Home > Xerox > All in One Printer > Xerox WorkCentre 5755 Manual

Xerox WorkCentre 5755 Manual

Here you can view all the pages of manual Xerox WorkCentre 5755 Manual. The Xerox manuals for All in One Printer are available online for free. You can easily download all the documents as PDF.

Page 171

Email Encryption and Signing
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide171
Email Encryption and Signing
Email Encryption and Signing allow users to ensure that Emails sent from the device are signed and/or 
encrypted.
Signed e-mails can be sent to any address the user specifies and encrypted email can be sent to any 
recipient with a valid security certificate. 
To enable and configure Email encryption
Note:To configure this feature or these settings access the Properties...

Page 172

FIPS 140-2 Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 172
FIPS 140-2 Encryption
The 140 series of Federal Information Processing Standards (FIPS) are U.S. government computer 
security standards that specify requirements for cryptography modules. Your device supports FIPS 140-
2 Level 1 only.
To Enable FIPS 140-2 Encryption
Note:To configure this feature or these settings access the Properties tab as a System 
Administrator. For details, refer to Access Internet...

Page 173

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide173
User Data Encryption
User Data Encryption ensures all data or job-sensitive data on the device’s hard drive is protected.
User Data Encryption is automatically enabled on the device and no further configuration is required 
by the administrator.
When enabled, the data on the hard drive will not be meaningful when the hard drive has been 
separated from the device it was originally installed on.
If the hard...

Page 174

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 174
3. Select [Setup] in the directory tree.
4. On the User Information Database page, click on the [Add New User] button. 
5. On the Add New User page, in the User Identification area:
a. Enter a login name that the user will enter to gain access to the device or the Internet 
Services in the [User Name] field.
Note:The login name is case-sensitive.
b. Enter a name that will be associated with the login name...

Page 175

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide175
3. Click on the [Properties] tab.
4. If prompted, enter details in the [User ID] and [Password] fields.
5. Click on the [Login] button.
6. From the Properties tab, click on the [User Information Database] link.
7. Select [Setup] in the directory tree.
8. On the Edit User page:
a. In the User Identification area, edit any relevant field.
Note:The [User Name] field is not editable.
b. In the [User Role] area,...

Page 176

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 176
IP Filtering
The IP Filtering security feature provides the ability to prevent unauthorized network access based on 
IP Address and/or port number filtering rules set by the System Administrator using Internet Services.
Authorized users will be able to create IP Address filtering rules.
Authorized users can enter a list of addresses that are allowed access to the device, and/or a list of 
addresses that are...

Page 177

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide177
e. Enter a number for the [Source IP Mask] to which this rule will apply. The allowable range of 
0 to 32 corresponds to the 32 bit binary number comprising IP Addresses. A number of 8, for 
example, represents a Class A address (mask of 255, 0, 0, 0). The number 16 represents a 
Class B address (mask of 255, 255, 0, 0). The number 24 represents a Class C address (mask 
of 255, 255, 255, 0).
3. Click on the...

Page 178

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 178
To  V i e w  t h e  A u d i t  L o g
Note:Copy jobs and Embedded Fax jobs are not recorded in the Audit Log. The completion status 
of both types of jobs can be checked by viewing the applicable Completed Job Log entries.
Note:For a LAN Fax job, the event in the Audit Log will be recorded under the title of “print/driver 
fa x ” .
Note:To record the user’s name in the Audit Log, Network Authentication must...

Page 179

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide179
•Embedded Fax jobs.
•Store Files jobs.
• Accounting information.
• Workflow Scanning jobs - one scan to file audit log entry is recorded for each network destination 
within the scan job. 
• Server Fax jobs - one audit log entry is recorded for each job. 
• E-mail jobs - one audit log entry is recorded for each SMTP recipient within the job.
Completion Status
The Completion Status column shows the status of...

Page 180

User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide 180
Other information it contains:
•State/Province Name
•Locality Name
•Organization Name
•Organization Unit
•E-mail Address
The device can be configured for secure access with the SSL (Secure Socket Layer) protocol via Digital 
Certificates. The enablement of SSL provides encryption for all workflows where the device is used as a 
HTTPS server. 
Workflows include:
•Administration of the device via Internet...
Start reading Xerox WorkCentre 5755 Manual

Related Manuals for Xerox WorkCentre 5755 Manual

All Xerox manuals