Main content

Security of RICOH Projectors

Introduction

Along with the development of the information society, we are facing various threats, such as computer viruses, personal information leakage and unauthorized access. In such situations, it is important to take the necessary security measures for everybody.

This is now important not only for PCs, servers, and networks, but also for projectors.

In order to more safely use RICOH projectors, we would like to recommend taking the following security measures.

<Security measures in your network environment>

  1. Use a network isolated by a firewall to prevent unauthorized access via the Internet.

  2. Make the following rules when using a PC in the network.

    1) Lock the PC when away from the desk.
    It is recommended to lock your PC if you leave your desk without closing the browser.
    2) Use a different browser when you are looking at different category websites.
    It is recommended to use a different browser when you log in to different category websites that you cannot confirm the reliability of. If you use the same browser, please log out, then open the other website.
    Please do not simply close the website, but log out of it properly.
    3) Open only trusted links
    When you open hyperlinks from emails and message boards in your PC, please be careful. Please open only trusted links.

<Security measures in projectors>

  1. Enable authentication functions
    By enabling various authentication settings on the projector, you can prevent attacks from malicious third parties—such as unauthorized setting changes and operation. The following authentication settings are available for projectors.
    1) Administrator Authentication
    Setting Administrator Authentication to "On” enables administrator authentication with a password.
    2) Crestron WebUI User Authentication
    Setting Crestron WebUI User Authentication to "On” enables authentication with a password when accessing user setting screens of Crestron WebUI.
    3) Crestron WebUI Administrator Authentication
    Setting Crestron WebUI User Authentication to "On” enables authentication with a password when accessing administrator setting screens of Crestron WebUI.
    4) PJLink Authentication
    Setting PJLink Authentication to "On” enables authentication with a password when controlling a projector with PJLink.
  2. Disable unnecessary network functions
    To prevent unauthorized access, it is recommended to disable unused network functions. The following network settings are available for projectors.
    1) Projector Search Setting
    It is recommended to set the Projector Search setting to "Disabled” if you are not using Quick Projection or Simple Multi Projection.
    2) Remote Projection Control
    It is recommended to set Remote Projection Control to "Disabled” if you are not projecting images stored on media servers.
    3) Web Image Monitor
    It is recommended to set the Web Image Monitor setting to "Disabled” if you are not checking projector status or changing settings with a web browser.
    4) AMX Device Discovery
    It is recommended to set AMX Device Discovery to "Disabled” if you are not using AMX Device Discovery to operate or monitor the projector.
    5) Crestron RoomView
    It is recommended to set Crestron RoomView to "Disabled” if you are not using Crestron RoomView to operate or monitor the projector.
  • * Some models do not support the above settings. Please refer to the manuals of each product for details.

Operating Procedure for Secure Projector Usage

<Enabling Authentication Functions>

Enable various authentication settings on the projector. This prevents attacks such as unauthorized setting changes made by malicious third parties.

  • *Ensure the password is changed from the initial default.
  • *Please do not use the same password for multiple devices to reduce the risk caused by password leakage.

Please refer to the setting methods of each authentication as follows.

  • *Some projectors may not support these settings, or setting methods may be different. Refer to the manuals of each model for details.

Administrator Authentication

<Setting Method>
Set [Menu] -> [Network Applications] -> [Security] -> [Administrator Authentication] to [On].

Crestron WebUI User Authentication

<Setting Method>
1. Setting from the menu
Set [Menu] -> [Network Applications] -> [Management Tools] -> [Crestron WebUI User Authentication] to [On].
2. Setting from a web browser
Open Crestron Tools through your web browser and set [User Password] to [Enable].

Crestron Web UI Administrator Authentication

<Setting Method>
1. Setting from the menu
Set [Menu] -> [Network Applications] -> [Management Tools] -> [Crestron WebUI Administrator Authentication] to [On].
2. Setting from a web browser
Open Crestron Tools through your web browser and set [Admin Password] to [Enable].

PJLink Authentication

<Setting Method>
Set [Menu] -> [Network Applications] -> [Management Tools] -> [PJLink Authentication] to [On].

<Disabling Unnecessary Network Functions>

To prevent for unauthorized access, it is recommended to disable unused network functions.

The setting methods for these are as follows.

  • *Some models may not support these settings or setting methods may differ.
    Please refer to the manual of each model for details.

Projector Search Setting

<Setting Method>
Set [Menu] -> [Network Applications] -> [LAN Common] -> [Projector Search] to [Disabled].

Remote Projector Control

<Setting Method>
Set [Menu] -> [Network Applications] -> [Server] -> [Projection Remote Control] to [Disabled].

Web Image Monitor

<Setting Method>
Set [Menu] -> [Network Applications] -> [Management Tools] -> [Web Image Monitor] to [Disabled].

AMX Device Discovery

<Setting Method>
Set [Menu] -> [Network Applications] -> [Management Tools] -> [AMX Device Discovery] to [Disabled].

Crestron RoomView

<Setting Method>
Set [Menu] -> [Network Applications] -> [Management Tools] -> [Crestron RoomView] to [Disabled].
  • *Even if you take all above security measures, it is difficult to avoid unauthorized access completely. So, please estimate what would happen in the event of unauthorized access and determine the influence of usage on life and property.
  • *Usage of products is at your own risk and solely the responsibility of the user.