
Getting started with the HP Imaging and Printing Security
Center
Getting started with the HP IPSC typically involves the following tasks.
Review security policy
Use the Policies tab to create a security policy for your network. You can create a new blank policy
or use a template, which provides a policy based on industry standard recommendations.
After you create the policy, intelligent prompts guide you through the process of setting the items.
Advice and recommendations are provided as you configure the policy.
See
Create a security policy on page 16 for instructions.
Add devices
Using the Devices tab, you can add devices by importing a text or XML file that contains a list of
devices, or by manually entering device information. Use the Verify option in the Devices tab to
verify support for a device (or group of devices). Unsupported devices are indicated in the devices
panel.
If you selected the Accept Device Announcements check box in the Instant-On Security tab (click
File and then Settings), devices are automatically added.
See
Add and edit device information on page 21.
Assess devices
Use the policy you created to assess whether the devices comply with your security policy. You can
run an assessment from the Devices tab, the Policies tab, or the Tasks tab.
View the assessment results from the Devices tab, or by running a report from the Reports tab.
NOTE: You can set the HP IPSC to assess only or to assess and remmediate, depending on your
needs.
See Assess and remediate on page 27.
Remediate non-compliant devices
Use the policy you created to assess and remediate (correct) a group of devices. You can run an
assessment/remediation from the Devices tab, the Policies tab, or the Tasks tab.
View the assessment/remediation results from the Devices tab, or by running reports from the
Reports tab.
See
Assess and remediate on page 27.
Review risks and results
Review recommendations and device status using the Executive Summary report. Use the Device
and Policy Item View reports to view fleet recommendations and assessed and unassessed devices,
and to list your policies.
See
Run reports on page 30 for information.
2 Chapter 1 Introduction ENWW
Kommentare zu diesen Handbüchern