Security Assessment Wizard

Security Assessment Wizard

As printing devices become more sophisticated, they also become more vulnerable to security breaches. Our Printer Security Assessment allows you to better understand your printer's security stance. That way, each connection and data exchange can be carefully controlled to ensure that information is protected and available to authorized users only.
Before implementing any recommended changes from the Security Assessment Wizard, you should verify them in a test environment before implementing across your printer network.
To use the Security Assessment Wizard:
  1. From the Printer Dashboard, tap
    Run Assessment
    .
    The Security Assessment welcome screen displays.
  2. Tap
    Scan Now
    .
  3. Tap the communication interface you use for normal printing operations. You can choose from:
    • Bluetooth
    • Wired Ethernet
    • Wireless
    • Local
    There is only a single menu option for Bluetooth; if selected, it will use either the Bluetooth Classic or Bluetooth LE option you chose for your connectivity.
    The Security Assessment wizard scans for risks. Once the scan is finished, the results display on the Security Assessment screen.
    Assessment Results (Collapsed)
    Assessment results screen sub-sections collapsed
    Assessment Results (Expanded)
    Assessment results screen - sub-sections expanded
    Risk Indicators
    Icon
    Indicator
    no risk indicator icon
    No risk.
    moderate risk indicator icon
    Moderate risk that may need to be addressed.
    high-level risk indicator icon
    High-level risk that should be addressed.
    no risk-no feature indicator icon
    No risk associated because the feature is not in use or enabled on the printer.
    You can sort the risk results by tapping
    Sort
    and selecting:
    • Risk Category (Default)
    • Risk Severity (High to Low)
    • Risk Severity (Low to High)
  4. From the Security Assessment screen, tap a
    Risk
    to display the Risk Details screen.
    Risk Details Screen (example)
    risk details example screen
    The Risk Detail screen provides detailed insights into identifies risks, including the following:
    • Category
      - Specifies the classification of the risk.
    • Description
      - Explains the nature of the identified risk.
    • Considerations
      - Provides suggestions for addressing or mitigating the risk.
    • Control Commands
      - Displays the control commands associated with the risk.
  5. To have the full report sent to you via email, tap
    Email Full Report
    .
    email full report screen
    The Email Full Report screen displays.
    An email account is required to be setup on your device to email the security report. The default email application for your mobile device is used to send the report.
  6. Enter your email and tap
    Send Report
    . Tap Dismiss at the
    Report Sent
    prompt.
    After you enter your email and submit, you will have the option to select an email client.