HP LaserJet M5000 LaserJet MFP - Imaging and Printing Security Best Practices - Page 2

Table of Contents, Introduction, Threat Model

Page 2 highlights

Table of Contents Table of Contents ...i Chapter 1: Introduction 1 Cautions...2 Follow the Checklist in Order 2 Understand the Ramifications 2 Continue to be Vigilant 2 MFP Environment ...3 Assumptions ...3 Solutions covered ...4 Organization ...4 Chapter 2: Threat Model 5 Spoofing Identity ...5 Tampering with Data...6 Repudiation ...6 Information Disclosure ...7 Denial of Service ...7 Elevation of Privilege ...8 Chapter 3: Basic Security for Multiple MFPs 9 Notes on the Process of Configuration 9 Using Web Jetadmin and MFP Passwords 9 Getting started configuring MFP Security Settings 11 Setting up HP Web Jetadmin 11 Configuring HP Secure Hard Disk 13 Configuring SNMPv3 16 Configuring MFP Device Settings 22 I/O Timeout to End Print Job 22 Job Hold Timeout ...22 Job Retention...23 Apply the Changes 23 Configuring MFP Network Settings 25 Enable Features ...25 Encrypt all Web Communication 29 Encryption Strength 30 Error Handling ...31 IPX RCFG Support ...31 Job Timeout...32 Privacy Setting...32 Protocol Stacks ...33 Web Services Print...35 Apply your Changes 36 Configuring MFP Security Settings 37 Bootloader Password 37 Color Access Control 38 Control Panel Access 38 Embedded Web Password 39 PJL Password ...40 HP LaserJet and Color LaserJet MFP Security Checklist i

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93

Table of Contents
Table of Contents
......................................................................................................
i
Chapter 1: Introduction
.............................................................................................
1
Cautions
........................................................................................................................
2
Follow the Checklist in Order
........................................................................................
2
Understand the Ramifications
........................................................................................
2
Continue to be Vigilant
................................................................................................
2
MFP Environment
............................................................................................................
3
Assumptions
...................................................................................................................
3
Solutions covered
...........................................................................................................
4
Organization
.................................................................................................................
4
Chapter 2: Threat Model
..........................................................................................
5
Spoofing Identity
............................................................................................................
5
Tampering with Data
.......................................................................................................
6
Repudiation
...................................................................................................................
6
Information Disclosure
.....................................................................................................
7
Denial of Service
............................................................................................................
7
Elevation of Privilege
.......................................................................................................
8
Chapter 3: Basic Security for Multiple MFPs
................................................................
9
Notes on the Process of Configuration
...............................................................................
9
Using Web Jetadmin and MFP Passwords
......................................................................
9
Getting started configuring MFP Security Settings
..............................................................
11
Setting up HP Web Jetadmin
......................................................................................
11
Configuring HP Secure Hard Disk
...............................................................................
13
Configuring SNMPv3
................................................................................................
16
Configuring MFP Device Settings
....................................................................................
22
I/O Timeout to End Print Job
.......................................................................................
22
Job Hold Timeout
......................................................................................................
22
Job Retention
............................................................................................................
23
Apply the Changes
...................................................................................................
23
Configuring MFP Network Settings
..................................................................................
25
Enable Features
........................................................................................................
25
Encrypt all Web Communication
.................................................................................
29
Encryption Strength
...................................................................................................
30
Error Handling
.........................................................................................................
31
IPX RCFG Support
.....................................................................................................
31
Job Timeout
..............................................................................................................
32
Privacy Setting
..........................................................................................................
32
Protocol Stacks
.........................................................................................................
33
Web Services Print
....................................................................................................
35
Apply your Changes
.................................................................................................
36
Configuring MFP Security Settings
...................................................................................
37
Bootloader Password
.................................................................................................
37
Color Access Control
.................................................................................................
38
Control Panel Access
.................................................................................................
38
Embedded Web Password
.........................................................................................
39
PJL Password
............................................................................................................
40
HP LaserJet and Color LaserJet MFP Security Checklist
i