Time
2 hours 27 minutes
Difficulty
Intermediate
CEU/CPE
3

Video Transcription

00:00
Welcome back toe intermediate endpoint security course.
00:04
And in this lesson, we're going to talk about protecting printing devices in particular, about how to protect hardware and them. I said, Hardware, I don't mean the physical,
00:14
mechanical parts of printers, but the low level things off printers like their operating system
00:23
on also how to manage print devices.
00:28
So when we talk about print devices were talking about printers and multi function devices, or MFP so devices that are primarily designed to print. But they can also copy scans and the e mails
00:43
s and those can documents to some shared folder or
00:49
some data flow. So they have, ah, similar rural structure, like PC's, except for the printing part, of course. So they have for which is, in their case, both like bios and always in one
01:10
because you don't have bio, some printers and then you install operating system. No BIOS contains everything contains low level operations and high level operations
01:22
and then on most of them. Today you have the possibility to install extenders or plug ins or APS, and they are equivalent to what we have is programs or applications on a PC.
01:38
What is logical is that there is no anti virus. Software for printers are no anti Melber, so there is no watchdog that sits there and sees if some application is doing something wrong.
01:53
One of the reason is there. If you have ah, printing device in most of the cases, there will be no external applications installed. A toll. Imagine, like having, uh, android or Apple phone without any app. So everything you have came from the manufacturer
02:09
eso they're they're just a few and they're installed
02:15
on may be less than 10 to 15% of pressed printing new printing devices that are in use today. So they're used just for some special things like, for example, authentication with
02:28
ah key card or some kind of accounting or similar stuff.
02:36
Um, so what we do with printing devices instead of for a mediation, which is what essentially anti Melber software does is it detects that the program is malicious
02:51
and then stops it from functioning. War stops it from being saved on the hard drive.
02:55
We're looking with printing devices for prevention, so we're basically trying to find instead of having a cure, we're trying to stop the infection in the first place.
03:09
How do we do that? We try to secure the hardware, meaning the firmer and bias of the device so that we make sure that they're solid, that they're not infected. And then to strictly control
03:25
the installation off applications in a way that nobody without the proper
03:32
rights can actually do it.
03:37
If you want to look more into these things, you can look at Prince Security Intermediate course that I have recently created for
03:47
Sai Buri. And there you can find details of how these things are done. But essentially, what we're trying to do is to prevent any outlaw authorized access to the device.
04:00
So when we talk about managing these devices,
04:02
um
04:04
ah,
04:06
first thing you have to do is to have some kind of fleet overview. This is the low end off managing printing devices, so you have to have some software that will have a list of devices cereal, man numbers, micro dresses,
04:25
off course models and settings, and substance would go with that.
04:30
And the second thing is, all these devices have something called embedded Web Server, which is basically a small server toe which you connect by typing the I p address of the printer,
04:42
and then you basically connect toe Web server that is inside the device,
04:48
and you get the pages in which you can do ALS the settings of the device.
04:55
Ideally, you shouldn't be using inventive observer a toll for managing the device. You should just protected with password and then have ah fleet management software due to
05:11
to use it toe dual the settings of the device,
05:15
especially that makes sense, especially if you have lot of devices. So you then no, no longer going to do the settings of devices in one on one sessions where you connect one day I set it, then the next one and set it and so on. No, you would put them in groups. For example, if you have
05:33
2000 printers in a company or 200 printers in the company and 20% of them are the same model,
05:40
it makes sense that all of them will have the same setting. So you set settings on one,
05:45
and then you will replicate them on all the others.
05:49
The second thing you do need to manage on the devices when printing devices these applications, or APS or add owns or plug ins, however, the manufacturer is calling them
06:04
on. Basically, you need to see what's installed there, and you have to be able to monitor
06:11
if something else gets installed.
06:14
Um, in my experience, unlike with PC's, you can have AH virus program or MALBERT program on a PC that is essentially hidden on printing devices. That is not possible. So if you have some maps that it shouldn't that shouldn't be there.
06:30
It should show immediately in,
06:32
uh, APS management part off your print fleet management software.
06:40
So the next thing you need to manage is access management, and basically you need to accept manager not only who can access the device. This is usually done by user name and password, but also you can manage from which,
06:57
and this is dependent on a device. Not all devices have it,
07:00
but you need to be able to many trim from which I P addresses in your network can embedded observer or
07:11
management of the device be done. So you set it on a device and say OK, the only way to access it is from the server where the fleet management software is installed
07:21
and maybe from some other. For example, if you have all dedication and the wise, it's probably done on a different server. So that's American. Also access things in a device
07:32
and maybe one machine that belongs to some but the who is administrator and is in charge of administering these things.
07:42
So you put these three addresses and your find nobody else can. Even if they have a PC of ah user in the company or somebody who is employed there or even some other administrator, the device simply won't let them in.
07:59
Um, also, you can have multi factor and dedication on devices, which means that you can put some kind off,
08:09
um, not only password, but also key card or fingerprint. So
08:16
and at the end, you can do the physical monitoring so that you could see if somebody has another without authorization, for example, open the device and change the form a terror board of it or something like that.
08:30
So at the end off this lessons do quick learning trick. And the question is, why do we need to protect printing devices? And the possible question answers are to protect other devices the network toe protect companies from liability or to reduce printing,
08:46
and the correct answer is to protect
08:50
devices on the network.
08:52
So in this video you have learned about how to protect printers on the hard level and how to manage printing devices. And in excellent lesson, I'm going to talk about protecting operating system off PC.

Up Next

Intermediate Endpoint Security

In this course, students will learn the importance of endpoint security. The course will cover fundamentals of protecting hardware assets, operating systems, applications, and network devices.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor