Re: [Micronet] Printer spam.....

2016-03-30 Thread Allison Henry
Hi Micronetters, just as an FYI we have scanned and will continue to scan all devices connected to the campus network, including printers and multifunction devices, for known vulnerabilities. Many of you must know this as you have received security notifications from us concerning out-of-date or m

Re: [Micronet] Printer spam.....

2016-03-30 Thread Igor Savine
Denying access to ports 9100 (JetDirect), 631 (IPP), and 515 (LPD) from off-campus sources would alleviate the problem. Pretty easy to implement campus wide. Then the SNS group may restart scanning public printers (I don't know why they stopped a year ago) for known vulnerabilities. Best, Igor On

Re: [Micronet] Printer spam.....

2016-03-30 Thread Beth Muramoto
Thanks for doing the research for these options and testing them. I have to admit that I was at a bit of a loss reading the security.berkeley.edu site about all the best practices, and having no idea about how to approach it. Between this and the OS updates, I feel pretty overwhelmed so I'm ever gr

Re: [Micronet] Printer spam.....

2016-03-30 Thread Graham Patterson
Access controls are not enough? Admittedly the Ricohs only have five address range slots which makes complex network access control a bit more of a challenge. You are exclusively Macs, so LPR is probably all you need? Graham On 3/30/16 2:05 PM, Baril wrote: > To all, > > Well if you all "thoug

[Micronet] Printer spam.....

2016-03-30 Thread Baril
To all, Well if you all "thought" you had your printer settings locked down, then I guess we were proven wrong with all the printer spam spewing from our printers. I have read the Storify piece on "Weev" (below link) and gleaned enough info out of it to apply further controls on my printers he