Solved

Windows security when print

Posted on 2013-05-29
3
279 Views
Last Modified: 2013-05-31
Hi all,
even I deny permisions to print to an speciific printer users reache it and print
i don't know what happend but
are users with windows 7 64 bit machines,
how can i block that %#$% for print no more in my printers?
tsm
0
Comment
Question by:edo60
  • 2
3 Comments
 
LVL 7

Expert Comment

by:eerwalters
ID: 39206427
You need to lock down the printer so only the print server and admin workstations can reach it.  Then you can restrict who can use that print queue.


  Check the Event log to see if they  are printing thru your print server or if they are printing directly to the printer.

  What is the Make/Model of the printer?
  Are you using a print server?  If so, what OS/version is it?
0
 

Author Comment

by:edo60
ID: 39208328
is as you say, has a print server
is a xerox phaser
0
 
LVL 7

Accepted Solution

by:
eerwalters earned 500 total points
ID: 39209561
I am referring to a network print server (Windows or Linux print server) as opposed to an internal NIC on the Phaser, which some call a "print server".

  If it's a Windows server where you are denying permissions, then 1 step is done.

Next step:
 1- Connect to the web browser of the printer (assuming it has an internal NIC)
           Go To http://PrinterIPaddress
 2- Restrict the authentication to only allow
           The IP address of the server
           The IP address of your PC or the IP segment where your PC resides if there are others who manage printers. The IP segment restriction assumes that the other PCs that you want to restrict are not on that same segment.  If they are, you must restrict by the individual IP address of the PC.  Please keep in mind that most printers only allow you to make 5-10 entries for restrictions.

  Saying Xerox Phaser is like saying HP LaserJet so there are many different models to which the term can refer.  If you list the model number, I can see if I can find specific instructions on the restrictions.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now