Xerox WorkCentre 5740 User Manual
Here you can view all the pages of manual Xerox WorkCentre 5740 User Manual. The Xerox manuals for Printer are available online for free. You can easily download all the documents as PDF.
Page 171
Email Encryption and Signing WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide171 Email Encryption and Signing Email Encryption and Signing allow users to ensure that Emails sent from the device are signed and/or encrypted. Signed e-mails can be sent to any address the user specifies and encrypted email can be sent to any recipient with a valid security certificate. To enable and configure Email encryption Note:To configure this feature or these settings access the Properties...
Page 172
FIPS 140-2 Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide 172 FIPS 140-2 Encryption The 140 series of Federal Information Processing Standards (FIPS) are U.S. government computer security standards that specify requirements for cryptography modules. Your device supports FIPS 140- 2 Level 1 only. To Enable FIPS 140-2 Encryption Note:To configure this feature or these settings access the Properties tab as a System Administrator. For details, refer to Access Internet...
Page 173
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide173 User Data Encryption User Data Encryption ensures all data or job-sensitive data on the device’s hard drive is protected. User Data Encryption is automatically enabled on the device and no further configuration is required by the administrator. When enabled, the data on the hard drive will not be meaningful when the hard drive has been separated from the device it was originally installed on. If the hard...
Page 174
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide 174 3. Select [Setup] in the directory tree. 4. On the User Information Database page, click on the [Add New User] button. 5. On the Add New User page, in the User Identification area: a. Enter a login name that the user will enter to gain access to the device or the Internet Services in the [User Name] field. Note:The login name is case-sensitive. b. Enter a name that will be associated with the login name...
Page 175
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide175 3. Click on the [Properties] tab. 4. If prompted, enter details in the [User ID] and [Password] fields. 5. Click on the [Login] button. 6. From the Properties tab, click on the [User Information Database] link. 7. Select [Setup] in the directory tree. 8. On the Edit User page: a. In the User Identification area, edit any relevant field. Note:The [User Name] field is not editable. b. In the [User Role] area,...
Page 176
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide 176 IP Filtering The IP Filtering security feature provides the ability to prevent unauthorized network access based on IP Address and/or port number filtering rules set by the System Administrator using Internet Services. Authorized users will be able to create IP Address filtering rules. Authorized users can enter a list of addresses that are allowed access to the device, and/or a list of addresses that are...
Page 177
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide177 e. Enter a number for the [Source IP Mask] to which this rule will apply. The allowable range of 0 to 32 corresponds to the 32 bit binary number comprising IP Addresses. A number of 8, for example, represents a Class A address (mask of 255, 0, 0, 0). The number 16 represents a Class B address (mask of 255, 255, 0, 0). The number 24 represents a Class C address (mask of 255, 255, 255, 0). 3. Click on the...
Page 178
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide 178 To V i e w t h e A u d i t L o g Note:Copy jobs and Embedded Fax jobs are not recorded in the Audit Log. The completion status of both types of jobs can be checked by viewing the applicable Completed Job Log entries. Note:For a LAN Fax job, the event in the Audit Log will be recorded under the title of “print/driver fa x ” . Note:To record the user’s name in the Audit Log, Network Authentication must...
Page 179
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide179 •Embedded Fax jobs. •Store Files jobs. • Accounting information. • Workflow Scanning jobs - one scan to file audit log entry is recorded for each network destination within the scan job. • Server Fax jobs - one audit log entry is recorded for each job. • E-mail jobs - one audit log entry is recorded for each SMTP recipient within the job. Completion Status The Completion Status column shows the status of...
Page 180
User Data Encryption WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide 180 Other information it contains: •State/Province Name •Locality Name •Organization Name •Organization Unit •E-mail Address The device can be configured for secure access with the SSL (Secure Socket Layer) protocol via Digital Certificates. The enablement of SSL provides encryption for all workflows where the device is used as a HTTPS server. Workflows include: •Administration of the device via Internet...