
Technical white paper
HP JetAdvantage Security
Manager
Instant-On Security and Auto-Group Remediation
Table of Contents
Overview ............................................................................................................................................ 3
What is Instant-On Security? ............................................................................................................................. 3
What is Instant-On Secure at Install? .............................................................................................................. 3
What is Instant-On Stay Secure? ..................................................................................................................... 3
How do I implement Instant-On Security? ..................................................................................................... 4
Instant-On Security, Part 1 - Device Announcement Agent (DAA) ................................. 4
Introduction to Device Announcement Agent (DAA) ................................................................................. 4
Instant-on workflow .......................................................................................................................................... 7
DAA Workflow Diagram ............................................................................................................................... 8
Explanation of the DAA workflow ................................................................................................................... 8
Device and DNS configuration .................................................................................................................... 8
Network Activity ............................................................................................................................................. 11
Initial Device Announcement Use Cases ..................................................................................................... 13
Use Case 1 – Auto Discovery and Policy Conformance ................................................................................... 13
Use Case 2 – Semi-Auto Discovery and Policy Conformance ......................................................................... 14
Use Case 3 – Pre-staged Device Discovery and Policy Conformance .......................................................... 14
Use Case 4 – Filtered Discovery and Policy Conformance .............................................................................. 14
When are Device Announcement Messages Created? ........................................................................... 14
Post-Install Device Announcement Use Cases ............................................................................................. 15
Use Case 1 – Device Cold Reset ............................................................................................................... 15
Use Case 2 – Device Formatter or JetDirect Interface Replacement ................................................ 15
Use Case 3 – Device Acquires New IP address ................................................................................... 15
Security and Mutual Authentication .............................................................................................................. 15
Instant-On Security, Part 2 - Security Manager Instant-On Security Settings ......... 17
Introduction .......................................................................................................................................................... 17
Enabling Instant-on Discovery ......................................................................................................................... 17

2
Enabling Instant-On Security ........................................................................................................................... 18
Configuring Instant On Forwarding to WJA .............................................................................................. 19
Configuring Instant On Mutual Authentication .......................................................................................... 21
Mutual Authentication Configuration ........................................................................................................ 25
Announcement Message Summary ........................................................................................................... 30
Configuring Instant On with Device Serial List filtering ........................................................................... 30
Instant-On Assessment Policy with HPSM 3.3 and older ........................................................................ 32
Instant-On Assessment Policy from HPSM 3.4 onwards .......................................................................... 32
Part 3- Autogrouping and autogroup remediation .......................................................... 32
A. Autogroup remediation for devices discovered via instant-on ...................................................... 33
B. Autogroup remediation for devices discovered via manual or automatic discovery .............. 35
C. Autogroup remediation at configured time intervals ........................................................................ 37
D. Autogroup remediation after editing an autogroup or autogroup policy .................................. 39
Part 4 – Performance Implications .......................................................................................... 39
Part 4 – Summary .......................................................................................................................... 41
Appendix A ...................................................................................................................................... 42
Links to other HP Security Manager Whitepapers .................................................................................... 42

3
Overview
What is Instant-On Security?
HP JetAdvantage Security Manager (HPSM) is the industry’s first policy-based security compliance solution for
HP printing and imaging devices. Unique to Security Manager, the Instant-On Security feature provides
automatic device discovery and security compliance configuration when an HP supported device is first
connected to the network. Afterwards, Instant-On Security maintains security compliance when the usual
“after installation” scenarios place the device into a non-compliant state.
What is Instant-On Secure at Install?
Instant-On Security is a dual component solution consisting of dedicated communication between a supported
device and appropriately configured Security Manager software. When enabled at the device, a special device
announcement agent locates the Security Manager server and requests secure communication. After the
agent source is authenticated, the Security Manager server responds by adding the device to the database and
applying a pre-configured corporate security policy. This activity will be referred to as Secure at Install
throughout the document.
What is Instant-On Stay Secure?
After being registered with Security Manager, a device generates an announcement when power cycled, cold
reset, assigned a different IP address and for other device specific conditions while on the network. Upon
receiving an announcement, Security Manager assesses the device and immediately remediates any setting
found to be out of compliance with the last security policy applied to that device. This activity will be referred
to as Stay Secure throughout the document. Instant-On security does not rely on periodic database refreshing
or special device group configuration. The process is simple; any time a device announces, Security Manager
will assess the device and remediate any setting found to be out of compliance with the established corporate
security policy.

How do I implement Instant-On Security?
The remainder of this document includes a general and detailed understanding of the Instant-On Security
feature, organized into two primary sections. Part 1 covers the device side component, referred to as the
Device Announcement Agent. Part 2 covers the Security Manager Instant-On Security configuration server
component. Familiarization with both components will explain Instant-On Security as a complete solution and
provide assistance for proper implementation.
Instant-On Security, Part 1 - Device Announcement Agent (DAA)
Introduction to Device Announcement Agent (DAA)
This section provides a general understanding of the Device Announcement Agent, why it was developed, and
the value it provides.
The Device Announcement Agent (DAA) serves as the device-side component of the Instant-On Security
solution and can be found as embedded functionality in most Security Manager supported printers. The DAA
can also be found in recently released HP JetDirect network interface cards to provide Instant-On compatibility
with legacy HP printers missing the embedded DAA functionality. Please refer to the HP JetAdvantage
Security Manager Supported Devices document found at www.hp.com/go/securitymanager for the most
current list of Instant-On Security supported devices.
Note: Security Manager Instant-On Security supported devices are a subset of Security Manager overall
supported devices.
Developed strictly for use with the Security Manager Instant-On feature, the DAA combined with Security
Manager addresses three primary customer desires:
1. An automatic printing device discovery solution that doesn’t require additional network configuration,
additional protocol enabling, exhaustive searches or chatty broadcasts
2. A solution that provides a true out-of-the-box device security compliance experience or what is
referred to as Secure at Install
3. A solution that can maintain security settings when the installed device is cold reset or changes IP
addresses or hostname, referred to as the Stay Secure experience
Due to limitations in fully automatic discovery methods, networked printer discovery is generally a manual
process requiring device or network specific input. For example, automatic device discovery methods such as
SLP (Service Location Protocol) and Bonjour (mDNS) can provide some automation to the discovery process.
Both methods commonly possess limitations that prevent them from being a complete solution in most
4

5
corporate environments. SLP adoption typically faces packet filtering restrictions, and Bonjour is limited to a
single broadcast domain, without special DNS configuration. In addition, automatic discovery methods such as
exhaustive subnet scanning are not feasible for IPv6 networks due to size of the address space. These and
other automatic methods typically involve some manual intervention, lack efficiency, and do not scale well for
large enterprises.
To overcome such limitations, the innovative Device Announcement Agent (DAA) was developed and provides
a supported HP printing device the capability of “announcing” its presence directly to the Security Manager
server. This announcement process is handled through common DNS address resolve and dedicated TCP port
communication (port 3329). The DAA model alleviates the need for manual intervention, is not chatty, and
serves as a more efficient device discovery mechanism. After the initial device discovery process is complete,
Security Manager applies the established security policy to the device over a secure TCP connection.
A device Secure at Install experience is the result of this two-step process. After the Secure at Install
process is complete, Instant-On continues with the Stay Secure process via the DAA announcements that
occur for device cold resets, IP address changes and other device specific conditions. The Stay Secure
process ensures the device is remediated in accordance with the last security policy applied. With Security
Manager, only the settings found to be out of compliance with the established security policy are targeted for
remediation.
To quickly identify DAA functionality presence on a specific device, you may print a configuration page. A
configuration page example of DAA presence is provided below. You may also browse to the device’s
embedded web server “Networking” page to verify DAA presence.

HP Web Jetadmin provides fleet configuration of the Device Announcement Agent. You can set up a device
layout in HP Web Jetadmin to include the Device Announcement Agent column. DAA presence is represented
by an Enabled, Disabled or Not Supported status in this column.
The device DAA functionality is enabled by default but can be manually disabled via the control panel,
Embedded Web Server or HP Web Jetadmin.
6

7
An enabled Device Announcement Agent will announce when the device is powered up on the network for the
first time. Announcements also occur during a device power cycle, cold reset, IP address change and link
down/link up scenario.
Instant-on workflow
The Device Announcement Agent is enabled by default. The device is capable of displaying four different DAA
states; Disabled, In Progress, Success or Failed. Success indicates the device was able to discover a Security
Manager server and establish communication. Failed indicates the device wasn’t able to discover a Security
Manager server or wasn’t able to establish a connection with a discovered Security Manager server. Use the
following DAA workflow description and the diagram below to understand the device announcement
experience:
1. A supported device is powered up on network with a pre-configured IP address or automatically
acquires an IP address after network installation. The DAA is enabled by default on the device, but can
easily be disabled if Instant-On Security is not desired. In the disabled scenario, the device will show a
disabled status for the announcement agent.
2. If the DAA is enabled, and the Security Manager server IP address is configured on the device, the
device will target the provided Security Manager server IP address to begin Instant-On
communication. If the Security Manager server IP address is not configured on the device, the device
will attempt DNS IP resolution of the following hostname or DNS alias (CNAME): hp-print-mgmt.
Note: This hostname or alias must be administratively assigned to the Security Manager server for
successful default Instant-On functionality.
3. The Security Manager server Instant-On feature must be enabled and configured to allow DAA
communication to proceed without failure. The Instant-On feature can be configured to discover only
or discover, assess and remediate.
4. With the Security Manager server IP address known (either through direct configuration or DNS
resolve), TCP port 3329 communication is attempted with the Security Manager server. Device
announces itself using SSL and its self-signed identity certificate.
5. Upon receiving the announcement, the Security Manager configuration server authenticates the
device, retrieves the device’s identity details, and adds the device to the database. Security Manager
then continues with an assessment of the device based upon the designated Security Manager
security policy and remediates the device’s non-compliant security settings.

8
DAA Workflow Diagram
Explanation of the DAA workflow
This section presents the Device Announcement Agent workflow in greater detail, including network
configuration for default functionality, network activity, primary use cases, communication specifics, and
authentication.
Device and DNS configuration
DAA communication occurs via a protocol that will be referred to in this document as HDAP (HP Device
Announcement Protocol). When a DAA enabled printer comes online in a networked environment, it follows a
process of contacting the default Security Manager server to request discovery and compliance with a
configured corporate security policy. All use cases follow the same basic workflow, but differ in the way that
the device is authenticated to the Security Manager server and if some manual intervention in the workflow is
required.
In order to leverage the default functionality provided by a DAA enabled printer, the network administrator
must make a minimal DNS configuration change to the networked environment. Once the configuration

9
change is complete, any Instant-On supported device coming online will be automatically discovered and
configured to a secure setting. The required steps are as follows:
1. The DNS administrator configures a DNS entry for the default Security Manager server hostname hp-
print-mgmt on the network where a new HP print device is to be placed. The hp-print-mgmt
reference can be the actual Security Manager server hostname or a DNS alias (CNAME) of that specific
server. If the administrator is unable or unwilling to configure this DNS entry, the DAA must be
manually configured to include the IP address of the Security Manager server. HP Web Jetadmin can
assist with the DAA configuration from a fleet management perspective. Pre-configuring the Security
Manager server IP address in the DAA eliminates the need for DNS, but adds a manual step to the
default Instant-On process.
Note: The DAA DNS resolve occurs on the local domain only unless the device is configured to query additional
domains or the DNS environment is configured to refer to other domains. The device can be automatically
configured with a specific DHCP server option (option 119) that assigns additional domain suffixes or manually
configured with the additional domain information via the device’s embedded web server. The Microsoft DHCP
domain search options differ by server operating system. To understand more about specific server operating
system DHCP capabilities and automatic domain search options, please refer to the Microsoft Support
Knowledge Base. A network trace example is shown below of DAA behavior when the hp-print-mgmt

10
hostname or DNS alias cannot be found on the local domain and the device searches on other domains for
which the network interface may be configured.
Note: When IPv6 is enabled on the device, you will notice at least one IPv6 (AAAA) and IPv4(A) DNS
request per domain.
2. TCP Port 3329 is registered with the IANA (Internet Assigned Numbers Authority) and specifically
assigned to HP Security Manager. This port is dedicated to Instant-On communication between the HP
supported device and Security Manager. Port 3329 is also referred to as the hp-device-disc port. If
the Security Manager server Windows firewall is in use, ensure the firewall allows TCP Port 3329
communication in both directions.
3. At the Security Manager server, create a security policy that best describes the conformance
requirements for devices on this network. This policy should be the most encompassing policy
relative to the mix of device models found in your corporate printing environment.
4. At the Security Manager server, configure authentication requirements for communicating with
devices. Devices will attempt the highest level of authentication available. Choices are “No

11
Authentication” (true out-of-the box conditions) or “Mutual Authentication” which leverages installed
certificates.
5. Place a device which supports the DAA and is enabled, on the network.
Network Activity
Instant-On security operates with very little impact to the network. As mentioned earlier in this document, the
Device Announcement process consists of resolving the Security Manager server hostname or alias of hp-
print-mgmt to an IP address. Once the address is resolved, a dedicated TCP port (3329) is opened for direct
communication between the device and Security Manager. For a detailed flow of what to expect to see on the
network, please see the DNS flow diagram below.
Note: If the Security Manager IP address is pre-configured in the DAA, the DNS resolve step in the Instant-On
Security process is eliminated.
Resolving the hp-print-mgmt hostname or alias:
Successful DNS resolution of the hp-print-mgmt hostname or alias (IPv6 Enabled)
The trace below is an example of a successful DNS resolution of the default hostname of hp-print-
mgmt.domain.company.net. After an unsuccessful attempt at DNS resolve over IPv6, the device retried over
IPv4. Once the hostname resolved to an IP address, the device then opened up a TCP connection on port
3329. This connection then serves as secure communication between Security Manager and the device.

12
Note: IPv6 is enabled by default on the device

13
Initial Device Announcement Use Cases
Setting up the network as explained above will allow for an initial default out-of-the-box device security
configuration experience. Below, is a list of the most common Secure at Install use cases.
Use Case 1 – Auto Discovery and Policy Conformance
A DAA enabled Security Manager supported device is placed on the network for the first time without any
staged configuration. The Security Manager server Instant-On feature is configured to “Accept Device

14
Announcements” and “Allow Automatic Remediation”. The device acquires a DHCP address and attempts to
resolve the DNS hostname or alias of hp-print-mgmt. Once hp-print-mgmt is resolved to the HP Security
Manager server IP address, the device is authenticated and Security Manager communication is established.
Security Manager places the newly discovered device in the database, assigns a license, and remediates the
device in accordance with the established security policy. In this popular use case, a new device when added
to the network will be automatically discovered, licensed, assessed, remediated and verified by Security
Manager.
Use Case 2 – Semi-Auto Discovery and Policy Conformance
A DAA enabled Security Manager supported device is placed on the network and manually configured with the
IP address of the designated Security Manager server. The Security Manager server Instant-On feature is
configured to “Accept Device Announcements” and “Allow Automatic Remediation”. The device acquires a
DHCP address and establishes direct communication with the Security Manager server. Once authenticated,
Security Manager places the newly discovered device in the database, assigns a license, and remediates the
device in accordance with the established security policy. This use case allows Instant-On functionality
without DNS resolve. The trade-off; IT DNS configuration is not required, but device pre-configuration is.
Use Case 3 – Pre-staged Device Discovery and Policy Conformance
A DAA enabled Security Manager supported device is staged and placed on the network in a pre-configured
state. This pre-configured state may include an installed mutual authentication certificate and applied
security settings. The device is manually configured with the IP address of the designated Security Manager
server. The Security Manager server Instant-On feature is configured to “Accept Device Announcements” and
“Allow Automatic Remediation”. After communication is established and authentication complete, the newly
discovered device is placed in the database. A license is assigned, and remediation occurs for any security
setting not in compliance with the applied security policy. This use case ensures all the pre-configured new
devices are discovered, mutually authenticated through certificates and match security settings with the
established security policy.
Use Case 4 – Filtered Discovery and Policy Conformance
A DAA enabled Security Manager supported device is placed on the network without any staged configuration.
The Security Manager server Instant-On feature is configured to “Accept Device Announcements”, “Allow
Automatic Remediation” and utilize device serial numbers as a method of filtering Instant-On activity. The
device acquires a DHCP address and attempts to resolve the DNS hostname or alias of hp-print-mgmt. Once
hp-print-mgmt is resolved to the Security Manager server IP address and Security Manager communication is
established, Security Manager continues the Instant-On process only if the device matches a serial number
entry in the Security Manager Instant-On serial number list. If so, Security Manager places the newly
discovered device in the database, assigns a license, and remediates the device in accordance with the
established security policy. Upon successful interaction, the serial number is then removed from the UI list,
but the database entry remains in order to continue the serial number filtering process for Instant-On. This
use case provides a filtering option for selective Instant-On processing.
When are Device Announcement Messages Created?
.Many HP devices support a featured called a Device Announcement Agent whereby announcement packets
are sent to Security Manager whenever any of the following condition exist on the device:
• Initial boot
• Power cycle
• Network disconnect/reconnect

15
• IP Address change
• Hostname change
• Cold Reset
• Every 47~48 hours regardless of any other action triggering an announcement. This is not configurable
and only available from FutureSmart 4 onwards.
Post-Install Device Announcement Use Cases
After the Secure at Install process is complete, Instant-On security continues with the Stay Secure process via
the DAA announcements that occur for device cold resets, IP address changes and other device specific
conditions that might place the device in a non-compliant state. After receiving an announcement, Instant-On
ensures the device is assessed and remediated in accordance with the last security policy applied. Below, is a
list of the most common Stay Secure use cases.
Use Case 1 – Device Cold Reset
A Security Manager managed device has experienced a condition where a return to a default configuration
(cold reset) is required. As a result of the cold reset, many of the security settings applied through the original
Security Manager policy remediation are cleared. The cold reset action produces a DAA announcement, thus
prompting communication with Security Manager. The Security Manager server processes the announcement,
matches device identity with the existing database entry, and applies the last policy the device was assessed
with. The device database entry is reconciled with any device identity attributes that might have changed
during the cold reset. Through this process, the device is immediately placed back into its secure state.
Use Case 2 – Device Formatter or JetDirect Interface Replacement
A Security Manager managed device has experienced a hardware failure, requiring a Formatter or Jetdirect
interface replacement. After completing the repair, the service technician reloads the original serial number
into the device. Applying power to the device after placing unit back on the network generates a DAA
announcement. The Security Manager server processes this announcement, reconciles the device identity
based on the serial number match and applies the last policy the device was assessed with. Through this
process, the device is immediately placed back into its secure state.
Use Case 3 – Device Acquires New IP address
Device has moved physical locations and acquires a new IP address. The IP address change produces a DAA
announcement, thus prompting communication with Security Manager. The Security Manager server
processes the announcement, matches device identity with the existing database entry, and applies the last
policy the device was assessed with. The device database entry is reconciled with any device identity
attributes that might have changed as a result of the IP address change.
Security and Mutual Authentication
Once the Security Manager server IP address has been acquired, the DAA attempts to open up communication
using the most secure authentication method configured on the device. No authentication is the default state.
Require Mutual Authentication via Certificates will provide the most secure configuration method, since
certificates must be installed and trusted on this device as well as on the Security Manager server.

16
When Require Mutual Authentication via Certificates is enabled, announcements are sent using trusted
SSL/TLS authentication. If certificate authentication is enabled, but fails authentication for any reason,
Instant-On communication ceases and an announcement agent failure is posted. If certificates are configured
on the device, but Require Mutual Authentication via Certificates is disabled, trusted SSL/TLS
authentication is still attempted. However, the DAA allows the SSL/TLS connection to proceed after
authentication fails. Security Manager may close the SSL/TLS connection as a result of failing to validate the
device certificate. This decision is determined by the device announcement security policy on the Security
Manager server. For more information on use of certificates with the Instant-On Security feature, please refer
to Mutual Authentication in Part 2 of this document.

17
Instant-On Security, Part 2 - Security Manager Instant-On Security
Settings
Introduction
As mentioned in Part 1, Security Manager Instant-On Security is a dual component solution. The first
component is the Device Announcement Agent (DAA), explained in Part 1. The secondary component is the
Security Manager server itself, configured for Instant-On functionality. This host component will be referred
to as the Instant-On Configuration Server throughout the remainder of this document. When Security
Manager is enabled as the Instant-On Configuration Server, it becomes the discovery and configuration server
for the supported devices that are able to announce themselves through the Device Announcement Agent.
Unlike the Device Announcement Agent, the Instant-On Configuration Server is not enabled by default.
Automatic remediations by default are not checked.
The configuration options under Instant-On Security can be configured in two different options: enable
discovery of devices via instant-on or enable instant-on Security.
Enabling Instant-on Discovery
Option 1 is discovery only of DAA supported devices by selecting Accept Device Announcements without
selecting Allow Automatic Remediation. Upon receiving the device announcement, Security Manager will
establish communication with the device, place the device in the database and assign it a license. It will not
attempt to apply the configured security policy. This option does not provide Instant-On Security, only
discovery through the device announcement agent.

18
Enabling Instant-On Security
Option 2 is the selection of Accept Device Announcements and Allow Automatic Remediation with an Initial
Assessment Policy. This combined selection will discover the DAA enabled device and apply the security policy
that appears in the Initial Assessment Policy field. This combination provides Instant-On Security.
To enable listening to device announcements the Accept Device Announcements box must be selected.
After selecting Accept Device Announcements, a pop-up notification provides a reminder to ensure TCP port
3329 is not blocked at the firewall.

19
An Instant-On discovered device appears in the device list as Auto Discovered under the Instant On Auto
Discovered column, and the Last Policy Used column indicates which policy was used for automatic
remediation if enabled.
The default Instant-On Security configuration will accept and process discovery and policy requests from every
device capable of announcing itself through the device announcement agent. This default configuration does
not include the selection of trusted certificate based mutual authentication or serial number filtering of
devices and is configured as such to accommodate a true out-of-the-box device security experience.
Configuring Instant On Forwarding to WJA
Devices discovered via Instant On can be shared with other Security Manager installations or Web Jetadmin
installations by adding them as Secondary Listeners. Click New under the Secondary Listeners section and
add hostnames or IP Addresses of all Security Manager and Web Jetadmin installations where it is desired to
share the Instant On discoverd devices. Check the box named Validate Identity Certificate before sending
Device Announcements to this Secondary Listener if it is desired to enforce trust through identity
certificates to be certain the secondary listener is who it says it is.
In order for Web Jetadmin to receive the Instant On discovered devices sent to it from a primary Security
Manager listener server, check the box to Accept Device Announcements from HP JetAdvantage Security
Manager under Tools, Options, Instant On Listen in HP Web Jetadmin. Web Jetadmin listens by default on
port 3329 for device announcements sent to it from a primary Security Manager listener server and adds
those devices to its device list. If you select a custom port in WJA (see screenshot below), you will also have to
configure a custom port in HPSM. This can be done in the HPSM_Service.exe.config. Search for the secondary
Listener and make changes similar to the following example:
<SecondaryListeners>
<InstantOnPortMapping>
<Mapping ipOrHostname=”WJASERVER" port="3033"/>
</InstantOnPortMapping>

20
</SecondaryListeners>
After making the changes, you will have to restart the HPSM Jetadvantage service.
The transaction between the primary listener (HPSM) and secondary listener (WJA) will be encrypted using the
self-signed certificate in Web Jetadmin. If it is desired to enforce trust so Security Manager can ensure the
Web Jetadmin server is truly who it says it is via a certificate authority, check the box to Validate using the
WJA Identity Certificate.
If it is desired to allow a second Security Manager receive Instant On discovered devices by a primary Security
Manager listener server, check the box named From Primary Listeners. Choose whether just encryption will
be used for the transaction via a self-signed certificate or whether trust should be enforced via a CA signed
identity certificate.

21
Configuring Instant On Mutual Authentication
Instant-On Security configuration options are available to filter device “Instant-On” participation. Selecting
Mutual Authentication leverages installed trusted certificates to establish a higher level of Instant-On
connection and communication security. When selected and configured, only the devices that complete device
identity certificate validation can participate in the Instant-On process.
As mentioned in Part 1, HP supported devices now have the capability of announcing their presence on the
network. This device capability is enabled by default. The Device Announcement Agent sends an
Announcement Message request directly to the Instant-On Configuration Server to announce its presence.
This is not a broadcasted message. The device automatically receives the Security Manager server IP address
through resolving the DNS hostname of hp-print-mgmt or through manual configuration of the Device
Announcement Agent IP address field. The Announcement Acknowledge reply from the Instant-On
Configuration Server acknowledges receipt of the message and returns the status of the attempted
authentication method.
Instant-On Security can be configured for mutual authentication; an announcement option that relies upon
device and Security Manager identity assurance through a combined action of client-to-server and server-toclient SSL/TLS (Secure Socket Layer/Transport Layer Security) authentication. Mutual authentication can also
be informally referred to as 2-way SSL/TLS authentication.
Deploying trusted certificates for mutual authentication provides the most secure method of Instant-On
Security. Since certificates remain over a cold reset, this method of Instant-On Security protects the device
even if it is cold reset. Successful mutual authentication requires the configuration and installation of a valid
identity (ID) certificate on the device and in Security Manager. On the device, the unique identity certificate
must be signed by a CA (Certificate Authority) and installed as a replacement of the default self-signed device
certificate. On the Security Manager server, a unique identity certificate signed by a (CA) and placed in the local
computer personal store is also required. The corresponding (CA) certificate must also be installed on the

22
device (See Figure 26) and in the Security Manager server local computer trusted root certification authorities
store. Using a single (CA) to sign both identity certificates isn’t required, but can simplify the process by
reducing the number of necessary components. Certificates can be configured manually, or a certificate
manager can be used.
Handshake
When mutual authentication is configured for Instant-On communication, appropriate handshaking occurs to
establish an encrypted channel prior to any message exchanges. The handshake includes dialogue to
establish the identities of the device and Security Manager via the mutual presentation of signed digital
certificates. The dialogue is similar to the example below:
• Client sends a message proposing the SSL/TLS options
• Server responds with SSL/TLS option selection
• Server presents its identity certificate
• Server requests client’s certificate
• Server negotiation is complete
• Client presents its identity certificate
• Client sends key (encrypted with server’s public key)
• Client notifies server that it owns the sent certificate
• Client sends message activating the negotiated options
• Client sends “finished” message, asking server to check negotiated options
• Server sends message activating the negotiated options
• Server sends “finished” message, asking client to check negotiated options
Authentication
Authenticating the server consists of “checks” that include:
• Has the server certificate expired or been revoked?
• Can the CA (Certificate Authority) that issued the certificate, be trusted?
• Does the CA’s public key validate the digital signature?
• Does the domain name in the certificate match the domain name of the server?
Authenticating the client consists of “checks” that include:
• Does the client public key validate the client digital signature?
• Has the client certificate expired or been revoked?
• Can the CA (Certificate Authority) that issued the certificate, be trusted?
• Does the CA’s public key validate the digital signature?
Certificate Selection
The figure below provides the Security Manager example of how to invoke Mutual Authentication and select
the appropriate certificate. The figure below also provides the device embedded web server example of
where and how to install a JetDirect and CA certificate.

24
Note: During the Instant-On mutual authentication process, the device and Security Manager toggle between
roles of client and server. When creating (ID) certificates for the printer and Security Manager, ensure the
certificates are configured for Server and Client Authentication under Enhanced Key Usage.
To participate in a Mutual Authentication announcement, each device must be set to Require Mutual
Authentication via Certificates. From Security Manager, select Mutual Authentication and choose the

25
Certificate to use from the list of security certificates found on the server. The Security Manager list of
available certificates is derived from entries found in the Local Computer Personal Store.
Note: When generating the identity certificate for Security Manager, it is a best practice to assign a friendly
name to the certificate for easy identification in the Security Manager certificate list. In the example above,
“ipsctestcert” was used.
Mutual Authentication Configuration
To assist with certificate deployment, a basic understanding of mutual authentication and a simplified
deployment process is presented in figures. Figure 30 begins by showing the usual out-of-the box
configuration and the expected behavior.
By default, only a JetDirect self signed certificate is installed. This certificate is not unique and does not
represent the true identity of the printer. Because of this, a user (client) browsing to the printer’s embedded
web page (server) will be presented with a warning that the website cannot be trusted. Microsoft Internet
Explorer will give a warning that, “There is a problem with this website’s security certificate”. See next figure .
Other browsers will present a similar warning.

26
A JetDirect certificate request has been generated and provided to the Certificate Authority (CA) for signing.
The (CA) generates a signed identity certificate based upon this request. The newly signed JetDirect certificate
is installed, replacing the default self-signed certificate. However, the connection remains untrusted because
the client hasn’t knowledge of the (CA) that generated the JetDirect certificate.
The client is made aware of the (CA) that generated the JetDirect’s signed certificate. The CA’s identity
certificate was exported and installed in the client’s Trusted Root Certificate Authorities store. Trusted
communication now exists, but only in one direction; from client to server. Mutual authentication between the
pc and printer does not exist at this point.

27
For Instant-On mutual authentication, the figure below shows the required role reversal between the printer
and the pc. With Security Manager installed and the Instant-On Security feature enabled, the printer becomes
the client looking to establish secure communication with Security Manager, the server.

28
With the printer now in the role of client, it requires knowledge of the CA that will be generating the identity
certificate for the pc, now the server. The (CA) certificate is exported and installed on the printer. To install the
CA certificate on the device.
Security Manager
now installed on PC
Mutual
Authentication
selected in DAA

29
At this point, the only missing component needed to achieve mutual authentication is the identity certificate of
the server. As was the case when the printer was the server, a certificate request is generated from the
Security Manager server and submitted to the CA server for signing. Once signed and installed in the Local
Computer Personal Store, trusted client-to-server communication and thus mutual authentication now exists.

30
If trusted certificates are not installed or leveraged on either the device or server, the device uses its selfsigned certificate for identification purposes and the server handles authentication in an anonymous fashion.
If trusted certificates are installed and leveraged on the device and server, mutual authentication can be
selected to provide a higher level of communication security. Mutual authentication can serve as a form of
Instant-On Security device filtering, as well. More authentication discussion is provided later in this section.
The announcement and acknowledge message communication occur directly over registered TCP Port 3329
(named port hp-device-disc).
Announcement Message Summary
The device Announcement Message is always sent using the most secure authentication method the device
is configured for. When the Device Announcement Agent is set for Require Mutual Authentication via
Certificates, only trusted SSL/TLS authentication is allowed. When set, the Announcement Message requires
valid identity and CA certificates be installed on the device. If this requirement is not met, the announcement
is not sent. In addition, if the Instant-On Configuration Server certificate is determined to be invalid, the device
will cease to contact the server, until the next announcement scenario presents itself. In either case, mutual
authentication is denied and DAA status will show Fail.
Configuring Instant On with Device Serial List filtering
Selecting No Authentication and Use Device Serial-Number List configures the Instant-On Configuration
Server to work only with the devices whose serial numbers are provided in the list. For example, managing a
group of devices included in a Managed Print Services contract or for some other specific device scenario.
Along with the product name, MAC address and IP address, the device serial number is included in the
announcment message.
The device’s Announcement Message request includes device identity information, such as; the MAC address,
the IP address, model and the serial number. Upon initial authenticated communication between the device
and server, Security Manager inserts this gathered identity information into the database. This identity
information, specifically the serial number, can now be used if the serial number filtering option is chosen.
Every announcement scenario is handled in identical fashion to the initial device discovery scenario. However,
once the device has been discovered, no further database entry will occur to eliminate the possibility of
duplicate device entries.
Device Table

31
Instant-On Security includes the ability to utilize serial numbers as a means of filtering the devices that
participate in the Instant-On process. Serial numbers can be singularly added or imported via a text file. With
serial number filtering enabled, only the devices whose serial numbers match a database entry in the Serial
Number List table are granted Instant-On processing. The image below shows how the Serial Numbers can be
added to HPSM.
The image below shows the two tables that require a serial number match.
As devices announce, are discovered and placed into the Device Table, the serial number entry is removed
from the UI serial number list. From the devices tab, status will show device as being Auto Discovered. As

32
long as Use Device Serial Number List remains selected in the Instant-On settings window, only the serial
numbers in the Serial Numbers Filter Table will participate in the Instant-On Security process.
Instant-On Assessment Policy with HPSM 3.3 and older
The policy used in the Instant-On Security feature is labeled as the Initial Assessment Policy and as a best
practice should always reflect the minimum device security required for all devices participating in Instant-On.
Devices participating in Instant-On for the first time will always receive this initial policy. The device will
continue to receive the initial policy during Instant-On unless that device was later assessed with a policy other
than the Initial Assessment Policy. In this case, that particular policy will be applied the next time the device
enters into an Instant-On scenario. Security Manager keeps track of the policy the device was last assessed
with and will always apply that policy during Instant-On.
Instant-On Assessment Policy from HPSM 3.4 onwards
Due to the introduction of autogroup remediation policies HPSM 3.4 will
always
use the selected Initial
Assessment Policy for instant-on remediation when Allow Automatic Remediation is enabled under Instant-On
Security.
This change was made as more choices are now possible with autogrouping and autogroup policies. This will
be explained in next chapter.
Part 3- Autogrouping and autogroup remediation
HPSM 3.4 introduced the option to configure Autogroups with auto group remediation policies. Autogrouping
now includes ability to have one policy automatically remediated when a device is added to the group.
Remediations can occur in these scenarios if the autogroup has a policy assigned to it and under the following
situations:

33
A. Device discovered via Instant-on (only remediate the devices which are added to an autogroup via
instant on)
B. Device discovered via manual or automatic discovery method (only remediate the devices which are
now added to an autogroup)
C. Every x days:hours:minutes:seconds after starting HPSM service (remediate all devices in the
autogroup)
D. An auto group or auto group policy has been changed/edited (remediate all devices in the autogroup)
The actual behavior for the above situations is controlled by different configuration settings in the
HPSM_Service.exec.config file and in the Web.config file. The HPSM_Service.exe.config (in C:\Program Files
(x86)\HP JetAdvantage Security Manager) contains the following configuration settings to define the behavior
<add key="autoGroupDiscoveryAutoRemediationEnable" value="false" />
<add key="autoGroupEditOrDailyRefreshAutoRemediationEnable" value="false" />
<add key="autoGroupFilterExecutionFrequency" value="1:0:0:0" />
The Web.config (in C:\Program Files (x86)\HP JetAdvantage Security Manager\WebApp) contains the following
configuration settings to control this:
<add key="autoGroupEditOrDailyRefreshAutoRemediationEnable" value="false" />
A. Autogroup remediation for devices discovered via instant-on
When a device must receive an autogroup policy after HPSM received the instant-on message, then Allow
Automatic Remediation must be enabled with an Initial Assessment Policy. After receiving an instant on
message HPSM will then first send the Initial Assessment Policy and after that the autogroup policy. It’s
possible to send only the autogroup policy after receiving an Instant-on message by setting the
skipInstantOnPolicy to true in the HPSM_service.exec.config file. The next picture shows the instant-on flow
diagram for HPSM.

35
The same information, but in a different format can be seen in the following table:
Apply Instant-On
Policy (Initial
assesment policy)
Instant-On Policy
(Initial assesment
policy)
Device member of
AutoGroup with Policy
Device member AutoGroup
without Policy, or device
member of manual group or
device only belongs to all
devices
No or NA as the
device is not
member of an
autogroup with
autogroup
policy
No or NA as the
device is not
member of an
autogroup with
autogroup policy
This way at least one policy will always get applied when an Initial Announcement Policy has been activated
B. Autogroup remediation for devices discovered via manual or automatic
discovery
By default when a device is discovered or re-discovered it’s not getting remediated with the autogroup policy
at the time of the discovery. A device might be added or removed from autogroups during discovery . It’s
possible to enforce an immediate remediation when a device is discovered via manual discover of automatic
discovery and when the device is new in the autogroup. This can be done by setting the
autoGroupDiscoveryAutoRemediationEnable to true in the HPSM_service.exe.config file.
The next picture shows the manual/automatic discovery flowchart for HPSM.

37
C. Autogroup remediation at configured time intervals
Devices which are newly added to an autogroup can be remediated at specified time intervals with the
configured autogroup policy. By default this is disabled. In order to enable this the setting
autoGroupEditOrDailyRefreshAutoRemediationEnable must be set to true in the file HPSM_service.exe.config
(in C:\Program Files (x86)\HP JetAdvantage Security Manager) file. After making this change the HP
Jetadvantage Security Manager service needs to be restarted.
The actual frequency can be controlled by changing the value of autoGroupFilterExecutionFrequency (also
located in the HPSM_Service.exe.config file). By default it’s set to “1:0:0:0” which means once a day (meaning
24 hours after starting the HPSM service). If you need to apply a policy to an autogroup to
all
devices in that
autogroup, then you have to schedule a (daily/weekly/monthly) task. The next picture shows the flowchart
for autogroup remediation.

39
D. Autogroup remediation after editing an autogroup or autogroup policy
It’s possible to apply an autogroup policy immediate to all devices in the autogroup after editing the
autogroup or the autogroup policy. This can be done by changing the default value for
autoGroupEditOrDailyRefreshAutoRemediationEnable from false to true in the Web.config file. The following
picture shows the flow diagram for editing an autogroup or editing an autogroup filter.
Part 4 – Performance Implications
Performance on the Security Manager server can definitely suffer in cases of large amounts of device
announcements being received and automatic assessments/remediations being performed. Comparing the
threading model, it is easy to see why it takes much longer to assess 1000 devices discovered thru Instant On
announcements vs. 1000 devices scheduled for an assessment as a scheduled task.

40
Instant On assessment tasks are processed at one device per task because they are received one at a time,
and Security Manager processes a maximum of 10 tasks at a time by default. This number of maximum tasks
at a time can be controlled using a configuration item in the HPSM_Service.exe.config file found under
\Program Files (x86)\HP JetAdvantage Security Manager
<add key="maxNumberTasks" value="10" />
For scheduled assessment tasks, since the number of devices is predefined, a parent task is broken into child
tasks of 25 devices each. Each child task of 25 devices is also threaded at 10 threads simultaneously, just like
Instant On tasks. However the difference here is that instead of one device being assessed in a threaded task,
25 devices are being assessed. Any remediations or credential failures requiring additional credential retries
are performed as one individual task each at the same maximum of 10 threads simultaneously.
A high volume of Instant On device announcements occurring in the background will absolutely affect
performance. If Instant On is being enabled for the first time, expect delays as it takes time to process the
fleet. Scheduled tasks will likely go into a waiting state until these Instant On devices can be processed.
However, it is possible there are a few devices causing such a high volume even after the initial enabling on
Instant On. If many of the messages are coming from one device, it could be because a faulty device is going
off of the network and coming back again. There could also be devices constantly rebooting for some reason.
Try eliminating such devices if suspicions arise they may be responsible for the bulk of Instant On tasks.
The Tasks tab contains a button to view all active Instant On tasks:
This can help to determine if Instant On tasks are constantly bombarding the Security Manager server. It may
boil down to if the fleet is exceptionally large and Instant On seems to be consuming a bulk of the bandwidth,
a separate server may be required to process just the Instant On tasks. This will allow for the “instant”
remediation benefit of Instant On in cases where a device is cold reset, for example. However, it won’t
compromise the ability of the scheduled tasks to keep the entire fleet in compliance if running on a separate
server. A second Security Manager server can be setup as a secondary Instant On listener so the primary
server receiving the device announcements can forward those devices to the secondary server, thus
preserving the discovery portion of Instant On.

41
Part 4 – Summary
Instant-On Security is a high value feature of HP JetAdvantage Security Manager. Enabling this feature allows
supported devices to be automatically discovered, assessed and remediated with the configured security
policy when first placed on the network. When security configuration loss scenarios are experienced by the
device after placement on the network, Instant-On Security automatically keeps the device secure by
remediating the settings out of compliance with the security policy. Used in conjunction with frequently
scheduled assessment and remediation tasks, the supported fleet can be kept security policy compliant with
minimal to no manual intervention. Instant-On supported devices announce themselves directly to the
Security Manager server (mutual authentication is an option) and do not require special network configuration
for successful operation. Instant-On supported devices are a subset of Security Manager supported devices.
The following figure contains a summarized representation of the Instant-On process.

42
Appendix A
Links to other HP Security Manager Whitepapers
There are a lot of whitepapers/manuals available for HP Jetadvantage Security Manager.
The overview on the web, can be found by going to: http://www.hp.com/go/securitymanager
After that click on the link Whitepapers and Support Documents.
This will show the following list:
HP JetAdvantage Security Manager - Policy Editor Settings (white paper)
HP JetAdvantage Security Manager - Reporting, Email Alert Subscriptions & Remediation Summary,
Auditing & Syslog Functionality (white paper)
HP JetAdvantage Security Manager - Using licenses and troubleshooting licensing issues (white
paper)
HP JetAdvantage Security Manager - Securing the HP JetAdvantage Security Manager (white paper)
HP JetAdvantage Security Manager - User Guide
HP JetAdvantage Security Manager - Supported devices and features table
HP JetAdvantage Security Manager - Installation and Setup Guide
HP JetAdvantage Security Manager - Credential Management (white paper)
HP JetAdvantage Security Manager - Release Notes with Ports (white paper)
HP JetAdvantage Security Manager - Tracking Device Identity (white paper)
HP JetAdvantage Security Manager - Instant-On Security (white paper)
HP JetAdvantage Security Manager - Automation Output Feature (white paper)
HP JetAdvantage Security Manager - Sizing and Performance (white paper)
HP JetAdvantage Security Manager - Supported Devices (white paper)
HP JetAdvantage Security Manager - Certificate Management (white paper)
HP JetAdvantage Security Manager - Manage devices with FutureSmart 4.5 Firmware
HP JetAdvantage Security Manager - Using Microsoft® SQL Server (white paper)
HP JetAdvantage Security Manager - Troubleshooting Issues (white paper)

© Copyright 2020 HP Developme nt Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be
construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
c04222990ENW, Rev. 10, Mar 2021
43