Modern Canon Multifunction Devices (MFDs) provide print, copy, scan, send and fax functionality.
MFDs are computer servers in their own right, providing a number of networked services along
with significant hard drive storage.
When an organisation introduces these devices into their infrastructure, there are a number
of areas that should be addressed as part of the wider security strategy, which should look to
protect the confidentiality, integrity and availability of your networked systems.
Clearly, deployments will differ and organisations will have their own specific security
requirements. While we work together to ensure that Canon devices are shipped with appropriate
initial security settings, we aim to further support this by providing a number of configuration
settings to enable you to more closely align the device to the requirements of your specific
situation.
This document is designed to provide sufficient information to enable you to discuss with Canon
or Canon partner the most appropriate settings for your environment. It should be noted that not
all device hardware has the same level of capability and different system software may provide
different functionality. Once decided, the final configuration can be applied to your device or fleet.
Please feel free to contact Canon or a Canon partner for further information and support.
Canon imageRUNNER ADVANCE Hardening Guide
2
Page 3
Who is this document meant for?
This document is aimed at anybody who is
concerned with the design, implementation and
securing of office multifunction devices (MFDs)
within a network infrastructure. This might
include IT and network specialists, IT security
professionals, and service personnel.
Scope and coverage
The guide explains and advises on the
configuration settings for two typical network
environments, so that organisations can
securely implement an MFD solution based
on best practice. It also explains (from system
software platform version 3.8) how Syslog
functionality can provide real-time feedback
from the MFD. These settings have been tested
and validated by Canon’s Security team.
We make no assumptions about specific
industry sector regulatory requirements that
may impose other security considerations and
are out of scope of this document.
This guide was created based upon the typical
feature set of the imageRUNNER ADVANCE
platform, and while the information here
applies to all models and series within the
imageRUNNER ADVANCE range, some features
may differ between models.
Implementing appropriate MFD security for
your environment
To explore the security implications of
implementing a multifunction device as part of
your network, we have considered two typical
scenarios:
• A typical small office environment
• An enterprise office environment
Canon imageRUNNER ADVANCE Hardening Guide
3
Page 4
SMALL OFFICE ENVIRONMENT
Typically, this will be a small business environment with an un-segmented network topology.
It uses one or two MFDs for its internal use and these devices are not accessible on the Internet.
While mobile printing is available, additional solution components will be required. For those users
requiring printer services outside of a LAN environment, a secure connection is required, but this
will not be covered in this guide. However, attention should be paid to the security of the data in
transit between the remote device and the print infrastructure.
Figure 1 Small Office Network
Canon
e-Maintenance
Canon Remote
Services
www
Internet
Mobile device:
External user
Client PC
Fax
PSTN
Firewall
DIRECT
Wireless
Access
Point
File server
Mobile device:
Internal user
Multi-functional
device
Mobile device: User
connected directly
to device
The latest generation of imageRUNNER ADVANCE models provide wireless network
connectivity allowing the device to connect to a WiFi network. It can also be used to establish
a point-to-point WiFi Direct connection with a mobile device without the need for a network
connection.
Bluetooth and NFC options are available for several device models and are used to establish
the WiFi Direct connection for iOS and Android devices respectively only.
Canon imageRUNNER ADVANCE Hardening Guide
4
Page 5
CONFIGURATION CONSIDERATIONS
Please note that unless a feature of the imageRUNNER ADVANCE is mentioned below, it is
regarded as being sufficient in the default settings for this business and network environment.
Table 1 Small Office Environment Configuration Considerations
SNMPNetwork monitoring integrationDisable version 1 and enable version 3 only
Send to e-mail and/or IFAXSend emails from the device with attachmentsEnable SSL
POP3Automatically fetch and print documents from
Address book / LDAPUse directory service to look up home number or
FTP PrintUpload & download documents to and from the
WebDAV SendScan and Store documents on a remote locationEnable authentication for WebDAV shares
Encrypted PDFEncrypt documentsBy policy sensitive documents should only
Secure PrintPrint job is sent to the device but locked in the print
Syslog event notificationSystem Logging Protocol is a standard industry
Verify System at start-upProvides assurance that the system software
Embedded web browserBrowser access to InternetEnforce through administration, the use of a content
Bluetooth and NFC
(available from Generation 3 models)
Wireless LANProvides Wireless accessUse WPA-PSK/WPA2-PSK with strong passwords
IPPConnect and send printing jobs over IPDisable IPP
non- standard device settings
network shares
mailbox
email addresses to send scans to
embedded FTP server
queue until the corresponding PIN number is
entered
protocol used to send system log or event
messages to a specific server called a Syslog server
components have not been compromised. It will
have a minimal impact upon system boot time
Used to establish a WiFi Direct connectionEnable WiFi Direct to allow direct connection to a
and maximum length password
Password protect with a non-default, non-trivial
and maximum length password
System administrators should, by policy, disallow
any users from creating local accounts on their
client machine for use in sharing documents with
the imageRUNNER ADVANCE over SMB
should enable HTTPS for the remote UI and disable
HTTP access. Enable the use of PIN authentication
unique to each device
Do not use the POP3 authentication before SMTP send
Use SMTP authentication
Enable SSL
Enable POP3 authentication
Enable SSL
Do not use domain credentials to authenticate against
the LDAP server; use LDAP specific credentials
Turn on FTP authentication. Be aware that FTP
traffic will always travel in clear text over the
network
be encrypted using PDF version 1.6 (AES-128)
Enable PIN protected print jobs
Consider pointing the imageRUNNER Syslog data
to your existing network syslog analysis tool or
enterprise Security Event Management System
(SIEM) platform.
Enable function
filtering web proxy to avoid malicious or viral content
being accessed. Disable the creation of favourites
mobile device. WiFi Direct may not be used when
WiFi is used to connect to a network
Canon imageRUNNER ADVANCE Hardening Guide
5
Page 6
AN ENTERPRISE OFFICE ENVIRONMENT
This is typically a multi-site, multi-office environment with segmented network architecture. It has
multiple MFDs deployed on a separate VLAN accessible for internal use via print server(s). These
MFDs are not accessible from the Internet.
This environment will usually have a permanent team to support its networking and back office
requirements along with general computer issues, but it is assumed they will not have specific
MFD training.
This is typically a multi site, multi office environment with segmented network architecture. It has
multiple MFDs deployed on a separate VLAN accessible for internal use via print server(s). These
MFDs are not accessible from the Internet.
Figure 2 Enterprise Office work
Client PC
Syslog/SIEM
server
Wireless
Access
Point
General network infrastructur e
Print server
Dedicated Print VLAN
-
device
iW MC
device
-
Mobile device:
Internal user
Firewall
Second network inf rastructure
Wireless
PointAccess
Connections highlighted in red will be available from Generation 3 models
PSTN
Mobile device:
External user
Firewall
Client PC
Fax
Intern
et
Canon
e-Maintenance
Canon Remote
Services
6Canon imageRUNNER ADVANCE Hardening Guide
Page 7
CONFIGURATION CONSIDERATIONS
Please note that unless a feature of the imageRUNNER ADVANCE is mentioned below it is
regarded as being sufficient in the default settings for this business and network environment.
Encrypted PDFEncrypt documentsBy policy sensitive documents should only be
Encrypted Secure PrintEnhance the protection of Secure Print by
Certificate Auto EnrolmentThe auto enrolment process improves the
Syslog event notificationSystem Logging Protocol is a standard
Verify System at start-upProvides assurance that the system
Wireless LANProvides Wireless accessUse WPA-PSK/WPA2-PSK with strong passwords
WiFi DirectUsed to establish a WiFi Direct connectionDisable WiFi Direct
Embedded web browser (available from
Generation 3 2nd edition models)
non- standard device settings
network shares
mailbox
email addresses to send scans to
encrypting the file and the password during
transmission
efficiency of digital certification retrieval
and deployment
industry protocol used to send system log
or event messages to a specific server
called a Syslog server
software components have not been
compromised. It will have a minimal
impact upon system boot time
Browser access to InternetApply appropriate restrictions or disable ability to
and maximum length password
Password protect with a non-default, non-trivial
and maximum length password
System administrators should, by policy, disallow
any users from creating local accounts on their
machine for use in sharing documents with the
imageRUNNER ADVANCE over SMB
Remote UI completely by disabling HTTP and
HTTPS
Enable:
- Certificate verification at the SMTP server
Or if not viable:
- Only use this feature in an environment where a
Network Intruder Detection System collector is
present Do not use the POP3 authentication
before SMTP send Use SMTP authentication
Enable SSL
Enable:
- Certificate verification at the POP3 server
Or if not viable:
- Only use this feature in an environment where a
Network Intruder Detection System collector is
present Enable POP3 authentication
Enable SSL
Enable:
- Certificate verification at the LDAP server
Or if not viable:
- Only use this feature in an environment where a
Network Intruder Detection System collector is
present Do not use domain credentials to
authenticate against the LDAP server; use LDAP
specific credentials
Enable SSL
Enforce the printer to only allow files ending with
the “file printing extensions” to be uploaded
encrypted using PDF version 1.6 (AES-128)
Configure the username in the Printer tab on the
client printer configuration to a different username
than the LDAP/domain credentials of that user.
Ensure “Restrict printer jobs” is turned off
Requires a network certificate solution
to leverage
Consider pointing the imageRUNNER
ADVANCE Syslog data to your existing
network syslog analysis tool or
enterprise Security Event
Management System (SIEM) platform
Enable function
download files acquired via the browser
The latest generation of imageRUNNER ADVANCE models provide wireless network
connectivity allowing the device to connect to a WiFi network whilst simulatiously connected
to a wired network. This scenario can be useful where the customer needs to share a device
across two networks. A school environment is a typical example where there are separate staff
and pupil networks.
Canon imageRUNNER ADVANCE Hardening Guide
7
Page 8
The imageRUNNER ADVANCE platform provides a feature environment to allow for flexible use.
With the protocols and services available to achieve this, it is important to ensure that only the
required features, services and protocols are enabled to fulfil the needs of the user. This is good
security practice and will reduce the potential attack surface and prevent their exploitation. As
new vulnerabilities are constantly appearing we must always be vigilant to compromising, either
intrinsically or extrinsically to the device. Having the ability to monitor user activity is useful to
help identify and take corrective action when needed.
imageRUNNER ADVANCE software platform version 3.8 provides some additional features
to those that have been available for a number of years. These include the ability to monitor
the device in real-time using Syslog and Verify System at Start-Up. Using these features in
collaboration with your existing network security solutions, such as a Security Information Event
Management platform or logging solution, allows for wider visibility and the identification of
incidents and for forensic purposes.
Verify System at Start-Up
This functionality is a hardware mechanism which is designed to ensure that all parts of the
imageRUNNER ADVANCE Generation 3 3rd edition system software are verified against a Root
of Trust to ensure that the operating system loads as Canon intends. Should a malicious party
tamper, try to modify the system or should there be an error loading the system, the process will
stop and an error code displayed.
Figure 3 Verify System at Start-Up process
This process is transparent to the user apart from the display indicating an unintended system
version being loaded. The imageRUNNER ADVANCE Generation 3 3rd edition has an option to
enable Verify System at Start-Up which should be switched on to enable this security feature.
Canon imageRUNNER ADVANCE Hardening Guide
8
Page 9
Certificate Auto Enrolment
In imageRUNNER ADVANCE system software
platform versions prior to version 3.8, the
administrator had to manually install updated
security certificates on each device.
This is a laborious task as there is the need
to connect to each device in turn to perform
a manual update – certificates must to be
installed manually using the specific device
Remote User Interface (RUI) making the
process much more time consuming. With the
Certificate Auto Enrolment Service introduced
from platform version 3.8 and above, this
overhead has been eliminated.
The auto enrolment process improves the
efficiency of certification retrieval. It provides
the ability to automatically retrieve certificates
using the Network Device Enrolment Service
(NDES) for Microsoft Windows and Simple
Certificate Enrolment Protocol (SCEP).
Figure 4 Certificate enrolment
Figure 5 Certificate enrolment process
SCEP is a protocol that supports certificates issued by a Certificate Authority (CA) and NDES
enables network devices to retrieve or update certificates based on SCEP.
NDES is a role service of the Active Directory Certificate Services.
Canon imageRUNNER ADVANCE Hardening Guide
9
Page 10
Online Certificate Status Protocol
There are a number of reasons why it may be
necessary to revoke a digital certificate. Examples for
this can include the private key has been lost, stolen,
compromised or a domain name has been changed.
The Online Certificate Status Protocol (OCSP) is a
standard Internet protocol that is used for checking
the revocation status of an X.509 digital certificate
that has been provided by the Certificate Server. By
sending an OCSP Request to the OCSP Responder
(typically a certificate issuer) specifying a specific
certificate, the OCSP Responder will reply with a
‘good’, ‘revoked’ or ‘unknown’.
Figure 6 OCSP hand shaking process
OSCP Request
OCSP Responder
OSCP Response
Certificate Responder
Server Certificate (Public Key)
imageRUNNER ADVANCE
With imageRUNNER ADVANCE from Platform version 3.10, OCSP provides a real-time
mechanism to verify the installed X.509 digital certificates. Earlier Platform versions only
supported Certificate Revoke List (CRL) method which are inefficient and result in heavy
overhead on network resources.
Canon imageRUNNER ADVANCE Hardening Guide
10
Page 11
Security Information and Event
Management
The imageRUNNER ADVANCE technology
supports the ability to push out real-time security
events using the Syslog protocol which adheres
to RFC 5424, RFC 5425 and RFC 5426.
This protocol is used by a wide-range of device
types as a way of collecting real-time information
that can be used to identify potential security
issues.
To facilitate the detection of threats and security
incidents, the device must be configured to
point to a third-party Security Incident Event
Management (SIEM) server.
Syslog events produced by the device can be used
to create actions through the real-time collection
and analysis of events from a wide variety of
contextual data sources (Figure 7). It can also
support compliance reporting and incident
investigation through the use of additional
solutions such as a SIEM server. An example can
be seen in figure 8.
SYSLOG data
The latest generation of imageRUNNER
ADVANCE devices provide Syslog functionality
that support a range of events that can be
collected. This can be used to correlate and
analyse events across a number of disparate
sources to identify trends or abnormalities.
Login attempt
Figure 7 Syslog data capture
Figure 8 imageRUNNER ADVANCE Syslog data use example
Canon imageRUNNER ADVANCE Hardening Guide
11
Page 12
Device Log Management
In addition to the Syslog functionality provided from system software platform version 3.8, the
imageRUNNER ADVANCE has following logs that can be managed on the device. These logs can
be exported in CSV file format through the Remote User Interface (RUI).
Table3 – Examples of log files that can be managed by the multifunctional device.
Log TypeNumber Indicated as “Log
Description
Type” in the CSV File
Log4098This log contains information related to the authentication status of user
Job Log1001This log contains information related to the completion of copy/fax/scan/
Transmission Log8193The log contains information related to transmissions
Advanced Space Save Log8196This log contains information related to the saving of files to the Advanced
Mail Box Operation Log8197This log contains information related to the operations performed on data in
Mail Box Authentication Log8199This log contains information related to the authentication status of the Mail
Advanced Space Operation Log8201This log contains information related to data operations in the Advanced
Machine Management Log8198This log contains information related to the starting/shutting down of the
Network Authentication Log8200This log is recorded when IPSec communication fails
Export/Import All Log8202This log contains information related to the importing/exporting of the
Mail Box Backup Log8203This log contains information related to backups of data in the User Inboxes,
Security Policy Log8204This log contains information related to the setting status of the security
Group Management Log8205This log contains information related to the setting status (registering/
System Maintenance Log8206This log contains information related to firmware updates and backup/
Authentication Print Log8207This log contains information and the operation history related to the forced
Setting Synchronization Log8208This log contains information related to the synchronization of machine
Log for Audit Log Management3001This log contains information related to the starting and ending of this
3101This is an operation log for SMS (Service Management Service), software
authentication (login/logout and user authentication success/failure), the
registering/changing/deleting of user information managed with User
Authentication, and the management (adding/editing/deleting) of roles with
the ACCESS MANAGEMENT SYSTEM
send/print jobs
Space, Network (Advanced Space of other machines), and Memory Media
the Mail Box, the Memory RX Inbox, and the Confidential Fax Inbox
Box, the Memory RX Inbox, and the Confidential Fax Inbox
Space
machine, changes made to the settings by using the
(Settings/Registration), changes made to the settings by using the Device
Information Delivery function, and the time setting The Machine
Management Log also records changes in user information or
security-related settings when the machine is inspected or repaired by
your local authorized Canon dealer
settings by using the Export All/Import All function
the Memory RX Inbox, the Confidential Fax Inbox, the Advanced Space, plus
any held data, and the form registered for the Superimpose Images function
registration/updates, and MEAP application installers, etc
policy settings
editing/deleting) of the user groups
restoration of the MEAP application, etc.
hold print jobs
settings. Synchronizing Settings for Multiple Canon Multifunction Printers
function (the Audit Log Management function), as well as the exporting of
logs, etc
Logs can contain up to 40,000 records. Once the number of records exceeds 40,000, the oldest
records are deleted first.
12Canon imageRUNNER ADVANCE Hardening Guide
Page 13
REMOTE DEVICE SUPPORT
For Canon or a Canon Partner to be able to provide efficient service, the imageRUNNER
ADVANCE is capable of transmitting service related data, as well as receiving firmware updates or
software applications. It should be noted that no image or image metadata is sent.
Shown below are two possible implementations of Canon’s remote services within a company
network.
Implementation scenario 1: Dispersed connection
In this setting, each MFD allows direct connection to the remote service through the Internet.
Figure 9 Dispersed connection
Canon
Universal
Gateway
Canon Remote
Services
Fax
Client PC
PSTN
www
Internet
Embedded
e-Maintenance,
Content Delivery
System, Remote
Support
Operator’s Kit
In an enterprise environment scenario, where multiple MFDs are installed, there is a need to be
able to efficiently manage these devices from one central point, and this includes the connection
to Canon’s remote services. To facilitate the holistic management approach, individual devices
would establish management connections through a single iW Management Console (iWMC)
connection point. For communication between the Device Firmware Upgrade (DFU) plug-in and
Multi-Functional Devices, UDP port 47545 is used.
Canon imageRUNNER ADVANCE Hardening Guide
1313
Page 14
Figure 10 Centralized managed connection
With supporting
plug-ins
Embedded
Remote Support
Operator’s Kit
Client PC
General network infrastructure
iW MC
Dedicated Print VLAN
Multi-functional
device
Print server
Multi-functional
device
Wireless
Access
Point
Firewall
Mobile device:
External user
Mobile device:
Internal user
PSTN
www
Internet
Canon
Universal
Gateway
Canon Remote
Services
Fax
Figure
11a. Device list (in this case a single device) as reported on imageWARE Management Console and
11b. Device details and settings
Figure 11aFigure 11b
Canon imageRUNNER ADVANCE Hardening Guide
14
Page 15
e-Maintenance
The e-Maintenance system provides an
automated way of collecting device usage
counters for billing purposes, consumables
management and remote device monitoring
through status and error alerts.
The e-Maintenance system consists of an Internet
facing server (UGW) and either an embedded
Multi-Functional Device software (eRDS) and/or
additional server-based software (RDS plug-in)
to collect device service related information. The
eRDS is a monitoring program which runs inside
the imageRUNNER ADVANCE. If the monitoring
option is enabled in the device settings, the eRDS
Table 4 E-Maintenance Data Overview
DescriptionData HandledProtocol/PortPort
Communication between
eMaintenance (eRDS or RDS plug-in)
and UGW
Communication between
eMaintenance and Device (only RDS
plug-in, as eRDS is embedded
software)
UGW web service address
Proxy server address / port number
Proxy account / password
UGW mail destination address
SMTP server address
POP server address
Device status, counter and model
information
Serial number
Remaining toner/Ink information
Firmware information
Repair request information
Logging information
Service call
Service alarm
Jam
Environment
Condition log
obtains its own device information and sends
it to the UGW. The RDS plug-in is a monitoring
program which is installed in a general PC, and
can monitor 1 to 3000 devices. It obtains the
information from each device via the network
and sends it to the UGW.
As shown in Table 4 below, the next page
overviews the data transferred, protocols
(depends upon options selected during the
design and implementation) and ports used. At
no point is any copy, print, scan or fax image data
transferred.
The Content Delivery System (CDS) establishes a connection between the MFD and Canon
Universal Gateway (UGW). It provides device firmware and application updates.
Table 5 Content Delivery System Data Overview
DescriptionData SentProtocol/PortPort
Communication between the MFD
and UGW
Communication between the UGW
and MFD
A specific CDS access URL is pre-set in the device configuration.
If there is a requirement to provide centralised device firmware and application management from
within the infrastructure, a local installation of iWMC with Device Firmware Upgrade (DFU)
plug-in and Device Application Management plug-in will be required.
Device serial number
Firmware version
Language
Country
Information relating to the device
EULA
Test file (Binary random data) for
communication testing
Firmware or MEAP application binary
data
HTTP/HTTPSTCP/80
HTTP/HTTPSTCP/80
TCP/443
TCP/443
Canon imageRUNNER ADVANCE Hardening Guide
15
Page 16
Remote Support Operator’s Kit
The Remote Support Operator’s Kit (RSOK) provides remote access to the device control panel.
This server-client type system consists of a VNC server running on MFP and Remote Operation
Viewer VNC Microsoft Windows client application.
Figure 12 Remote Support Operator’s Kit (RSOK) Setup
Table 6 Remote Support Operator’s Kit Data Overview
DescriptionData SentProtocol/PortPort
VNC password authenticationUser passwordDES
Operation ViewerDevice control panel
- screen data
- hardware key operation
encryption
Version
3.3 RFB protocol
Optional physical key pad
5900
5900
Canon imageRUNNER ADVANCE Hardening Guide
16
Page 17
APPENDIX
Canon imageRUNNER ADVANCE Security Related Features
The imageRUNNER ADVANCE platform provides remote configuration through a web services
interface known as the Remote User Interface (RUI). This interface provides access to many of
the device configuration settings and can be disabled if not permitted and password protected to
prevent unauthorised access.
Whilst the majority of the device settings are available through the RUI, it is necessary to use the
device control panel to set items which cannot be set using this interface. Our recommendation is
to disable any unused services and tighten the controls on those needed. To provide flexibility and
support, the Remote Service Operator’s Kit (RSOK) provides remote access to the device control
panel. This is based on VNC technology consisting of a server (the MFD) and a client (a network
PC). A specific Canon client PC viewer is available which provides simulated access the control
panel keys where needed.
This section gives an overview of key imageRUNNER ADVANCE security related features and
their configuration settings.
Interactive online User Manuals are available from https://oip.manual.canon/ giving details that
not only cover security related features. Start by selecting the appropriate product type (e.g.
imageRUNNER ADVANCE DX), click the search icon and enter your search criteria. Below are a
few general areas that are worth considering.
Managing the Machine
To reduce leakage of personal information or unauthorised use, constant and effective security
measures are required. By designation of an administrator to handle device settings, user
management and security settings can be restricted to those authorised only.
Point your web browser to the link below and enter administrator configuration in the search
box. This will give information related to:
• Basic management of the device
• Limitation of risks by negligence, user error and misuse
A number of imageRUNNER ADVANCE models are IEEE P2600 compliant which is a global
information security standard for multifunctional peripherals and printers.
The link below describes the security requirements defined in the IEEE 2600 standard, and how
the device functions meet these requirements.
The latest imageRUNNER ADVANCE models allow multiple device security settings, the security
policy, to be managed in batch via the RUI. A separate password can be used permitting only the
security administrator to modify the settings.
Point your web browser to the link below and enter Applying a Security Policy to the Machine in
the search box. This will give information related to:
• Using a Password to Protect the Security Policy Settings
Customers requiring a higher level of security and efficiency can utilise either built-in functionality
or use a print management solution such as uniFLOW.
For further details on our print management solutions, please contact our local representatives or
refer to the uniFLOW product brochure.
Configuring the Network Security Settings
Authorized users may incur unanticipated losses from attacks by malicious third parties, such as
sniffing, spoofing, and tampering of data as it flows over a network. To protect your important
and valuable information from these attacks, the machine supports numerous features to enhance
security and privacy.
Point your web browser to the link below and enter Configuring the Network Security Settings
in the search box. This will give information related to:
The device hard disk drive is used to store the device operating system, configuration settings
and job information. Most device models provide full disk encryption (compliant to FIPS 140-2)
pairing it to the specific device preventing it from being read by unauthorised users. A
preparatory Canon MFP Security Chip is certified as a cryptographic module under the
Cryptographic Module Validation Program (CMVP) established by the U.S. and Canada, as well as
the Japan Cryptographic Module Validation Program (JCMVP).
Point your web browser to the link below and enter Managing Hard Disk Data in the search box.
The third generation of the imageRUNNER ADVANCE models introduce the Security Policy
Settings and Security Administration User. This requires successful login of the Administrator and,
if configured, an additional Security Administrator login with an additional password.
The table below details the settings available.
1. InterfaceNotes
Wireless Connection Policy
Prohibit Use of Direct
Connection
Prohibit Use of Wireless LAN<Select Wired/Wireless LAN> is set to <Wired LAN>
USB Policy
Prohibit use as USB device<Use as USB Device> is set to <Off>
Prohibit use as USB storage
device
Network Communication Operational Policy
Note: These settings do not apply to communication with IEEE 802.1X networks, even if the check box is selected for
[Always Verify Server Certificate When Using TLS]
Always verify signatures for
SMS/WebDAV server functions
Always verify server certificate
when using TLS
Prohibit clear text authentication
for server functions
Prohibit use of SNMPv1In <SNMP Settings>, <Use SNMPv1> is set to <Off>
Port Usage Policy
Restrict LPD port Port number: 515
Restrict RAW portPort number 9100
Restrict FTP portPort number 21
Restrict WSD portPort number 3702, 60000
<Use Wi-Fi Direct> is set to <Off>
It is not possible to access the machine from mobile devices
It is not possible to establish a wireless connection with the machine via a wireless LAN router or
access point
You will not be able to use the print or scan functions from PCs connected via USB) when use as a
USB device is prohibited
<Use USB Storage Device> is set to <Off>
It is not possible to use USB storage devices
However, the following service functions still work even if “Prohibit use as USB storage device” is ON
• Firmware update by USB stick (from download mode)
• Copying the Sublog data from device to USB (LOG2USB)
• Copying the report from device to USB (RPT2USB)
In <SMB Server Settings>, the <Require SMB Signature for Connection> and <Use SMB
Authentication> options are set to <On>, and <Use TLS> in <WebDAV Server Settings> is set to <On>
When the machine is used as an SMB server or WebDAV server, digital certificate signatures are
verified during communication
<Confirm TLS Certificate for WebDAV TX>, <Confirm TLS Certificate for SMTP TX>, <Confirm TLS
Certificate for POP RX>, <Confirm TLS Certificate for Network Access>, and <Confirm TLS
Certificate Using MEAP Application> are all set to <On>, and a check mark is added to <CN>
In addition, the <Verify Server Certificate> and <Verify CN> options in <SIP Settings> > <TLS
Settings> are set to <On>
During TLS communication, verification is performed for digital certificates and their common names
• <Use FTP Printing> in <FTP Print Settings> is set to <Off>
• <Allow TLS (SMTP RX)> in <E-Mail/I-Fax Settings> <Communication Settings> is set to <Always
TLS>, <Dedicated Port Authentication Method> in <Network> is set to <Mode 2>,
• <Use TLS> in <WebDAV Server Settings> is set to <On>
When using the machine as a server, functions that use plain text authentication are not available
TLS will be used if clear text authentication is prohibited. Moreover, you will not be able to use
applications or server functions, such as FTP, that only support clear text authentication
May not be possible to access the machine from device management software or driver
You may not be able to retrieve or set the device information from the printer driver or management
software if the use of SNMPv1 is prohibited
<LPD Print Settings> is set to <Off>
It is not possible to perform LPD printing
<RAW Print Settings> is set to <Off>
It is not possible to perform RAW printing
In <FTP Print Settings>, <Use FTP Printing> is set to <Off>
It is not possible to perform FTP printing
In <WSD Settings>, the <Use WSD>, <Use WSD Browsing>, and <Use WSD Scan> options are all set
to <Off>
It is not possible to use WSD functions
You will not be able to use Mopria, AirPrint and IPP if the IPP port is restricted
In <SMB Server Settings>, <Use SMB Server> is set to <Off>
It is not possible to use the machine as an SMB server
In <E-Mail/I-Fax Settings> > <Communication Settings>, <SMTP RX> is set to <Off>
SMTP reception is not possible
You will not be able to use the remote copy, remote fax, remote scan, or remote print functions, or
applications, etc if the dedicated port is restricted
Port number 5900
<Remote Operation Settings> is set to <Off>
It is not possible to use remote operation functions
<Use Intranet> in <Intranet Settings>, <Use NGN> in <NGN Settings>, and <Use VoIP Gateway> in
<VoIP Gateway Settings> are all set to <Off>
It is not possible to use IP fax
In <mDNS Settings>, the <Use IPv4 mDNS> and <Use IPv6 mDNS> options are set to <Off>
<Use Mopria> is set to <Off>
It is not possible to search the network or perform automatic settings using mDNS It is also not
possible to print using Mopria™ or AirPrint
In <Multicast Discovery Settings>, <Response> is set to <Off>
It is not possible to search the network or perform automatic settings using SLP
You may not be able to retrieve or set the device information from the printer driver or management
software if the SNMP port is restricted
In <SNMP Settings>, the <Use SNMPv1> and <Use SNMPv3> options are set to <Off>
2. AuthenticationNotes
Authentication Operational Policy
Prohibit guest users • <Advanced Space Settings> > <Authentication Management> is set to <On>
Force setting of auto logoutThis setting is for logging out from the control panel This does not apply to other methods of
Password Operational Policy
Prohibit caching of password for
external servers
Display warning when default
password is in use
Prohibit use of default password
for remote access
Password Settings Policy (The policy will not apply to department ID management or PIN)
Set minimum number of
characters for password
Set password validity periodValidity Period settable between 1 and 180 days
Prohibit use of 3 or more
identical consecutive characters
Force use of at least 1 uppercase
character
Force use of at least 1 lowercase
character
Force use of at least 1 digit
Force use of at least 1 symbol
Lockout Policy
Enable lockoutDoes not apply to department ID/mail box PIN, PIN or secure print authentication, etc
• <Login Screen Display Settings> is set to <Display When Device Operation Starts>
• <Restrict Job from Remote Device without User Auth> is set to <On>
It is not possible for unregistered users to log in to the machine Print jobs sent from a computer are
also cancelled
logging out (settable range 10 sec – 9 minutes)
<Auto Reset Time> is enabled The user is automatically logged out if no operations are performed
for a specified period of time
Select [Time Until Logout] on the Remote UI setting screen
This setting does not apply to passwords the user explicitly saves, such as passwords for address
books, etc
<Prohibit Caching of Authentication Password> is set to <On>
Users will always be required to enter a password when accessing an external server
<Display Warning When Default Password Is in Use> is set to <On>
A warning message will be displayed whenever the machine’s factory default password is used
<Allow Use of Default Password for Remote Access> is set to <Off>
It is not possible to use the factory default password when accessing the machine from a computer
Minimum Number of characters settable between 1 and 32
Lockout Threshold: Settable between 1 – 10 times
Lockout Period: Settable between 1 – 60 minutes
Canon imageRUNNER ADVANCE Hardening Guide
20
Page 21
3. Key/CertificateNotes
Prohibit use of weak encryptionApplies to IPSec, TLS, Kerberos, S/MIME, SNMPv3, and wireless LAN
Prohibit use of key/certificate
with weak encryption
Use TPM to store password and
key
You may not be able to communicate with devices that only support weak encryption
Applies to IPSec, TLS, and S/MIME
If you use a key/certificate with weak encryption for TLS, it will be changed to the pre-installed key/
certificate. You will not be able to communicate if you are using a key/certificate with weak
encryption for functions other than TLS
Only available for devices with TPM installed. Always back up the TPM keys when TPM is enabled
Refer to the user manual for details
Important when TPM settings are enabled:
• Make sure to change the “Administrator” password from the default value, to prevent a third party
other than the administrator from being able to back up the TPM key. If a third party takes the
TPM backup key, you will not be able to restore the TPM key
• For the purpose of enhanced security, the TPM key can only be backed up once. If the TPM
settings are enabled, make sure to back up the TPM key on to a USB memory device, and store it
in a secure place to prevent loss or theft
• The security functions provided by TPM do not guarantee complete protection of the data and
hardware
4. LogNotes
Force recording of audit log• <Save Operation Log> is set to <On>
Force SNTP settingsEnter SNTP server address
Syslog Log reportingEnable Syslog destination details when using a Syslog server or SIEM
• <Display Job Log> is set to <On>
• <Retrieve Job Log with Management Software> in <Display Job Log> is set to <Allow>
• <Save Audit Log> is set to <On>
• <Retrieve Network Authentication Log> is set to <On>
Audit logs are always recorded when this setting is enabled
In <SNTP Settings>, <Use SNTP> is set to <On> Time synchronization via SNTP is required Enter a
value for [Server Name] on the Remote UI setting screen
• <Username and password>
• <SMB server name>
• <Destination path>
• <Perform export time>
5. JobNotes
Printing Policy
Prohibit immediate printing of
received jobs
Sending/Receiving Policy
Allow sending only to registered
addresses
Force confirmation of fax
number
Prohibit auto forwarding<Use Forwarding Settings> is set to <Off>
Received jobs will be stored in fax/I-Fax memory if immediate printing of received jobs is prohibited
• <Handle Files with Forwarding Errors> is set to <Off>
• <Use Fax Memory Lock> is set to <On>
• <Use I-Fax Memory Lock> is set to <On>
• <Memory Lock End Time> is set to <Off>
• <Display Print When Storing from Printer Driver> in <Set/Register Confidential Fax Inboxes> is set
to <Off>
• <Settings for All Mail Boxes> > <Print When Storing from Printer Driver> is set to <Off>
• <Box Security Settings> > <Display Print When Storing from Printer Driver> is set to <Off>
• <Prohibit Job from Unknown User> is set to <On>, and <Forced Hold> is set to <On>
Printing does not occur immediately, even when printing operations are performed
In <Limit New Destination>, the <Fax>, <E-Mail>, <I-Fax>, and <File> options are set to <On>
It is only possible to send to destinations that are registered in the Address Book
Users are required to enter a fax number again for confirmation when sending a fax
It is not possible to automatically forward faxes
6. StorageNotes
Force complete deletion of data<Hard Disk Data Complete Deletion> is set to <On>
For full imageRUNNER ADVANCE specifications, please refer to the product website found at