HP JetAdvantage Security Manager 10 Device E-LTU Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Nein HP JetAdvantage Security Manager 10 Device E-LTU herunter. HP JetAdvantage Security Manager User Guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - User Guide

HP JetAdvantage Security ManagerUser Guide

Seite 2

Common controls and noticationsThis section provides the controls and notications consistent across all pages in Security Manager.●Common controls i

Seite 3 - Table of contents

What you must provideThe following are the basic requirements to use Security Manager:●A supported Microsoft Windows computer.The following Microsoft

Seite 4

8 Chapter 2 Getting started with Security Manager ENWW

Seite 5 - 1 Introduction

3 Set up Security ManagerUse the instructions in this section to set up the Security Manager settings.Congure the Security Manager settings:1.Log int

Seite 6

Verify device remediation and hostname resolutionHP recommends to verify the global remediation setting that controls whether an out-of-compliance dev

Seite 7

Install licensesLicenses are provided using a license le. Install a Security Manager device license to assess and remediate the devices on the networ

Seite 8

●Security Manager tried to install the same license le.●Security Manager tried to install a corrupted or invalid license le.12 Chapter 3 Set up Se

Seite 9

Set up Instant On SecurityHP Enterprise printers running the latest rmware version use the Instant-On Security and the HP Device Announcement Agent f

Seite 10

4. Select the Accept Device Announcements check box, and then click OK in the conrmation dialog box to enable communication with port 3329.5. Select

Seite 11 - What you must provide

8. Select a policy from the Initial Assessment Policy drop down box to ensure new devices are compatible with the requirement.The valid policies are s

Seite 12

© Copyright 2017 HP Development Company, L.P.Reproduction, adaptation, or translation without prior written permission is prohibited, except as allowe

Seite 13 - 3 Set up Security Manager

Congure the email server settingsUse the Automated Output setting option to congure the email server to authenticate and send email notications whe

Seite 14

Set up global credentialsGlobal credentials are used as part of the device verication process when performing tasks which include device discovery, v

Seite 15 - Install licenses

18 Chapter 3 Set up Security Manager ENWW

Seite 16

4 Use Security ManagerThis section discusses how to add and edit device information, create a policy, assess and remediate, and run reports.To view th

Seite 17 - Set up Instant On Security

Create a security policyUse the Policies page to create, edit, and import a policy. Select a policy or policies to congure the settings using the Pol

Seite 18

1. Log into Security Manager, and then select the Policies tab.2.Hover on the left navigation pane, and then select the New Policy icon ( ).3. Comple

Seite 19

●Set severity, remediation, and unsupported behavior to policy items in Quick SettingsPolicy editor iconsThe following lists the icons used in the pol

Seite 20

–Enable: Security Manager changes out-of-compliance items on the device to match the policy's setting.–Disable: Security Manager reports out-of-c

Seite 21 - Set up global credentials

NOTE: For invalid policy settings, the policy items will display in red font.An error panel will display below the policy item panel name and will inc

Seite 22

Import a policy1. Log into Security Manager, and then select the Policies tab.2.Hover on the left navigation pane, and then click the Import Policies

Seite 23 - 4 Use Security Manager

Table of contents1 Introduction ...

Seite 24 - Create a security policy

Add and edit device informationSecurity Manager enables you to add devices using any of the following features:●Discover Devices in the Devices page.F

Seite 25 - Edit a policy

The Groups section displays the device group names in a hierarchical order.For more information about editing groups, see Manage GroupsDiscover device

Seite 26 - Policy editor icons

NOTE: Security Manager will use the credentials set in the Global Credentials when discovering devices.Follow these steps to manually discover and add

Seite 27

–New Task — Allows you to create, assess or assess and remediate, and schedule a task for a device group or multiple groups. A task cannot be created

Seite 28 - Export and Import policies

NOTE: For unsupported printers, Not Veried displays in the Supported column of the Device list panel. For a list of supported printers, see What you

Seite 29

1. Log into Security Manager, and then select the Devices tab.2.Hover on the left navigation pane, and then click the Manage Groups icon ( ).3. On th

Seite 30 - Create a group

Assign a license manuallyUse the Devices tab to manually assign licenses from the license pool to selected devices.NOTE: For more information about in

Seite 31 - Discover devices

a. On the SNMP Credentials section, complete the following tasks to set the SNMP credentials:i. To set the SNMP v1/ v2 Read Community Name, select the

Seite 32 - Devices page navigation

a. Make sure to select a device in the Device list panel.b. Select Yes to conrm the reset credential operation.-or-Select No to cancel the reset cred

Seite 33 - Export device addresses

Assess and remediateAfter devices are added and policies are created, view or create a task to run an assessment for a selected device group in the Ta

Seite 34 - Manage Groups

Devices page navigation ...

Seite 35

NOTE: This option is disabled when Security Manager uses a demo license.6. Select the Email Results check box when the task type selected is Assess an

Seite 36 - Set device credentials

–Type — Displays the task type initiated for a device group (Discovery, Verify, Assess Only, Assess and Remediate). A task cannot be created for an in

Seite 37

View results from the Devices pageFollow these steps to view results from the Devices page:1. Log into Security Manager, and then select the Devices t

Seite 38 - Set SSL/TLS enforcement

Run reportsReports provide administrators detailed information and compliance of each devices.The following reports are available:●Executive SummaryRe

Seite 39 - Assess and remediate

40 Chapter 4 Use Security Manager ENWW

Seite 40 - Task page navigation

A Use the Security Manager certicate management solutionFor Security Manager to submit successful certicate signing requests to the chosen certicat

Seite 41 - View assessment results

42 Appendix A Use the Security Manager certicate management solution ENWW

Seite 42

B Network port assignmentsThis section lists the ports that Security Manager uses.Table B-1 Ports used from the Security Manager service to the print

Seite 43 - Run reports

Table B-4 Port used from the device to the Security Manager serviceService Port IP Protocol NotesHP Instant-On Security or hp-device-disc (IANA name)

Seite 44

C Legal statementsThis section contains the legal statements.●End User License Agreement●CopyrightsENWW 45

Seite 45

1 IntroductionHP JetAdvantage Security Manager (Security Manager) is a security compliance solution for a eet of HP products. It enables administrato

Seite 46

End User License AgreementREAD CAREFULLY BEFORE USING THIS SOFTWARE EQUIPMENT: This End-User license Agreement ("EULA") is a legal agreement

Seite 47 - B Network port assignments

any Microsoft operating system software contained in such recovery solution shall be governed by the Microsoft License Agreement.2. UPGRADES. To use a

Seite 48

To the extent permitted by applicable law, by accepting these terms and conditions you consent to the collection and use of anonymous and personal dat

Seite 49 - C Legal statements

13. CAPACITY AND AUTHORITY TO CONTRACT. You represent that you are of the legal age of majority in your state of residence and, if applicable, you are

Seite 50 - End User License Agreement

CopyrightsThis product includes software developed by the following.●log4net license●nhibernate licenselog4net licenseThe log4net license is subject t

Seite 51

the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contributi

Seite 52

6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as r

Seite 53

service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free pro

Seite 54 - Copyrights

The precise terms and conditions for copying, distribution and modication follow. Pay close attention to the dierence between a "work based on

Seite 55

supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.(For example, a function in a

Seite 56

2 Chapter 1 Introduction ENWW

Seite 57

If such an object le uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or

Seite 58

a. Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distri

Seite 59

conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version

Seite 60

2 Getting started with Security ManagerSecurity Manager version 3.0 is a web-based application supported by the following browsers:●Internet Explorer

Seite 61

The Dashboard page is the default page that displays after a successful login. It provides a graphical overview of the device eet which includes the

Seite 62

–Settings: Allows you to congure global settings.–About HPSM: Displays a graphical overview of the software.–Help: Provides information and instructi

Kommentare zu diesen Handbüchern

Keine Kommentare