Xerox Device Agent Security and Evaluation Guide

October 2020 Version 6.3
Xerox
Device Agent
Security & Evaluation Guide
®
©2020 Xerox Corporation. All rights reserved.
Xerox®, WorkCentre®, and Phaser®are trademarks of Xerox Corporation in the United States and/or other counties. BR17445
Microsoft®, Windows®, Windows Vista®, SQL Server®, Microsoft®.NET, Windows Server®, Internet Explorer®, Access®, and Windows NT® are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Linux®is a registered trademark of Linus Torvalds.
Apple®, Macintosh®, and MacOS®are registered trademarks of Apple Inc.
Parallels Desktop is a registered trademark of Parallels IP Holdings GmbH.
Hewlett-Packard, JetDirect™, and HP LaserJet are trademarks of Hewlett-Packard Development Company, L.P.
UNIX®is a registered trademark of The Open Group.
VMWare is a registered trademark of VMware, Inc. in the United States and/or other jurisdictions.
To ensure the efficient fulfillment of Xerox service offerings, we leverage global competency centers and cloud technology. This may result in the personal data we process being transferred beyond the European Economic Area (EEA), but within the parameters of the defined service offering. The level of protection afforded by General Data Protection Regulation (GDPR) is not undermined through data transfers, and all transfers undertaken by Xerox are carried out in full compliance with GDPR using an approved mechanism and subject to appropriate safeguards.
Changes are periodically made to this document. Changes, technical inaccuracies, and typographic errors will be corrected in subsequent editions.
Revision History
Version Date Description
6.3 October 2020 support for SQL Server 2019
6.2 May 2020 Changed CloudDM to CloudFM
Updated network traffic for auto update server queries
6.1 October 2019 Added reference to Cloud DM in Auto update.
6.0 May 2019 Support for Windows Server 2019. Remove references to Xerox Print Agent, which is no longer supported. Update branding. Auto upgrade is now set to automatic by default. Ability to re-register device agents in Xerox®Services Manager.
5.6 October 2018 No change
5.5 May 2018 Added note about personal data processing for GDPR. Updated hardware and soft­ware requirements, added details about remote snmp v3 discovery, new recovery services.
5.4 May 2017 Updated supported browsers
5.3 February 2016 Updates supported hardware and software requirements. Added support for Macintosh environments.
5.2 June 2015 Updated recommended hardware and software requirements
Table of Contents
Overview and How to Use this Guide 2
Goals and Objectives 2
Intended Audience 2
Using This Guide 2
Limits to this Guide 3
Introduction to Xerox® Device Agent 4
Product Overview 4
Deployment Requirements 4
Xerox® Device Agent System Component Architecture 4
Recommended Hardware and Operating System Requirements 5
Requirements to Run on a Macintosh Operating System 6
Unsupported Configurations 7
Database Requirements 7
Browser Requirements 7
Printer Requirements 7
Network Printer Discovery/Monitoring Requirements 7
Direct Printer Requirements 8
Security 9
Application 9
Install 9
Licensing 9
Post Install Normal Operation 10
Network Printer 10
SNMP v1-v2 Security 10
SNMP v3 Security 10
Xerox Back Office Integration 11
Device Information Communicated to Xerox 12
Xerox® Device Agent Site Information Sent to Xerox 12
Xerox® Services Manager Initiated Remote Commands to Xerox® Device Agent 13
Xerox®Device Agent Security & Evaluation Guide
i
Xerox® Device Agent Remote Configuration 13
Corporation Security Mode 14
Network Impact 15
Discovery 15
Device Discovery Method 16
IP Sweep Operation 16
Discover SNMP v3 Devices 17
Queue-based Discovery 18
Managing Discovery 18
Discovery Network Data Calculations 18 Manufacturer Applicability 20
Recovery Services to Monitor for Errors 20
Running Recovery Services 20
Disabling Recovery Services Automatic Upload 21
Xerox® Services Manager Integration 21
Registration 22
Device List Import 22
Site Settings Export 22
Site Settings Import 22
Site Status Export 22
Device Information Export 22
Remote Command Check 23
Auto Update 23
Version Check 23 Update Download 23
Xerox®Device Agent Security & Evaluation Guide
ii
Tables and Figures
Figure 1: Typical Xerox® Device Agent Deployment 5 Table 1: Printer Data Communicated to Xerox 12 Table 2: Xerox® Device Agent Site Information Sent to Xerox 13 Table 5: Remote Configuration 14 Table 6: Xerox® Device Agent Ports 15 Table 7: Data Sizes 19 Table 8: Data Gathering Frequencies 19
Xerox®Device Agent Security & Evaluation Guide
iii

Overview and How to Use this Guide

Overview and How to Use this Guide

Goals and Objectives

Network and data security are one of the many challenges that businesses face on a daily basis. Recognizing this, Xerox continues to engineer and design all of its products to ensure the highest level of security possible.
This document provides additional background on the Xerox®Device Agent software capabilities, and specifically focuses on the software’s security aspects. This document covers all Xerox®Device Agent configurations, and some items may not apply to the version you have. This document will help you better understand how the applicationfunctions and will help you feel confident that it transmits device data in a secure and accurate manner. This guide will help you certify, evaluate, and approve the deployment of Xerox®Device Agent in support of your contract. It includes information on the application's potential impact on security and network infrastructure as well as calculations of theoretical network traffic.
We recommend that you read this document in its entirety and take appropriate actions consistent with your information technology security policies and practices. You have many issues to consider in developing and deploying a security policy within your organization. Since these requirements will vary from customer to customer, you have the final responsibility for all implementations, re-installations, and testing of security configurations, patches, and modifications.

Intended Audience

It is expected that this guide will be used by your network administrator before installing Xerox® Device Agent. In order to get the most from this guide, you should have an understanding of:
l the network environment where you will install Xerox
l any restrictions placed on applications that are deployed on that network, and
l the Microsoft Windows
operating system
Device Agent,

Using This Guide

There are two main scenarios for using this guide:if you are a customer who does not have acceptance and evaluation procedures for this type of software or if you are a customer who has defined guidelines. In both cases, the three identified areas of concern are security, impact to the network infrastructure, and what other resources might be required to install, use, and support Xerox®Device Agent.
Use this guide to gather information about these areas and determine if you need to investigate Xerox Device Agent further. This document is divided into these areas:
l This overview
l An introduction to Xerox
l Potential security-related impacts to a typical customer environment including:
Device Agent
l Security information, implications, and recommendations
l Roles and permission requirements of Xerox
Device Agent users
Xerox®Device Agent Security & Evaluation Guide
2
Overview and How to Use this Guide
l Information about features that impact the network, which may include estimates of generated traffic,
changes to the network infrastructure, or other required resources.

Limits to this Guide

This guide is meant to help you evaluate this application, but it cannot be a complete information source for all potential customers. This guide proposes a hypothetical customer printer environment; if your network environment differs from the hypothetical environment, your network administration team and Xerox Support Representative must understand the differences and decide on any certification modifications and/or future steps. Additionally:
l This guide only describes those features within the application that have some discernable impact to the
overall customer network environment, whether it be the overall network, security, or other customer resources.
l The guide’s information is related to the application's current release. Although much of this inform-
ation will remain constant through the software’s life cycle, some of the data is revision-specific, and will be revised periodically. IT organizations should check with the Xerox Support Representative to obtain the appropriate version.
Xerox®Device Agent Security & Evaluation Guide
3

Introduction to Xerox® Device Agent

Introduction to Xerox® Device Agent

Product Overview

Xerox®Device Agent discovers and monitors printing devices, specifically office printers and multi-function devices.
The application features a built-in alert detection system and has the capability to send an e-mail message to an appropriate user when certain conditions exist in the monitored devices. It also provides clear and concise status of all networked printers.
You can do the following from Xerox®Device Agent:
l Discover printers
l Notify users via e-mail when faults occur
l Monitor printers for status and alert conditions
The application supports industry-SNMP MIBs for network printers; however, the amount and type of management that it can provide is dependent on the printer’s level of conformance to those standards. The following features conform to these standards:
l Printer identity (i.e. model, serial number, manufacturer, etc.)
l Printer properties (i.e. input trays, output bins, serial number, etc.)
l TCP/IP protocol suite (SNMP, TCP, UDP, IP, NIC details)
l Supported print protocols (LPD, HTTP, Port 9100)
l Consumables and levels (toner, fuser, print cartridge and device unique parts)
l Printer status including overall state, detailed status, UI messages, etc.
Note: A single instance of Xerox®Device Agent supports a maximum of 2000 network print devices. Consumers with more than 2000 network print devices will install an additional instance of the application on a different server or PC to support the remaining networked print devices

Deployment Requirements

To deploy the application install it on a desktop computer or server that has internet access and shares the network with those printers that you want to monitor.
Note: The scheduled events for meter reads and alert activity may be affected by thesoftware's connectivity.

Xerox®Device Agent System Component Architecture

This diagram shows a typical configuration that a customer may deploy within their network. In this example, Xerox®Device Agent runs on a networked computer that can access the printers through the local network.
Xerox®Device Agent Security & Evaluation Guide
4
Introduction to Xerox® Device Agent
Figure 1: Typical Xerox®Device Agent Deployment

Recommended Hardware and Operating System Requirements

Item Requirement
Operating Sys­tem (32-bit and 64-bit)
l Windows Server
l Windows Server
l Windows Server
l Windows
l Windows
l Apple
®
®
2012 and 2012 R2
®
2016
®
2019
®
8.1
®
10 Professional, Enterprise
OS 10.9.4 or later when run with the Parallels®Desktop hardware emulation software. Go to the Requirements to Run on a Macintosh Operating System section for requirement details.
l Microsoft
®
.NET framework 4.5.2 Extended (Full Version) installed
Database Server l SQL Server®Compact Edition
l SQL Server
l SQL Server
l SQL Server
l SQL Server
®
2012 SP3
®
2014 SP2
®
2016 SP2
®
2017
Xerox®Device Agent Security & Evaluation Guide
5
Loading...
+ 18 hidden pages