On Sept 25th, media sources announced security vulnerabilities in the Bash shell software (aka Shellshock). Understandably, Xerox customers are concerned about these vulnerabilities.
Unix and Unix-derived systems like Linux and Mac OS X are vulnerable to these attacks since they use Bash as the default command shell. The FreeFlow Print Server (FFPS) includes the Solaris Operating System, which is potentially affected since it includes the Bash shell.
A document addressing this vulnerability and describing a tool for updating FreeFlow Print Server has been posted to the URL www.xerox.com/security.
Xerox Remote Services Security White Paper v1.0.10 (PDF 841.4K) July 08, 2014 NOTE: This updated document describes the system components, interoperability, and features available for securing Xerox Remote Services within Xerox products. It is intended to serve as a guide for deploying Xerox Remote Services within a network environment.
Microsoft Windows XP End of Support: What You Need to Know V1.0 (PDF 90.6K) April 04, 2014 IMPORTANT SUPPORT INFORMATION This document details the Xerox Products affected by both the End Of Life of Microsoft Windows XP on standalone Digital Front Ends (EFI FIERY AND CREO) and Microsoft Windows XPe (XP embedded) controllers on CF devices.
ISO 27001 Security Certification (PDF 2.4M) December 13, 2011 Xerox ISO 27001 Security Certifications This document will detail the Xerox commitment to the ISO 27001 Security Certification, what it is, and the certification Plan-Do-Check-Act Process Model.
Xerox and Information Security (PDF 3.3M) November 29, 2011 Information Security with Xerox Products Protecting your data so you can focus on what matters: the success of your business or organization.
Xerox Secure Print (PDF 582K) April 05, 2011
Do you avoid printing private or confidential documents on workgroup devices? Now you can use Xerox® Secure Print to control the print timing of any document, without worrying about security.
Internal Hard Drive File Security for Phaser Printer Models (PDF 1.3M) June 23, 2010
This document details the types of data stored on the internal hard disk and describes how to use both the Secure File Overwrite feature and the Automatic File Deletion feature. It also contains instructions on setting security features. This document applies to a variety of Phaser models. For a complete list, see inside the document.
Xerox Secure Access Unified ID System (PDF 2.2M) April 16, 2010
This brochure describes how Xerox devices can use your existing access control magnetic or proximity cards to allow access to Print, Copy, Scan, and Fax. Gain flexibility with Follow-You printing while also saving user time. See how your unique ID card may be able to open more than the front door.
Xerox and the P2600 Security Working Group (PDF 359K) April 16, 2010
This document describes how Xerox has been working with the IEEE from the start to help author and comply with the P2600 Security specification. Now that the standards are written, see how this benefits our customers.
Use of CA-signed Digital Certificates for Better Security (PDF 38.6K) March 16, 2009
This document describes a solution to prevent exploit of a vulnerability in the MD5 algorithm that can affect WorkCentre® and WorkCentre Pro® devices. This vulnerability could allow attackers to create forged X.509 certificates to use in phishing attacks or impersonating legitimate sites.