Xerox ® WorkCentre® 4265 Multifunction Printer 49System Administrator GuideThis chapter includes:• Setting Access Rights.......................................................................................................................................................... 50• Configuring Authentication Settings........................................................................................................................... 52• About User Permissions ..................................................................................................................................................... 58• Enabling Xerox ® Standard Accounting ....................................................................................................................... 59• Configuring the Log Out Confirmation Screen ....................................................................................................... 60• Secure HTTP (SSL)................................................................................................................................................................ 61• FIPS 140-2............................................................................................................................................................................... 62• IP Filtering ............................................................................................................................................................................... 63• Managing the Audit Log ................................................................................................................................................... 64• IPsec .......................................................................................................................................................................................... 65• 802.1X ....................................................................................................................................................................................... 66• System Timeout.................................................................................................................................................................... 68• Overwriting Image Data ................................................................................................................................................... 69• USB Port Security ................................................................................................................................................................. 71• Displaying or Hiding Network Settings ....................................................................................................................... 72• Security Certificates ............................................................................................................................................................ 73See also:www.xerox.com/security4Security