HP Security Solutions FAQ

<p><a href="http://www.officeproductnews.net/files/hp_secsolutions.pdf"><img title="2010-01-05_162214" style="border-right: 0px; border-top: 0px; display: inline; margin: 0px 10px 10px 0px; border-left: 0px; border-bottom: 0px" height="239" alt="2010-01-05_162214" src="http://www.officeproductnews.net/files/20100105_162214_0.gif" width="190" align="left" border="0" /></a> The U.S. National Institute of Standards and Technology has instituted a security checklist program. Checklists can be developed not only by IT vendors, but also by consortia,&#160; cademia, industry, federal agencies and other governmental organizations, as well as other entities in the public and private sectors. A security configuration checklist (sometimes referred to as a lockdown guide, hardening guide or benchmark configuration) is essentially a document that contains instructions or procedures for configuring an IT product to a baseline level of security. Many technology devices have approved security checklists. However, HP is the first printer/MFP manufacturer to have a security checklist approved and published by NIST. Unlike other certifications, which often certify only certain features, the checklist program locks down or secures the entire MFP solution.</p> <p>HP considers security checklists as a means to significantly improve the security capabilities' ease of configuration for imaging and printing products. HP submitted a security checklist for the HP LaserJet 4345 and 4370 printers in September 2006. At the time of submission, HP was the only hardcopy manufacturer to submit a checklist for review. HP plans to develop additional checklists for hardcopy devices in the future. <br />A checklist might include any of the following: <br />• Configuration files that automatically set various security settings (e.g., executables, security templates that modify settings, scripts) <br />• Documentation (e.g., text file) that guides the checklist user to manually configure software <br />• Documents that explain the recommended methods to securely install and configure a device <br />• Policy documents that set forth guidelines for such things as auditing, authentication security (e.g., passwords), and perimeter security</p> <!--break--> <div class="wlWriterEditableSmartContent" id="scid:8eb9d37f-1541-4f29-b6f4-1eea890d4876:2e2cfc33-b8d9-4484-9d36-909d0e207ac2" style="padding-right: 0px; display: inline; padding-left: 0px; float: none; padding-bottom: 0px; margin: 0px; padding-top: 0px"><p><div>Download Full Whitepaper: <a href="http://www.officeproductnews.net/files/hp_secsolutions_0.pdf" target="_self">HP Security Solutions FAQ</a></div></p></div>