P REPARING FOR F IERY EXP4110 S ETUP 18Control level examplesThe following table shows how print connections, passwords, and WebTool access are usedtogether to create varying levels of security. The columns between Minimum Security andMaximum Security represent increasing levels of security.E-mail viruses and E-mail printingBecause you can allow users to print file attachments in e-mail messages sent to theFiery EXP4110, the Fiery EXP4110 accepts only valid attachments (for example, PostScriptor PDF files). Typically, viruses transmitted via e-mail require execution by the receiver.Attachments that are not valid files are discarded by the Fiery EXP4110. Because file typessuch as .BAT, .VBS, and .EXE could launch harmful virus activity, the Fiery EXP4110 doesnot process these file types. The Fiery EXP4110 also ignores e-mails in RTF (Rich TextFormat) or HTML (Hypertext Markup Language) format, and any included JavaScript code.You can define a list of authorized e-mail addresses on the Fiery EXP4110. Any e-mail thatthe Fiery EXP4110 receives from an e-mail address not in the authorized list is deleted.For more information, see page 88.IP address filtering and port filteringTo restrict unauthorized connections to the Fiery EXP4110, you can permit only users whoseIP addresses are within a defined range. Commands or jobs sent from unauthorized IPaddresses are ignored by the Fiery EXP4110.Secure PrintingThis option allows the printing of highly sensitive or confidential files. A user printing a filewith the printer driver assigns a password to the job. The user must then enter the password atthe Fiery EXP4110 to print the job. For more information, see Print Options.Settings usedin ConfigureMinimumSecurityMaximumSecurityEnable Direct connection √ √ √Enable Print queue √ √ √ √Enable Web Services √ √ √Set an Administrator Password(strongly recommended )√ √ √ √Set an Operator password √ √ √