Securing Printers

How to Keep a Printer Secure on the UW-Madison Network

There are a number of steps IT Administrators should take to secure a printer:

1. Choosing the right printer

  • The first step in managing printer security begins with choosing the right printer for your department. Do not use home and small office printers as these are usually not prepared to be connected to a high speed           network like UW-Madison's. In addition, these printers are not likely to have a security functionality for printing sensitive information.
  • For shared departmental printing, make sure to select business workgroup printers. Since everything that is printed, copied, faxed, or scanner is stored on the hard drive, it's important to use these printers since they provide disk encryption to protect stored sensitive data and can erase data after the print job has run.

2. Ensuring that printers and multifunction devices are located behind firewalls with open ports limited to only those required or consider moving those devices to campus RFC1918 space.

3. Disabling unneeded protocols, such as FTP, Bonjour, Netware, or Telnet. 

  • Many printers now have insecure and unnecessary protocols enabled by default. Leaving these services enabled provides attackers with the ability to access the printer data directly. Disabling these services prohibits your printer from being used for unintended purposes.

4. Implementing strong passwords on admin or web configuration interfaces. 

5. Encouraging users that need to print from off campus locations to use departmental or WiscVPN.

6. Patching and updating

  • Check for firmware updates on all printer and network devices as part of your regular patch management schedule. Updates can add new or improved security features and patch security holes.






Keywords:Printers, Security, Cybersecurity, Printer, Secure, Securing   Doc ID:62333
Owner:Ed J.Group:Security Awareness
Created:2016-03-29 10:52 CDTUpdated:2016-04-01 09:33 CDT
Sites:DoIT Help Desk, DoIT Staff, Office of Campus Information Security, Security Awareness
Feedback:  0   0