HP Imaging and Printing Security Center White Paper Page 4

  • Download
  • Add to my manuals
  • Print
  • Page
    / 9
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 3
4
Q. Should I export my policies?
A. You might export policies for the following reasons:
To back them up for possible restoration later
To use for importing into another IPSC server in your corporation
Q. How is my policy information safeguarded when I export the policy?
A. Policies are encrypted when exported. A prompt for a passphrase occurs during the policy export
process. This passphrase is required when importing the encrypted policy into IPSC.
Q. How can I easily locate policy configuration settings while accessing the policy
editor?
A. From the policy editor, you can use the Enter Search String field for a keyword search. For
example, a search for Apple displays the Apple Bonjour and Appletalk setting links. Also use this
field to quickly view related technologies for a setting of interest. For example, a search for Fax
displays Digital Send, Fax PIN, Fax Speed Dial Lock, Send to Fax and User Authentication. You
can also browse categories for specific configuration settings. For example, selecting the Printing
category presents the Port 9100, LPD, IPP, WS-Print, FTP, Appletalk, DLC and IPX/SPX printing
protocol settings.
Q. Why does a warning icon appear next to one of my policy setting categories
after successful validation?
A. A policy can be reviewed and saved as valid with pending policy suggestions. Although not
recommended, you can ignore the policy suggestions. For example, if you enable a file system
access protocol without enabling the check for a file system access password, this policy is valid,
but contains a warning icon next to the policy setting category.
Q. What is the most common reason multiple security policies may be required for
my environment?
A. Additional policies are usually required because of variations in the security settings per group of
devices. For example, Customer XYZ has grouped their fleet in IPSC by Region A and Region B.
Region A would like to implement device credentials that differ from Region B. The
recommendation would be to create a Region A and Region B policy that would apply to the
respective groups. These policies would be identical, except for the differences in the device
credential settings.
DEVICES
Q. At what point in the add devices process is my device actually added to the
database?
Page view 3
1 2 3 4 5 6 7 8 9

Comments to this Manuals

No comments