Standard Information Communications Technology. Multifunction Device. January 2013 Version 2.2. Department of Corporate and Information Services
|
|
|
- Belinda Patrick
- 10 years ago
- Views:
Transcription
1 Standard Information Communications Technology January 2013 Version 2.2 Corporate and Information Services
2 Document details Document Title Contact details File name Version 2.2 Date issued January 2013 Document Control Information Communication Technology (ICT) Policy and Strategy Division, Corporate and Information Services (DCIS) Northern Territory Government (NTG). Standards Approved by NTG IMC: 29 September 2010 Change History Version Date Author Change details 1.0 July 2010 K. Kannoorpatti New Standard 2.0 October 2010 K. Kannoorpatti Updated after feedback from CAPS, Vendors and ICT staff. New section on security added. 2.1 October 2011 K. McCarthy Change format 2.2 January 2013 K. McCarthy Internet version and Update government names Corporate and Information Services
3 Table of Contents 1 Overview Purpose Scope Responsibility Other Applicable Documents Acronyms s General Requirements Operating System and Firmware Patching Wireless Capability Networking Management Software EPass2 or IAM (Identity and Access Management) Reporting Security Scanning Image Resolution Broadcast Fax Future Developments Receiving Sending Hard Drive and Flash Memory Security Media Disposal Local Machine Accounts IAM Auditing Green ICT Requirements Energy Star Definitions ( 3.2 Minimum Energy Star Requirements Paper and Other Consumables General Security Requirements Restrict Protocols Management Protocols Change Controls Printing Ports Location Printing Printing Using VPN...13 Corporate and Information Services
4 1 Overview Multifunction devices (MFD) are devices connected to the NTG ICT network that has the capacity for two or more of the functions listed below: Photocopy; Scan; Send and receive Fax; and Printing ( including mainframe application printing ). The main reasons for specifying MFDs are to ensure that there is appropriate interface with the NTG Enterprise Architecture and there are adequate security measures in place to safeguard NTG information. Additionally the standards seek to achieve Green ICT requirements, improve management, reduce electricity consumption and improve effective use of office space. The document describes functional requirements for MFDs used in NTG. Where possible, standards will be specified for the requirements. 1.1 Purpose The document describes functional requirements for MFDs used in NTG. Where possible, standards will be specified for the requirements. The requirements provide standards for security and integration in to the NTG ICT environment. If there are deviations to the standards and such deviations is found necessary, it will be incorporated as options in the next version of the standards. 1.2 Scope The standards apply to all MFDs purchased/leased for general office purposes, including Mainframe application printing. This does not cover specialised equipment meant for scanning and printing maps in GIS, hospital images, local printers, etc. 1.3 Responsibility The Information Communication Technology (ICT) Policy and Strategy Division of the Corporate and Information Services (DCIS) is responsible for developing and maintaining ICT policies and guidelines for use across the NTG. All NTG Chief Executives (CE) are responsible for ensuring all aspects of this policy are applied within their agency. All NTG employees involved in business relating to this must adhere to it. Any deviation from the requirements requires the approval of NTG ICTIASU. 1.4 Other Applicable Documents 1. NTG Green ICT policy 2. Media Destruction Standards 3. Wireless LAN Security Standards 4. Wireless Technology Standards Corporate and Information Services 4
5 1.5 Acronyms 5. Access Standards The following acronyms are used in this document: AD AP Active Directory Access Point IAM Identity and Access Management (also called Epass 2) IPM LAN MFD OCR OS Images Per Minute Local Area Network Optical Character Recognition Operating System 2 s 2.1 General Requirements Multifunction devices (MFD) are devices that include two or more functions of other standalone office machines that can: Photocopy; Scan; Send and receive Fax; ; and Printing ( including mainframe application printing ) Operating System and Firmware All MFD operating systems (OS) must be compatible with the OS of the NTG fleet. At present, the NTG Load LIst is based on Microsoft Windows operating systems. The MFD should be capable of interoperating with the Windows based servers. There may be a requirement for applications that are based on Mainframe OS Patching MFD patches should be maintained on a regular basis to ensure the latest firmware, management system or OS. The MFD OS or firmware must be updated regularly to ensure that they do not create any security issues. Security requirements are specified in another part of the document. It is the responsibility of the contractors to arrange updates and deploy on to machines. The contractors should arrange to receive notifications from the manufacturers or other sources and ensure that the updates are carried out within 2 weeks of the notifications. In instances of widespread infections or malware affecting the NTG network, then these must be attended to at much shorter notice. Corporate and Information Services 5
6 The contractors should also prepare a report on the status of updates every month to the appropriate authority within agencies and at NTG level Wireless Capability Some Agencies may require wireless capability on MFDs in order to connect to NTG wireless access points. In those instances the MFDs must be capable of installing a certificate and be able to authenticate to the Active Directory (AD) through the access point. The MFDs would be using Service accounts set up in AD to authenticate. The MFDs must not accept connections directly from desktops, laptops or other devices. The devices must be capable of connecting only to authorised APs Networking The MFDs must be capable of being connected to network servers mainly based on Microsoft Windows OS. However, they should be capable of connecting to servers based on other OS (such as mainframe OS, linux, etc). In these instances testing should be done to ensure compatibility. The contractor is responsible to carry out testing. The contractor should list the requirements of the standards that are not met with different operating systems. The machines must be capable of being addressed by an IP address and a machine name. The details must be available as part of the Active Directory (AD). The naming convention must be that applied as per agreed standards in AD. This is irrespective of whether the machine is managed by a contractor or an Agency. The MFDs should connect to the LAN (local area network) using a service account and protected by a long complex password as per NTG Access Standards. Each MFD connected to the network will have a service account set up Management Software The MFDs must be capable of being managed centrally by the contractors. If a contractor wishes to manage the MFDs from the internet, NTG VPN should be made use of. The appropriate NTG Contract Manager should authorise such VPN connection through Epass. It is anticipated that there will be several different contractors managing different parts, or Agencies, of NTG contracted services. The management application software access must be secured by UserID and password. Any changes to the application software must be done by privileged accounts set up for the purpose. All accesses to MFD configuration and changes must be secured by such privileged accounts. Each contractor will be registered with IAM (EPass2) to get access to the MFD management software. The appropriate NTG Contract Manager should authorise a contractor in each contract to manage and control such privileged accounts EPass2 or IAM (Identity and Access Management) All MFD service accounts and contractor accounts must be defined to the IAM. MFD service accounts This should contain the following details: Name of the machine; Corporate and Information Services 6
7 Agency details; Location; IP address; Unique assigned to the machine; and Contractor contacts. Management software accounts This should contain the following details: Name of the contractor; Name of NTG contract; and Agencies covered. This information must be kept updated regularly and this is the responsibility of the relevant contractor. The accounts should be synchronised with all details with the AD so it can log on to a print and file server Reporting They must be capable reporting the following: Status of the machine; Be able to reset printers; Status on when an ink cartridge is ready for replacement; and Provide statistics on usage such as: Number of pages printed; Number of pages printed in colour or black and white; Number of s sent out; and Number of copies scanned, This reporting should be available as an option. 2.2 Security Changes made to local configuration by users must be restricted by applying security controls. The rights to making changes to configuration must be delegated to appropriate Managers in a division or unit. The security controls should be in the form of AD credentials. This should be declared to the IAM or EPass2. In some cases, there may be a requirement to restrict access to the use of machine, when printing confidential documents, through either a key card, RFID (Radio Frequency Identity Device), PIN, etc. This can be done on Agency by Agency basis with a set of features that are enabled on the devices. Corporate and Information Services 7
8 2.3 Scanning All scanned images should be capable of being sent to an account through an NTG mail relay service. The MFD will not be permitted to send mail to the internet. However, the MFDs may be permitted to mail a contractor or their contractors to receive alerts and status of machines. For this the accounts set up must be in general be an NTG address and an alias set up in the NTG system can then forward the mail to a contractor. The MFD will not be permitted to receive mail from the internet. In the event this is required, an approval from NTG ICTIASU should be obtained. 2.4 Image Resolution The MFDs should be capable of printing and scanning as a minimum up to 300dpi (dots per inch). As an option they should also be capable of performing full duplex scanning with blank page detection and removal (dropout). As an option it is desirable that MFD should have OCR functionality and be capable of outputting a searchable PDF file. The scanned image should be capable of being compressed before being ed as a file Broadcast The MFD should not be capable of sending any broadcast to a large number of NTG users. Sending of must be restricted to just one at a time. If broadcast is needed, the documents will be scanned and sent as an to the user who can then use their own mail account to send broadcast if they are so permitted. 2.5 Fax The MFD should be capable of sending and receiving FAX. A telephone connection should be made available for the near future. Instructions for sending and receiving FAX should be made available by the contractor Future Developments In the future MFDs that are capable of FAX will be able to receive and send FAX through a FAX relay system. All FAX will be received and sent as . FAX received by the FAX relay will be sent to the MFD as which can then be forwarded or printed on the MFD. The devices will have no direct telephone connections to any PBX systems. In the future in the event that an encrypted FAX link is required, then a telephone connection is permitted. However, such connections must be approved by NTG ICTIASU Receiving The MFD should connect to a FAX relay service gateway. All faxes should be received as an by the MFDs as image files. Received FAX will be stored in the hard drive of the MFD. The MFD should then be capable of printing the FAX or sending the FAX as an to an NTG address. If either of the two actions has been done, the FAX message should be deleted. Corporate and Information Services 8
9 Sending The MFD must be capable of sending FAX through the FAX relay service gateway. In some machines there may be requirements to restrict the use of FAX machines only to some privileged users - for example, where there are requirements to FAX sensitive documents. 2.6 Hard Drive and Flash Memory MFDs use hard drives or flash memory to store documents in order to speed up the processes. The size of the hard drive must have the required memory to store , copies while printing and scanning, OS and other configuration settings. If the memory size is not sufficient that it affects the machine performance, then the contractor must increase the memory size Security Hard drive and other memory modules must be secured physically in an enclosure with security screws to make it tamperproof. No terminals must be easily available for making a physical connection to the memory. In some Agencies there will be a requirement to have the stored data, such as FAX, in an encrypted form. Suitable encryption software protected by a complex password key should be available as an option. Basic and upgrade versions of encryption should be available as options. As an option, MFDs should have the capability to delete all spooled jobs (such as printing, scanning or photocopying), images and other temporary files in between jobs. If such an option is not available in MFDs should have the ability to install a data overwrite kit. In between jobs the kit will have the ability to overwrite job related data Media Disposal All MFD memory drives cannot be disposed off without wiping the data off the hard drive. The standards prescribed in NTG media destruction document must be followed. Suitable procedures should be written in the contractors contract to ensure that this happens. 2.7 Local Machine Accounts There is a requirement that some features of the machine should be restricted to some users. Some local privileged accounts should be set up that will access to these features. The privileged accounts must be added to the MFDs through the management software. Such accounts must be defined to the IAM or EPass IAM All local privileged accounts in MFDs should be defined in IAM. A separate group must be set up in IAM for such privileges. Such accounts must have the following details: Name of MFD; and Location. Corporate and Information Services 9
10 2.8 Auditing All accesses, configuration settings and changes made through the configuration of management software and local MFDs must be logged. The logs should be able to be read using Excel or other popular office applications. NTG ICTIASU has the right to audit the logs captured by the local machine or the management software. The logs should be kept for a period of 6 months. Corporate and Information Services 10
11 3 Green ICT Requirements All the relevant requirements of the NTG Green ICT policy must be adhered to when MFDs are purchased. All office equipment must have the following features: Energy star compatible; Automatically enter "low-power" and/or "sleep" modes after a period of inactivity; Energy-efficiency specifications based on device speed; Automatic duplex mode; All suppliers of equipment must be a signatory to the National Packaging Covenant. ( and Recyclable as per local legislation or regulations (Please consult the local council for regulations regarding disposal and recycling requirements). If relevant and possible, MFDs may be considered for reuse in eligible charity organisations or NGO (Non-Government Organisation). 3.1 Energy Star Definitions ( MFDs must also be evaluated for their energy usage and efficiency. There are different modes under which energy consumption can be saved. MFDs should be capable of saving energy and have all or part of the following features enabled: Standby Mode: The condition that exists when the machine is not producing output, has reached operating conditions and is ready to make hard copy output, but has not yet entered into the low-power mode. When the multifunction device is in this mode, there will be virtually no delay before the multifunction device is capable of making the next hard copy output. Low-Power Mode: The condition that exists when the multifunction device is not producing hard copy output, and is consuming less power than when in a standby or ready mode. Sleep Mode: The lowest power state the multifunction device can automatically enter without actually turning off. Default Time: The time period set by the manufacturer prior to shipping that determines when the multifunction device will enter the low-power and sleep modes. Recovery Time: The amount of time needed to bring the multifunction device from the low-power mode to the standby mode. Lower it is the better it is. Automatic Duplex Mode: The mode in which the multifunction device automatically places images on both sides of a sheet by automatically sending both the sheet and the graphic original through the multifunction device. Examples of this are one-sided to two-sided copying, two-sided to two-sided copying, or double-sided printing. A multifunction device model is considered to have an automatic duplex mode only if the multifunction device model includes all accessories needed to satisfy the above conditions, i.e., an automatic document feeder and accessories for automatic duplexing capabilities. Note: Corporate and Information Services 11
12 For all standard-sized multifunction devices that output at speeds greater than 20 ipm (images per minute) duplexing must be offered as an option. 3.2 Minimum Energy Star Requirements MFDs must meet the minimum energy star requirements or better, as per Table 1: Table 1: Standard-Sized MFDs (effective 1 April 2000) MFD Speed (images per minute) Lowpower mode (Watts) Recovery Time 30 seconds Sleep Mode (Watts) Sleep Mode Default Time Automatic Duplex Mode 0 < ipm < 10 NA NA < 25 < 15 min No 10 < ipm < 20 NA NA < 70 < 30 min No 20 < ipm < x ipm < ipm < x ipm < ipm 3.85 x ipm + 50 Yes < 80 < 60 min Optional Recommended < 95 < 90 min Default for both copying and printing/fax receipt Recommended < 105 < 120 min Default for both copying and printing/fax receipt 3.3 Paper and Other Consumables MFDs must be capable of operating efficiently using the brands of plain and recycled paper specified in the NTG Paper Supply Contract: Capacity to scan both sides of printed material; Long-life printing drums and toner cartridges; The contractor should ensure that they provide cartridge recycling services; Capable of printing, copying or scanning of paper sizes A5, B5, A4 and A3 as a minimum; and Capable of either colour and/or black & white printing, copying or scanning. Corporate and Information Services 12
13 4 General Security Requirements 4.1 Restrict Protocols All unnecessary protocols, including FTP, should be disabled. If the MFD is networked then only TCP/IP must be enabled. If restricted protocols are required for the purposes of upgrading of firmware or configuration, then the approval of the NTG ICTIASU is needed Management Protocols Disable unnecessary protocols for managing the machines. HTTPS will be the likely primary management protocol for most MFDs. If SNMP is used to manage the MFDs, then SNMPv3 or better must be used for authentication and encryption. In general, the management functions should be restricted to only a specific set of IP addresses. If the device lacks this functionality use of ACL in a router, firewall or switch must be made of to restrict access Change Controls Any changes made to the configuration settings or other changes that have an effect on the function or security need to be approved by the appropriate NTG Contract Manager. The Contractor should present the list of changes, the reason for the changes, backout plan, have it reviewed, risk assessment of the changes, etc to the Contract Manager. The request must be planned at least a week in advance of the change. In the event of a serious security vulnerability, the contractor should seek to get the approval from the NTG Contract Manager, if available, giving a shorter notice and take appropriate action. Changes that affect the NTG ICT network must be approved NTG Change Management Board located in the DCIS ICT Services. All changes to the NTG ICT network must be routed through the appropriate NTG Contract Manager. No requests from the Contractor will be directly sent to the NTG ICT Service Centre without the approval of the NTG Contract Manager. Any changes to the EPass account such as VPN access for Contractor must be authorised by the appropriate NTG Contract Manager Printing Ports Print jobs where necessary be sent to a printer should be encrypted through the use of secure printing applications using port 9100, SSL or TLS. This option should be available when sensitive information can be intercepted unauthorised in the network. 4.2 Location Printing In general, users should print to MFDs in their business location. If the business location is shared amongst other business units or Agencies, then the users must make sure that they collect all of their printed materials to avoid sensitive information landing in wrong hands. The printers should not be available for printing directly from the internet Printing Using VPN If a user of the printer s location requires printing from the internet, then printing is allowed through the VPN. Corporate and Information Services 13
Standard Information Communications Technology. Videoconferencing. January2013 Version 1.4. Department of Corporate and Information Services
Standard Information Communications Technology January2013 Version 1.4 Corporate and Information Services Document details Document Title Contact details File name Version 1.4 Document Control Information
U06 IT Infrastructure Policy
Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Control scanning, printing and copying effectively with uniflow Version 5. you can
Control scanning, printing and copying effectively with uniflow Version 5 you can Bring more control and added efficiency to your scanning and print environment. What is uniflow? uniflow is a software
Federal Sustainable Print Management Policy Template
Introduction The policy language in this document is provided as an example of the type of language your organization can include in a print management policy, directive, memorandum, or guidance (in italics
Name: Position held: Company Name: Is your organisation ISO27001 accredited:
Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Drivers provided for at least the following listed computer operating systems;
Drivers Drivers provided for at least the following listed computer operating systems; Windows current production version and two versions back 32 & 64 bit (As of January 2010 includes XP, Vista and Windows
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
One platform for printing, copying and scanning management. you can
One platform for printing, copying and scanning management you can Bring more control and added efficiency to your scanning and print environment. What is uniflow? uniflow is a software platform designed
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...
NETWORK USER S GUIDE MFC-9460CDN MFC-9465CDN MFC-9560CDW. Internet Fax and Fax to Server features
Internet Fax and Fax to Server features NETWORK USER S GUIDE MFC-9460CDN MFC-9465CDN MFC-9560CDW To find basic information about network and advanced network features of your Brother machine, see the Network
Secure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012
Secure Installation and Operation of Your Xerox Multi-Function Device Version 1.0 August 6, 2012 Secure Installation and Operation of Your Xerox Multi-Function Device Purpose and Audience This document
Xerox Mobile Print Cloud
September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United
Full Colour Multifunction Device. Copier Printer Facsimile Scanner. Aficio MP C305SPF B/W. ppm
Full Colour Multifunction Device Copier Printer Facsimile Scanner Aficio MP C305SPF B/W 30 Colour ppm High performance A4 colour The MP C305SPF provides all the colour printing, scanning and copying functions
Dublin Institute of Technology IT Security Policy
Dublin Institute of Technology IT Security Policy BS7799/ISO27002 standard framework David Scott September 2007 Version Date Prepared By 1.0 13/10/06 David Scott 1.1 18/09/07 David Scott 1.2 26/09/07 David
Exhibit B5b South Dakota. Vendor Questions COTS Software Set
Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
ICTTEN5204A Produce technical solutions from business specifications
ICTTEN5204A Produce technical solutions from business specifications Release: 1 ICTTEN5204A Produce technical solutions from business specifications Modification History Not Applicable Unit Descriptor
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
System Requirements - filesmart
System Requirements - filesmart The following are minimum and recommended system requirements for filesmart. Whilst the program will operate on the minimums listed, we strongly suggest you meet or exceed
How To Use Uniflow
One platform for all your print, scan and device management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in
Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
Samsung Security Solutions
Print with confidence Samsung Security Solutions For Every Business A4 to A3 Mono to Colour MFPs to Printers Samsung Security Features You may not realise it, but every business can benefit from security.
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips dc07cc0432 October 19, 2007 This document applies to these Xerox products: X WC 7328/7335/7345 for the user Xerox Network Scanning TWAIN Configuration for the
ADM:49 DPS POLICY MANUAL Page 1 of 5
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
Advanced Diploma In Hardware, Networking & Server Configuration
Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking
Avaya TM G700 Media Gateway Security. White Paper
Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
I-Fax (Internet Fax) 1: Basic Overview. 2: Benefits to the customer. Machines included:
(Internet Fax) Machines included: HL-4040CN HL-4050CDN HL-4070CDW DCP-9040CN DCP-9045CDN MFC-9440CN MFC-9840CDW DCP-8060 DCP-8065DN MFC-8460N MFC-8860DN MFC-8870DW Contents 1) Overview 2) Benefits to the
KMnet Admin ENTERPRISE DEVICE MANAGEMENT SOFTWARE ADVANCED DEVICE MANAGEMENT SOFTWARE.
KMnet Admin ENTERPRISE DEVICE MANAGEMENT SOFTWARE ADVANCED DEVICE MANAGEMENT SOFTWARE. FAST, SIMPLE NETWORK DEVICE MANAGEMENT. UNIFIED SOFTWARE TO MANAGE DEVICES AND NETWORKS KMnet Admin is Kyocera's unified
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
SyAM Software Management Utilities. Creating Templates
SyAM Software Management Utilities Creating Templates Step 1: Setting Up Folder Paths The Management Utilities utilize a server share to perform centralized network deployment of applications and patches.
NETWORK PRINT MONITOR User Guide
NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
Cloud Portal for imagerunner ADVANCE
Cloud Portal for imagerunner ADVANCE User's Guide Please read this guide before operating this product. After you finish reading this guide, store it in a safe place for future reference. ENG How This
Information and Communication Technology. Patch Management Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
How To Choose A Workcentre 5019/5021 Multi-Function System
WorkCentre 5019/5021 A3 Size Black and white Multifunction System Xerox WorkCentre 5019/5021 Multifunction System Evaluator Guide About this Guide This Evaluator Guide introduces you to the WorkCentre
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
SECURITY. Konica Minolta s industry-leading security standards SECURITY
Konica Minolta s industry-leading security standards In the digital age, we have seen global communications undergo unprecedented growth and the potential for security breaches has grown in parallel. In
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
bizhub C3850/C3350 USER S GUIDE Applied Functions
bizhub C3850/C3350 USER S GUIDE Applied Functions Table of contents 1 Using Web Connection 1.1 Web Connection... 1-3 Web Connection... 1-3 Operating environment... 1-3 1.2 Operations required to use this
ADMINISTRATOR SETTINGS GUIDE PURPOSE OF THE ADMINISTRATOR SETTINGS ADMINISTRATOR SETTINGS LIST USING THE ADMINISTRATOR SETTINGS
ADMINISTRATOR SETTINGS GUIDE DIGITAL MULTIFUNCTIONAL SYSTEM This manual explains settings for use by the administrator of the machine. PURPOSE OF THE ADMINISTRATOR SETTINGS ADMINISTRATOR SETTINGS LIST
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Use of Exchange Mail and Diary Service Code of Practice
Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY
UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY Originator: IT Performance and Capacity Management Policy Approval and Version Control Approval Process: Position or Meeting
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
Print Audit Facilities Manager Technical Overview
Print Audit Facilities Manager Technical Overview Print Audit Facilities Manager is a powerful, easy to use tool designed to remotely collect meter reads, automate supplies fulfilment and report service
Catapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
NHSmail mobile configuration guide Android mobile devices
NHSmail mobile configuration guide Android mobile devices Version: V.6 Date: September 2011 THIS INFORMATION IS FOR NHS STAFF AND IS NOT TO BE DISTRIBUTED OR COPIED OUTSIDE OF THE NHS Version 6.0 Crown
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Xerox Multifunction Devices. Verify Device Settings via the Configuration Report
Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP
ICANWK401A Install and manage a server
ICANWK401A Install and manage a server Release: 1 ICANWK401A Install and manage a server Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications
System Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
October 2013 702P00860. Xerox App Studio. Information Assurance Disclosure. Version 2.0
October 2013 702P00860 Xerox App Studio Information Assurance Disclosure Version 2.0 2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts
Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide 2 Purpose of this guide Experience the most common use cases for the product, learn about
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Understanding IP Faxing (Fax over IP)
Understanding IP Faxing (Fax over IP) A detailed technical overview of how VoIP technology and IP Faxing (Fax over IP) are changing the way organizations utilize existing network infrastructures for voice
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
Xerox Phaser 3610 Black-and-white Printer
Black-and-white Printer Output Speed Automatic Two-sided Paper Handling Input Multipurpose Tray Tray 1 Phaser 3610N Up to 47 ppm 8.5 x 11 in. Up to 45 ppm A4 / 210 x 297 mm Up to 38 ppm 8.5 x 14 in. /
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
ONE INTEGRATED PLATFORM FOR ALL YOUR PRINT, SCAN AND DEVICE MANAGEMENT. uniflow canon.com.au/business
ONE INTEGRATED PLATFORM FOR ALL YOUR PRINT, SCAN AND DEVICE MANAGEMENT uniflow canon.com.au/business INTEGRATED, PRODUCTIVE CONTROL OF PRINTING, COPYING SCANNING, AND FAXING uniflow is an integrated print
A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
WF-R5690 User's Guide
WF-R5690 User's Guide Contents WF-R5690 User's Guide... 15 Product Basics... 16 Using the Control Panel... 16 Control Panel Buttons and Lights... 17 Status Icon Information... 18 Status Button Information...
Vantage Report. User s Guide. www.zyxel.com. Version 3.0 10/2006 Edition 1
Vantage Report User s Guide Version 3.0 10/2006 Edition 1 www.zyxel.com About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the Vantage
Copyright Telerad Tech 2009. RADSpa. HIPAA Compliance
RADSpa HIPAA Compliance 1. Introduction 3 1.1. Scope and Field of Application 3 1.2. HIPAA 3 2. Security Architecture 4 2.1 Authentication 4 2.2 Authorization 4 2.3 Confidentiality 4 2.3.1 Secure Communication
Installation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
KM Embedded. Configuration Guide. AIT Ltd 2 Hawthorn Park Coal Road Leeds LS14 1PQ UK
KM Embedded Configuration Guide AIT Ltd 2 Hawthorn Park Coal Road Leeds LS14 1PQ UK T: 0113 2730300 F: 0113 2730302 E: [email protected] W: www.altman.co.uk Table of Contents Table of Contents... 2 Requirements...
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
WorkCentre 4260 Black-and-White Multifunction Printer
WorkCentre 4260 Black-and-White Multifunction Printer WorkCentre 4260S A powerful multifunction device with automatic two-sided copy/print/scan, 600-sheet input capacity and Color Scan to Email, Scan to
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
One platform for all your print, scan and device management
One platform for all your print, scan and device management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in
Understanding IP Faxing (Fax over IP)
A RICOH COMPANY Understanding IP Faxing (Fax over IP) A detailed technical overview of how VoIP technology and IP Faxing (Fax over IP) are changing the way organizations utilize existing network infrastructures
