A security policy is a collection of rules that define the basic information security objectives and standards for an entire organization. All of the settings related to your security policy can be configured together as a group on the machine. The examples shown below describe various security policy setting combinations that can be used for different security objectives.
Preventing information leakage
To prevent information leakage by strengthening the settings related to how data is handled, add a check mark to the items below.
[Job]
[Printing Policy]
[Prohibit Immediate Printing of Received Jobs]
[Storage]
[Force Complete Deletion of Data]
[Interface]
[USB Policy]
[Prohibit Use as USB Device]
[Interface]
[USB Policy]
[Prohibit Use as USB Storage Device]
[Job]
[Sending/Receiving Policy]
[Allow Sending Only to Registered Addresses]
[Job]
[Sending/Receiving Policy]
[Force Confirmation of Fax Number]
[Job]
[Sending/Receiving Policy]
[Prohibit Auto Forwarding]
Strengthening the authentication functions
To prevent user impersonation by strengthening the password and lockout settings, add a check mark to the items below.
[Authentication]
[Password Operational Policy]
[Display Warning When Default Password Is in Use]
[Authentication]
[Password Operational Policy]
[Prohibit Use of Default Password for Remote Access]
[Authentication]
[Password Settings Policy]
[Set minimum number of characters for password] and other items
[Authentication]
[Lockout Policy]
[Enable Lockout]
Increasing the security of communication
To ensure secure communication by verifying certificates and strengthening encryption, which can prevent data from being sniffed or intercepted during network communication, add a check mark to the items below.
[Network]
[Communication Operational Policy]
[Always Verify Signatures for SMS/WebDAV Server Functions] and other items
[Key/Certificate]
[Prohibit Use of Weak Encryption]
Closing network ports to prevent unauthorized access
To manage multiple port-related settings and efficiently configure each port individually, add a check mark to the items below.
[Network]
[Port Usage Policy]
[Restrict LPD Port (Port Number: 515)] / [Restrict RAW Port (Port Number: 9100)] and other port settings (14 total)
Strengthening user management
To prevent unrecognized users from operating the machine, and to monitor the security by retrieving and checking the audit logs, add a check mark to the items below.
[Authentication]
[Authentication Operational Policy]
[Prohibit Guest Users to Use Device]
[Log]
[Force Recording of Audit Log]
[Log]
[Force SNTP Settings]