Xerox 6180N DocuSP Common Controller System Guide - Page 62
Roles and responsibilities
UPC - 095205425307
View all Xerox 6180N manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 62 highlights
Security and Network Setup Roles and responsibilities Xerox will make every effort to assist the administrator in ensuring that the customer environment is secure. Xerox responsibilities Xerox is committed to providing a level of security which will allow the DocuSP controller to be a good network citizen in response to current security intrusions. Additional security beyond this remains the responsibility of the customer.Xerox is constantly evaluating the security of the DocuSP controller and the Sun Solaris operating system. Xerox is committed to providing the latest Solaris security patches provided by Sun Microsystems in each major DocuSP release. The DocuSP development team will also add Solaris security patches in between major release cycles. All OS security patches for applications that are added during a DocuSP install will be included, even if the application code is not normally used by DocuSP users. Security patches for applications that are not loaded by a DocuSP install will not be evaluated or included. Only the version of a patch impacting security will be included. If a security patch has a newer version that is not security related, then this patch will not be updated to the newer version. Any security patch that is determined to have a negative impact to DocuSP operation will not be added. Customer responsibilities The administrator has the primary responsibility for maintaining the security of the network within the customers site. It is important that network security is continuously monitored and maintained, and that appropriate security policies are established and followed. The procedures outlined in this document assume a basic knowledge of UNIX, the vi editor, and general computing concepts. It is expected that the network administrator or system administrator responsible for network security understands the base commands (cd, chmod, cp, grep, kill, ln, ls, man, more, ps, etc.), and the UNIX directory path and filename structures shown in this document. There is information within the text and in the appendix sections for reference to those who may not use UNIX often. 3-12 System Guide