Lexmark X792 Common Criteria Installation Supplement and Administrator Guide - Page 54

Index - reset password

Page 54 highlights

Index A access controls list of 47 setting at the device 12 using the EWS to set 34 acronyms 46 AppleTalk disabling 18 assumptions 6 audit logging configuring 20 authentication token 30 B backup password using the touch screen to enable 9 before configuring the device verifying firmware 6 verifying physical interfaces 6 C certificates creating and modifying 15 Common Access Cards how to use 50 controlling access to device functions using the EWS 34 using the touch screen 12 D date and time setting 19 digital certificates creating and modifying 15 disk encryption 7 disk wiping configuring at the device 9 E E-mail configuring 22 Embedded Web Server using 15 encrypting network data 17 encrypting the hard disk 7 encryption IPSec 17 environment operating 6 EWS using 15 F fax forwarding 24 fax settings Driver to fax 24 fax forwarding 24 held faxes 24 fax storage 24 firmware verifying 6 function access using the EWS to restrict 34 using the touch screen to restrict 12 function access controls list of 47 H held faxes 24 home screen 44 home screen icons disabling 14 I interfaces verifying 6 internal accounts using the EWS to create 25 using the touch screen to create 10 IPSec setting up 17 K Kerberos configuring 19 importing a krb5.conf file 19 simple setup 19 keyboard using the 44 54 krb5.conf file importing 19 L LDAP+GSSAPI configuring 27 logging configuring the security audit log 20 N network protocols allowed 18 network settings finding 15 network setup page printing 15 Network Time Protocol configuring 19 notices 2 NTP configuring 19 O objectives 6 operating environment 6 P physical interfaces verifying 6 physical security attaching a lock 7 PKI Authentication configuring 30 PKI Held Jobs configuring 33 port access shutting down 18 pre‑configuration tasks verifying firmware 6 verifying physical interfaces 6 S security reset jumper on motherboard 25 security audit log 20

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56

Index
A
access controls
list of
47
setting at the device
12
using the EWS to set
34
acronyms
46
AppleTalk
disabling
18
assumptions
6
audit logging
configuring
20
authentication token
30
B
backup password
using the touch screen to
enable
9
before configuring the device
verifying firmware
6
verifying physical interfaces
6
C
certificates
creating and modifying
15
Common Access Cards
how to use
50
controlling access to device
functions
using the EWS
34
using the touch screen
12
D
date and time
setting
19
digital certificates
creating and modifying
15
disk encryption
7
disk wiping
configuring at the device
9
E
E-mail
configuring
22
Embedded Web Server
using
15
encrypting network data
17
encrypting the hard disk
7
encryption
IPSec
17
environment
operating
6
EWS
using
15
F
fax forwarding
24
fax settings
Driver to fax
24
fax forwarding
24
held faxes
24
fax storage
24
firmware
verifying
6
function access
using the EWS to restrict
34
using the touch screen to
restrict
12
function access controls
list of
47
H
held faxes
24
home screen
44
home screen icons
disabling
14
I
interfaces
verifying
6
internal accounts
using the EWS to create
25
using the touch screen to
create
10
IPSec
setting up
17
K
Kerberos
configuring
19
importing a krb5.conf file
19
simple setup
19
keyboard
using the
44
krb5.conf file
importing
19
L
LDAP+GSSAPI
configuring
27
logging
configuring the security audit
log
20
N
network protocols
allowed
18
network settings
finding
15
network setup page
printing
15
Network Time Protocol
configuring
19
notices
2
NTP
configuring
19
O
objectives
6
operating environment
6
P
physical interfaces
verifying
6
physical security
attaching a lock
7
PKI Authentication
configuring
30
PKI Held Jobs
configuring
33
port access
shutting down
18
pre
configuration tasks
verifying firmware
6
verifying physical interfaces
6
S
security
reset jumper on motherboard
25
security audit log
20
54