Lexmark X792de Manual Do Utilizador
Contents
Using this guide...................................................................................................................................................5
Supported devices ..............................................................................................................................................5
Operating environment ...................................................................................................................................... 6
Supported devices ..............................................................................................................................................5
Operating environment ...................................................................................................................................... 6
Verifying physical interfaces and installed firmware..........................................................................................6
Attaching a lock .................................................................................................................................................. 7
Encrypting the hard disk .....................................................................................................................................7
Disabling the USB buffer .....................................................................................................................................8
Attaching a lock .................................................................................................................................................. 7
Encrypting the hard disk .....................................................................................................................................7
Disabling the USB buffer .....................................................................................................................................8
Configuration checklist .......................................................................................................................................9
Configuring disk wiping.......................................................................................................................................9
Enabling the backup password (optional) .......................................................................................................... 9
Creating user accounts .....................................................................................................................................10
Creating security templates..............................................................................................................................11
Controlling access to device functions..............................................................................................................12
Disabling home screen icons ............................................................................................................................14
Configuring disk wiping.......................................................................................................................................9
Enabling the backup password (optional) .......................................................................................................... 9
Creating user accounts .....................................................................................................................................10
Creating security templates..............................................................................................................................11
Controlling access to device functions..............................................................................................................12
Disabling home screen icons ............................................................................................................................14
Creating and modifying digital certificates .......................................................................................................15
Setting up IPSec ................................................................................................................................................17
Disabling the AppleTalk protocol......................................................................................................................18
Shutting down port access................................................................................................................................18
Setting up IPSec ................................................................................................................................................17
Disabling the AppleTalk protocol......................................................................................................................18
Shutting down port access................................................................................................................................18
Network Time Protocol.....................................................................................................................................19
Kerberos............................................................................................................................................................19
Security audit logging .......................................................................................................................................20
E-mail ................................................................................................................................................................22
Fax.....................................................................................................................................................................24
Configuring security reset jumper behavior .....................................................................................................25
Kerberos............................................................................................................................................................19
Security audit logging .......................................................................................................................................20
E-mail ................................................................................................................................................................22
Fax.....................................................................................................................................................................24
Configuring security reset jumper behavior .....................................................................................................25
Creating user accounts through the EWS .........................................................................................................25
Configuring LDAP+GSSAPI.................................................................................................................................27
Configuring Common Access Card access.........................................................................................................30
Configuring LDAP+GSSAPI.................................................................................................................................27
Configuring Common Access Card access.........................................................................................................30
3