HP JetAdvantage Security Manager 10 Device E-LTU Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Non HP JetAdvantage Security Manager 10 Device E-LTU. HP JetAdvantage Security Manager User Guide Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer

Résumé du contenu

Page 1 - User Guide

HP JetAdvantage Security ManagerUser Guide

Page 2

Common controls and noticationsThis section provides the controls and notications consistent across all pages in Security Manager.●Common controls i

Page 3 - Table of contents

What you must provideThe following are the basic requirements to use Security Manager:●A supported Microsoft Windows computer.The following Microsoft

Page 4

8 Chapter 2 Getting started with Security Manager ENWW

Page 5 - 1 Introduction

3 Set up Security ManagerUse the instructions in this section to set up the Security Manager settings.Congure the Security Manager settings:1.Log int

Page 6

Verify device remediation and hostname resolutionHP recommends to verify the global remediation setting that controls whether an out-of-compliance dev

Page 7

Install licensesLicenses are provided using a license le. Install a Security Manager device license to assess and remediate the devices on the networ

Page 8

●Security Manager tried to install the same license le.●Security Manager tried to install a corrupted or invalid license le.12 Chapter 3 Set up Se

Page 9

Set up Instant On SecurityHP Enterprise printers running the latest rmware version use the Instant-On Security and the HP Device Announcement Agent f

Page 10

4. Select the Accept Device Announcements check box, and then click OK in the conrmation dialog box to enable communication with port 3329.5. Select

Page 11 - What you must provide

8. Select a policy from the Initial Assessment Policy drop down box to ensure new devices are compatible with the requirement.The valid policies are s

Page 12

© Copyright 2017 HP Development Company, L.P.Reproduction, adaptation, or translation without prior written permission is prohibited, except as allowe

Page 13 - 3 Set up Security Manager

Congure the email server settingsUse the Automated Output setting option to congure the email server to authenticate and send email notications whe

Page 14

Set up global credentialsGlobal credentials are used as part of the device verication process when performing tasks which include device discovery, v

Page 15 - Install licenses

18 Chapter 3 Set up Security Manager ENWW

Page 16

4 Use Security ManagerThis section discusses how to add and edit device information, create a policy, assess and remediate, and run reports.To view th

Page 17 - Set up Instant On Security

Create a security policyUse the Policies page to create, edit, and import a policy. Select a policy or policies to congure the settings using the Pol

Page 18

1. Log into Security Manager, and then select the Policies tab.2.Hover on the left navigation pane, and then select the New Policy icon ( ).3. Comple

Page 19

●Set severity, remediation, and unsupported behavior to policy items in Quick SettingsPolicy editor iconsThe following lists the icons used in the pol

Page 20

–Enable: Security Manager changes out-of-compliance items on the device to match the policy's setting.–Disable: Security Manager reports out-of-c

Page 21 - Set up global credentials

NOTE: For invalid policy settings, the policy items will display in red font.An error panel will display below the policy item panel name and will inc

Page 22

Import a policy1. Log into Security Manager, and then select the Policies tab.2.Hover on the left navigation pane, and then click the Import Policies

Page 23 - 4 Use Security Manager

Table of contents1 Introduction ...

Page 24 - Create a security policy

Add and edit device informationSecurity Manager enables you to add devices using any of the following features:●Discover Devices in the Devices page.F

Page 25 - Edit a policy

The Groups section displays the device group names in a hierarchical order.For more information about editing groups, see Manage GroupsDiscover device

Page 26 - Policy editor icons

NOTE: Security Manager will use the credentials set in the Global Credentials when discovering devices.Follow these steps to manually discover and add

Page 27

–New Task — Allows you to create, assess or assess and remediate, and schedule a task for a device group or multiple groups. A task cannot be created

Page 28 - Export and Import policies

NOTE: For unsupported printers, Not Veried displays in the Supported column of the Device list panel. For a list of supported printers, see What you

Page 29

1. Log into Security Manager, and then select the Devices tab.2.Hover on the left navigation pane, and then click the Manage Groups icon ( ).3. On th

Page 30 - Create a group

Assign a license manuallyUse the Devices tab to manually assign licenses from the license pool to selected devices.NOTE: For more information about in

Page 31 - Discover devices

a. On the SNMP Credentials section, complete the following tasks to set the SNMP credentials:i. To set the SNMP v1/ v2 Read Community Name, select the

Page 32 - Devices page navigation

a. Make sure to select a device in the Device list panel.b. Select Yes to conrm the reset credential operation.-or-Select No to cancel the reset cred

Page 33 - Export device addresses

Assess and remediateAfter devices are added and policies are created, view or create a task to run an assessment for a selected device group in the Ta

Page 34 - Manage Groups

Devices page navigation ...

Page 35

NOTE: This option is disabled when Security Manager uses a demo license.6. Select the Email Results check box when the task type selected is Assess an

Page 36 - Set device credentials

–Type — Displays the task type initiated for a device group (Discovery, Verify, Assess Only, Assess and Remediate). A task cannot be created for an in

Page 37

View results from the Devices pageFollow these steps to view results from the Devices page:1. Log into Security Manager, and then select the Devices t

Page 38 - Set SSL/TLS enforcement

Run reportsReports provide administrators detailed information and compliance of each devices.The following reports are available:●Executive SummaryRe

Page 39 - Assess and remediate

40 Chapter 4 Use Security Manager ENWW

Page 40 - Task page navigation

A Use the Security Manager certicate management solutionFor Security Manager to submit successful certicate signing requests to the chosen certicat

Page 41 - View assessment results

42 Appendix A Use the Security Manager certicate management solution ENWW

Page 42

B Network port assignmentsThis section lists the ports that Security Manager uses.Table B-1 Ports used from the Security Manager service to the print

Page 43 - Run reports

Table B-4 Port used from the device to the Security Manager serviceService Port IP Protocol NotesHP Instant-On Security or hp-device-disc (IANA name)

Page 44

C Legal statementsThis section contains the legal statements.●End User License Agreement●CopyrightsENWW 45

Page 45

1 IntroductionHP JetAdvantage Security Manager (Security Manager) is a security compliance solution for a eet of HP products. It enables administrato

Page 46

End User License AgreementREAD CAREFULLY BEFORE USING THIS SOFTWARE EQUIPMENT: This End-User license Agreement ("EULA") is a legal agreement

Page 47 - B Network port assignments

any Microsoft operating system software contained in such recovery solution shall be governed by the Microsoft License Agreement.2. UPGRADES. To use a

Page 48

To the extent permitted by applicable law, by accepting these terms and conditions you consent to the collection and use of anonymous and personal dat

Page 49 - C Legal statements

13. CAPACITY AND AUTHORITY TO CONTRACT. You represent that you are of the legal age of majority in your state of residence and, if applicable, you are

Page 50 - End User License Agreement

CopyrightsThis product includes software developed by the following.●log4net license●nhibernate licenselog4net licenseThe log4net license is subject t

Page 51

the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contributi

Page 52

6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as r

Page 53

service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free pro

Page 54 - Copyrights

The precise terms and conditions for copying, distribution and modication follow. Pay close attention to the dierence between a "work based on

Page 55

supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.(For example, a function in a

Page 56

2 Chapter 1 Introduction ENWW

Page 57

If such an object le uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or

Page 58

a. Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distri

Page 59

conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version

Page 60

2 Getting started with Security ManagerSecurity Manager version 3.0 is a web-based application supported by the following browsers:●Internet Explorer

Page 61

The Dashboard page is the default page that displays after a successful login. It provides a graphical overview of the device eet which includes the

Page 62

–Settings: Allows you to congure global settings.–About HPSM: Displays a graphical overview of the software.–Help: Provides information and instructi

Commentaires sur ces manuels

Pas de commentaire