Hi Micronetters, just as an FYI we have scanned and will continue to
scan all devices connected to the campus network, including printers and
multifunction devices, for known vulnerabilities. Many of you must know
this as you have received security notifications from us concerning
out-of-date or m
Denying access to ports 9100 (JetDirect), 631 (IPP), and 515 (LPD) from
off-campus sources would alleviate the problem. Pretty easy to implement
campus wide. Then the SNS group may restart scanning public printers (I
don't know why they stopped a year ago) for known vulnerabilities.
Best,
Igor
On
Thanks for doing the research for these options and testing them. I have to
admit that I was at a bit of a loss reading the security.berkeley.edu site
about all the best practices, and having no idea about how to approach it.
Between this and the OS updates, I feel pretty overwhelmed so I'm ever
gr
Access controls are not enough? Admittedly the Ricohs only have five
address range slots which makes complex network access control a bit
more of a challenge.
You are exclusively Macs, so LPR is probably all you need?
Graham
On 3/30/16 2:05 PM, Baril wrote:
> To all,
>
> Well if you all "thoug
To all,
Well if you all "thought" you had your printer settings locked down,
then I guess we were proven wrong with all the printer spam spewing from
our printers. I have read the Storify piece on "Weev" (below link) and
gleaned enough info out of it to apply further controls on my printers
he