
Contents
6 Xerox®WorkCentre®7800/7800i Series Color Multifunction Printer
System Administrator Guide
Arranging the Execution Order of IP Filter Rules ....................................................................................100
Audit Log........................................................................................................................................................................101
Enabling Audit Log .............................................................................................................................................101
Enabling Automatic Log Transfer.................................................................................................................101
Enabling Protocol Logs......................................................................................................................................102
Saving an Audit Log...........................................................................................................................................102
Saving an Audit Log to a USB Flash Drive.................................................................................................102
Interpreting the Audit Log...............................................................................................................................103
Installation Policies....................................................................................................................................................104
McAfee Embedded Control.....................................................................................................................................105
Setting the Security Level ................................................................................................................................106
Setting the Alert Options .................................................................................................................................107
IPsec.................................................................................................................................................................................108
Enabling IPsec......................................................................................................................................................108
Managing Actions...............................................................................................................................................109
Managing Protocol Groups .............................................................................................................................109
Creating a New Action......................................................................................................................................110
Editing or Deleting an Action .........................................................................................................................111
Managing Host Groups.....................................................................................................................................112
Managing Security Policies .............................................................................................................................112
Security Certificates...................................................................................................................................................113
Installing Certificates ........................................................................................................................................114
Creating and Installing a Xerox®Device Certificate .............................................................................115
Installing the Generic Xerox®Trusted CA Certificate ...........................................................................115
Creating a Certificate Signing Request ......................................................................................................116
Installing Root Certificates..............................................................................................................................117
Installing Domain Controller Certificates..................................................................................................118
Viewing, Saving, or Deleting a Certificate.................................................................................................118
Specifying the Minimum Certificate Key Length....................................................................................119
802.1X.............................................................................................................................................................................120
Enabling and Configuring 802.1X in Xerox®CentreWare®Internet Services .............................121
System Timeout ..........................................................................................................................................................123
Setting System Timeout Values ....................................................................................................................123
Overwriting Image Data ..........................................................................................................................................124
Manually Deleting Image Data.....................................................................................................................125
Scheduling Routine Deletion of Image Data ...........................................................................................126
Immediate Job Overwrite................................................................................................................................127
PostScript Passwords .................................................................................................................................................128
Enabling or Creating PostScript Passwords...............................................................................................128
USB Port Security........................................................................................................................................................129
Enabling or Disabling USB Ports....................................................................................................................129
Displaying or Hiding Network Settings...............................................................................................................130
Hiding User Names on the Control Panel..........................................................................................................131
Verifying the Software..............................................................................................................................................132
Restricting Print File Software Updates..............................................................................................................133
Specifying Email and Internet Fax Recipient Restrictions...........................................................................134