
INSTALLATION
Q. How can I identify all of the local instances of SQL during IPSC installation?
A. If all of the local instances of SQL do not appear in the IPSC database selection window during the
installation process, you can usually retrieve SQL instance information by executing SQL
Configuration Manager and selecting SQL Server Services.
Q. Why am I having trouble connecting to a local instance of SQL Server 2012?
A. Beginning with SQL Server 2012, database engine security enhancements now include
provisioning during setup, new property list permissions, new user-defined server roles and new
ways of managing server and database roles. These changes were implemented by Microsoft to
provide greater security at install time. IPSC installation is not exempt from this enhanced security.
So, unless the IPSC installer is granted SQL Server Administrator rights during SQL Server 2012
setup, the installer must be provided sysadmin rights later and before IPSC is installed with the
option to utilize a local instance of SQL Server 2012.
Q. Why is the Microsoft Report Viewer installed during IPSC installation?
A. The Microsoft Report Viewer enables embedding reports in applications and supports formatting,
printing and exporting of the IPSC security summary and detailed reports.
POLICY
Q. If I use the HP Best Practices Base Policy template and its default settings, will my
printing and imaging devices be completely secure?
A. No. The HP Best Practices Base Policy template provides a great place to start when creating a
custom policy or when used as a baseline policy. The default settings in this template do not
represent complete security for your devices. HP understands that the device security requirements
for each customer might differ and offers some of the most common NIST settings as a starting
point for developing your custom or baseline policy.
Q. Will any of my third party device solutions be affected by adopting the HP Best
Practices Base Policy as is?
A. Possibly. When used with third-party solutions requiring access to the device, the HP Best Practices
Policy template might require changes to the default security settings. Refer to your solution
documentation to determine whether policy changes are required to accommodate specific
functionality. For some third party solutions, the Command Load & Execute and Allow PJL
settings might require enabling.
Commenti su questo manuale