity Services Engine (Cisco ISE) appliance that allows you to check the state (posture) for all the endpoints that are connecting

More information

CHAPTER 7 ADVANCED ADMINISTRATION PC

CHAPTER 7 ADVANCED ADMINISTRATION PC ii Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband ADSL Router Features... 1 Package Contents... 3 Physical Details... 4 CHAPTER 2 INSTALLATION... 6 Requirements... 6 Procedure... 6 CHAPTER 3 SETUP...

More information

Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M

Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M Topics: TACACS+ Authentication for Centralized Control of Switch Access Security (page 7) CDP (page

More information

HP JETADVANTAGE SECURITY MANAGER. Certificate Management

HP JETADVANTAGE SECURITY MANAGER. Certificate Management HP JETADVANTAGE SECURITY MANAGER Certificate Management CONTENTS Overview... 2 What is a Certificate?... 2 Certificate Use Cases... 2 Self-Signed Certificates... 2 Identity Certificates... 4 CA Certificates...

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

Platform Settings for Classic Devices

Platform Settings for Classic Devices The following topics explain Firepower platform settings and how to configure them on Classic devices: Introduction to Firepower Platform Settings, page 1 Configuring Firepower Platform Settings, page

More information

HP 5120 SI Switch Series

HP 5120 SI Switch Series HP 5120 SI Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-1813 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

WhatsConfigured for WhatsUp Gold 2016 User Guide

WhatsConfigured for WhatsUp Gold 2016 User Guide WhatsConfigured for WhatsUp Gold 2016 User Guide Contents Welcome to WhatsConfigured 1 What is WhatsConfigured? 1 Finding more information and updates 1 Sending feedback 2 Deploying WhatsConfigured 3 STEP

More information

PA-DSS Implementation Guide For

PA-DSS Implementation Guide For PA-DSS Implementation Guide For, CAGE (Card Authorization Gateway Engine), Version 4.0 PCI PADSS Certification 2.0 December 10, 2013. Table of Contents 1. Purpose... 4 2. Delete sensitive authentication

More information

KYOCERA Net Admin Installation Guide

KYOCERA Net Admin Installation Guide KYOCERA Net Admin Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for

More information

IDM Technical Overview

IDM Technical Overview IDM Technical Overview Infinite Device Management Features Minimal software to install Infinite Device Management uses a small software program called the Information Collection Engine to perform periodic

More information

Troubleshooting Cisco DCNM

Troubleshooting Cisco DCNM 18 CHAPTER This chapter describes some common issues you might experience while using Cisco Data Center Network Manager (DCNM), and provides solutions. Note For troubleshooting Cisco DCNM server installation

More information

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2015 Cisco and/or its affiliates. All rights

More information

Achieving regulatory compliance with reports from ProCurve PCM, IDM, and NIM

Achieving regulatory compliance with reports from ProCurve PCM, IDM, and NIM An HP ProCurve Networking Application Note Achieving regulatory compliance with reports from ProCurve PCM, IDM, and NIM Contents 1. Introduction... 2 2. Prerequisites... 2 3. Network diagram... 2 4. Instructions

More information

KYOCERA Device Manager User Guide

KYOCERA Device Manager User Guide KYOCERA Device Manager User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Forescout. Configuration Guide. Version 4.2

Forescout. Configuration Guide. Version 4.2 Forescout Version 4.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver LevelOne FBR-1416 1W, 4L 10/100 Mbps ADSL Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 FBR-1416 Features... 1 Package Contents... 3 Physical Details... 3 CHAPTER 2

More information

User s Guide: Applied Functions

User s Guide: Applied Functions User s Guide: Applied Functions Table of contents 1 Using Web Connection 1.1 Web Connection... 1-2 Web Connection...1-2 Operating environment...1-2 1.2 Operations required to use this function... 1-2 1.2.1

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level One Level Two Level Three Level Four Level Five Level Six 1.1 Utilize an Active Discovery Tool Utilize an active discovery tool to identify devices connected to the organization's network and update

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center Service Health Manager Administrator Guide Abstract This guide provides introductory, configuration, and usage information for Service Health Manager (SHM). It is for

More information

HP PageWide Managed Color P75250dn Firmware Readme

HP PageWide Managed Color P75250dn Firmware Readme HP PageWide Managed Color P75250dn Firmware Readme Product Name(s): HP PageWide Managed Color P75250dn Model Number(s): Y3Z49A This document contains information for the firmware revision number: Firmware

More information

Virtual Recovery Assistant user s guide

Virtual Recovery Assistant user s guide Virtual Recovery Assistant user s guide Part number: T2558-96323 Second edition: March 2009 Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind

More information

HP JetAdvantage Connect Print Server. Install Guide

HP JetAdvantage Connect Print Server. Install Guide HP JetAdvantage Connect Print Server Install Guide Copyright and License Copyright 2016 HP Development Company, L.P. Reproduction, adaptation, or translation without prior written permission is prohibited,

More information

CX1145 MFP. Network Administration Guide , Rev. 1.0

CX1145 MFP. Network Administration Guide , Rev. 1.0 CX1145 MFP Network Administration Guide 59315601, Rev. 1.0 TRADEMARKS AND COPYRIGHT Trademarks The official name of Windows 98 is Microsoft Windows 98 Operating System. The official name of Windows Me

More information

User Identity Sources

User Identity Sources The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The

More information

BACK UP, RESTORE, AND CLONE AN HP WEB JETADMIN INSTALLATION

BACK UP, RESTORE, AND CLONE AN HP WEB JETADMIN INSTALLATION BACK UP, RESTORE, AND CLONE AN HP WEB JETADMIN INSTALLATION CONTENTS Overview... 2 Why back up HP Web Jetadmin?... 2 Back up an HP Web Jetadmin installation that is configured for a local database... 2

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

Network Guide. IMPORTANT: Read this manual carefully before using your printer. Save this manual for future reference. ENG

Network Guide. IMPORTANT: Read this manual carefully before using your printer. Save this manual for future reference. ENG Network Guide IMPORTANT: Read this manual carefully before using your printer. Save this manual for future reference. ENG Network Guide How This Manual Is Organized Chapter 1 Before You Start Chapter 2

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

Network Quick Install Cards Document Centre 490/480/470/460 ST

Network Quick Install Cards Document Centre 490/480/470/460 ST Network Quick Install Cards Document Centre 490/480/470/460 ST This package contains Quick Install Cards that will help you connect the Document Centre to your network and install E-mail. Please read and

More information

Print Server Administration User s Guide

Print Server Administration User s Guide Print Server Administration User s Guide ii About This Guide Table of Contents ABOUT THIS GUIDE... 1 What s Not Covered in This User s Guide... 1 Contents of the User s Guide... 2 INTRODUCTION... 3 Background

More information

PageScope Net Care Device Manager Ver. 2.0 User s Guide

PageScope Net Care Device Manager Ver. 2.0 User s Guide PageScope Net Care Device Manager Ver..0 User s Guide Net Care Device Manager Contents 1 Summary 1.1 Introduction...1-1 1.1.1 About Device Manager...1-1 Basic and extended functions... 1-1 Configuration

More information

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free: EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install

More information