Xerox®, WorkCentre®, and Phaser®are trademarks of Xerox Corporation in the United States and/or other
counties. BR17445
Microsoft®, Windows®, Windows Vista®, SQL Server®, Microsoft®.NET, Windows Server®, Internet
Explorer®, Access®, and Windows NT® are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
Linux®is a registered trademark of Linus Torvalds.
Apple®, Macintosh®, and MacOS®are registered trademarks of Apple Inc.
Parallels Desktop is a registered trademark of Parallels IP Holdings GmbH.
Hewlett-Packard, JetDirect™, and HP LaserJet are trademarks of Hewlett-Packard Development Company,
L.P.
UNIX®is a registered trademark of The Open Group.
VMWare is a registered trademark of VMware, Inc. in the United States and/or other jurisdictions.
To ensure the efficient fulfillment of Xerox service offerings, we leverage global competency centers and
cloud technology. This may result in the personal data we process being transferred beyond the European
Economic Area (EEA), but within the parameters of the defined service offering. The level of protection
afforded by General Data Protection Regulation (GDPR) is not undermined through data transfers, and all
transfers undertaken by Xerox are carried out in full compliance with GDPR using an approved mechanism
and subject to appropriate safeguards.
Changes are periodically made to this document. Changes, technical inaccuracies, and typographic errors
will be corrected in subsequent editions.
Revision History
VersionDateDescription
6.3October 2020support for SQL Server 2019
6.2May 2020Changed CloudDM to CloudFM
Updated network traffic for auto update server queries
6.1October 2019Added reference to Cloud DM in Auto update.
6.0May 2019Support for Windows Server 2019. Remove references to Xerox Print Agent, which
is no longer supported. Update branding. Auto upgrade is now set to automatic
by default. Ability to re-register device agents in Xerox®Services Manager.
5.6October 2018No change
5.5May 2018Added note about personal data processing for GDPR. Updated hardware and software requirements, added details about remote snmp v3 discovery, new recovery
services.
5.4May 2017Updated supported browsers
5.3February 2016Updates supported hardware and software requirements. Added support for
Macintosh environments.
5.2June 2015Updated recommended hardware and software requirements
Table of Contents
Overview and How to Use this Guide2
Goals and Objectives2
Intended Audience2
Using This Guide2
Limits to this Guide3
Introduction to Xerox® Device Agent4
Product Overview4
Deployment Requirements4
Xerox® Device Agent System Component Architecture4
Recommended Hardware and Operating System Requirements5
Requirements to Run on a Macintosh Operating System6
Xerox® Device Agent Site Information Sent to Xerox12
Xerox® Services Manager Initiated Remote Commands to Xerox® Device Agent13
Xerox®Device Agent Security & Evaluation Guide
i
Xerox® Device Agent Remote Configuration13
Corporation Security Mode14
Network Impact15
Discovery15
Device Discovery Method16
IP Sweep Operation16
Discover SNMP v3 Devices17
Queue-based Discovery18
Managing Discovery18
Discovery Network Data Calculations18
Manufacturer Applicability20
Recovery Services to Monitor for Errors20
Running Recovery Services20
Disabling Recovery Services Automatic Upload21
Xerox® Services Manager Integration21
Registration22
Device List Import22
Site Settings Export22
Site Settings Import22
Site Status Export22
Device Information Export22
Remote Command Check23
Auto Update23
Version Check23
Update Download23
Xerox®Device Agent Security & Evaluation Guide
ii
Tables and Figures
Figure 1: Typical Xerox® Device Agent Deployment5
Table 1: Printer Data Communicated to Xerox12
Table 2: Xerox® Device Agent Site Information Sent to Xerox13
Table 5: Remote Configuration14
Table 6: Xerox® Device Agent Ports15
Table 7: Data Sizes19
Table 8: Data Gathering Frequencies19
Xerox®Device Agent Security & Evaluation Guide
iii
Overview and How to Use this Guide
Overview and How to Use this Guide
Goals and Objectives
Network and data security are one of the many challenges that businesses face on a daily basis.
Recognizing this, Xerox continues to engineer and design all of its products to ensure the highest level of
security possible.
This document provides additional background on the Xerox®Device Agent software capabilities, and
specifically focuses on the software’s security aspects. This document covers all Xerox®Device Agent
configurations, and some items may not apply to the version you have. This document will help you better
understand how the applicationfunctions and will help you feel confident that it transmits device data in a
secure and accurate manner. This guide will help you certify, evaluate, and approve the deployment of
Xerox®Device Agent in support of your contract. It includes information on the application's potential
impact on security and network infrastructure as well as calculations of theoretical network traffic.
We recommend that you read this document in its entirety and take appropriate actions consistent with
your information technology security policies and practices. You have many issues to consider in
developing and deploying a security policy within your organization. Since these requirements will vary
from customer to customer, you have the final responsibility for all implementations, re-installations, and
testing of security configurations, patches, and modifications.
Intended Audience
It is expected that this guide will be used by your network administrator before installing Xerox® Device
Agent. In order to get the most from this guide, you should have an understanding of:
l the network environment where you will install Xerox
l any restrictions placed on applications that are deployed on that network, and
l the Microsoft Windows
®
operating system
®
Device Agent,
Using This Guide
There are two main scenarios for using this guide:if you are a customer who does not have acceptance
and evaluation procedures for this type of software or if you are a customer who has defined guidelines. In
both cases, the three identified areas of concern are security, impact to the network infrastructure, and
what other resources might be required to install, use, and support Xerox®Device Agent.
Use this guide to gather information about these areas and determine if you need to investigate Xerox
Device Agent further. This document is divided into these areas:
l This overview
l An introduction to Xerox
l Potential security-related impacts to a typical customer environment including:
®
Device Agent
®
l Security information, implications, and recommendations
l Roles and permission requirements of Xerox
®
Device Agent users
Xerox®Device Agent Security & Evaluation Guide
2
Overview and How to Use this Guide
l Information about features that impact the network, which may include estimates of generated traffic,
changes to the network infrastructure, or other required resources.
Limits to this Guide
This guide is meant to help you evaluate this application, but it cannot be a complete information source
for all potential customers. This guide proposes a hypothetical customer printer environment; if your
network environment differs from the hypothetical environment, your network administration team and
Xerox Support Representative must understand the differences and decide on any certification
modifications and/or future steps. Additionally:
l This guide only describes those features within the application that have some discernable impact to the
overall customer network environment, whether it be the overall network, security, or other customer
resources.
l The guide’s information is related to the application's current release. Although much of this inform-
ation will remain constant through the software’s life cycle, some of the data is revision-specific, and will
be revised periodically. IT organizations should check with the Xerox Support Representative to obtain
the appropriate version.
Xerox®Device Agent Security & Evaluation Guide
3
Introduction to Xerox® Device Agent
Introduction to Xerox® Device Agent
Product Overview
Xerox®Device Agent discovers and monitors printing devices, specifically office printers and multi-function
devices.
The application features a built-in alert detection system and has the capability to send an e-mail message
to an appropriate user when certain conditions exist in the monitored devices. It also provides clear and
concise status of all networked printers.
You can do the following from Xerox®Device Agent:
l Discover printers
l Notify users via e-mail when faults occur
l Monitor printers for status and alert conditions
The application supports industry-SNMP MIBs for network printers; however, the amount and type of
management that it can provide is dependent on the printer’s level of conformance to those standards. The
following features conform to these standards:
l Printer identity (i.e. model, serial number, manufacturer, etc.)
l Printer properties (i.e. input trays, output bins, serial number, etc.)
l TCP/IP protocol suite (SNMP, TCP, UDP, IP, NIC details)
l Supported print protocols (LPD, HTTP, Port 9100)
l Consumables and levels (toner, fuser, print cartridge and device unique parts)
l Printer status including overall state, detailed status, UI messages, etc.
Note: A single instance of Xerox®Device Agent supports a maximum of 2000 network print devices.
Consumers with more than 2000 network print devices will install an additional instance of the application
on a different server or PC to support the remaining networked print devices
Deployment Requirements
To deploy the application install it on a desktop computer or server that has internet access and shares the
network with those printers that you want to monitor.
Note: The scheduled events for meter reads and alert activity may be affected by thesoftware's
connectivity.
Xerox®Device Agent System Component Architecture
This diagram shows a typical configuration that a customer may deploy within their network. In this
example, Xerox®Device Agent runs on a networked computer that can access the printers through the
local network.
Xerox®Device Agent Security & Evaluation Guide
4
Introduction to Xerox® Device Agent
Figure 1: Typical Xerox®Device Agent Deployment
Recommended Hardware and Operating System Requirements
ItemRequirement
Operating System (32-bit and
64-bit)
l Windows Server
l Windows Server
l Windows Server
l Windows
l Windows
l Apple
®
®
2012 and 2012 R2
®
2016
®
2019
®
8.1
®
10 Professional, Enterprise
OS 10.9.4 or later when run with the Parallels®Desktop hardware emulation software.
Go to the Requirements to Run on a Macintosh Operating System section for requirement
details.