Device and Network Security
MyQ X provides comprehensive device and network security controls to protect multifunction devices (MFDs), printers, and network infrastructure from unauthorized access and exploitation.
Multi-Function Device Security Hardening
Organizations deploying MyQ X with MFDs should implement security best practices including:
Device Access Controls: Restrict physical access to printers to authorized locations and personnel only, reducing exposure to tampering or theft.
Unused Protocol Disabling: Turn off unnecessary device protocols and services that are not required by MyQ X, reducing the attack surface of each device.
Default Credential Management: Change all default administrator passwords on devices to strong, randomly generated credentials. Factory defaults are commonly known to attackers.
Internal Hard Drive Protection: If devices support internal storage of print jobs for reprinting, implement encryption (AES) and automatic data overwrite features to prevent unauthorized access to stored documents.
Network Segmentation and VLAN Configuration
MyQ X supports network segmentation strategies to contain potential device compromises:
VLAN Isolation: Separate printer and device network traffic from general user and administrative networks using virtual LANs, limiting lateral movement if a device becomes compromised.
Subnetting and Access Control Lists: Implement network-level access controls using Access Control Lists (ACLs) to ensure only authorized systems can communicate with print devices and servers.
Firewall Rules: Block unnecessary inbound and outbound traffic from printer subnets, limiting connectivity to only essential services and preventing infected devices from accessing other network resources.
FQDN Enforcement: All network communications must use fully qualified domain names (FQDN) rather than IP addresses or short hostnames, preventing DNS-based man-in-the-middle attacks and ensuring proper certificate validation.
SNMP v3 Security Implementation
MyQ X enforces modern SNMPv3 protocols with strong encryption for device management:
Insecure SNMPv1 Prohibition: Legacy SNMPv1 communication must be disabled entirely, as it transmits credentials in clear text and lacks encryption.
SNMPv3 Configuration: All SNMP communication must use SNMPv3 with:
Strong, randomly generated passwords for authentication
SHA1 or stronger hashing algorithms
AES encryption for data confidentiality
Per-device, unique credentials specific to each MyQ deployment
Printer Credential Management
MyQ X recognizes that printer credential management is vendor-specific and requires customer-side implementation:
Strong Password Requirements: All printer administrative credentials must use strong, randomly generated passwords rather than default or simple credentials.
Credential Rotation: Periodically update printer passwords according to organizational security policies to reduce the risk of compromised credentials.
Access Restrictions: Limit printer management access to authorized personnel only through firewall rules, physical access controls, and role-based permissions.
Firmware Security and Update Management
Maintaining current device firmware is critical for security:
Automatic Updates: Configure devices to automatically receive and apply manufacturer firmware updates that address newly discovered security vulnerabilities.
Vendor Security Advisories: Monitor manufacturer security notifications for critical vulnerabilities affecting deployed devices and apply patches promptly.
Update Testing: Test firmware updates in non-production environments before deploying to production printers to ensure compatibility and functionality.
USB Port Management and Restrictions
MyQ X supports administrative controls for device USB connectivity:
USB Port Disabling: Administrators should disable inbound USB ports on MFDs to prevent:
Direct printing over USB, bypassing MyQ security controls
Direct access to device hard drives and stored data
Unauthorized use of device functionality
Secure Direct Print Alternatives: Enable only approved secure printing methods (IPP/S, AirPrint with MyQ integration) while blocking insecure direct USB access.
This comprehensive device and network security framework ensures that print devices remain secure components of the MyQ X infrastructure while maintaining operational efficiency and organizational security posture.