Xerox 3635MFP Systems Administrator Guide - Page 150

Image Overwrite Security, Overview, On Demand Image Overwrite (ODIO)

Page 150 highlights

15 Security 2. Press [Enter]. 3. Click on the [Properties] tab. 4. Click on the [Security] link. 5. Select [802.1X] in the directory tree. 6. Under the 802.1X area, checkmark the [802.1X] enable box. 7. Select the [Authentication Method] from the drop-down menu. 8. In the Credentials area, enter details for the [Username] and [Password]. 9. Click on the [Apply] button to confirm selection. Image Overwrite Security Overview Image Overwrite Security protects against unauthorized retrieval of confidential data from the machine by removing image data that is left when jobs are processed. When started, all of the physical areas of the hard disks holding job data are overwritten with a series of alphanumeric patterns. There are 2 image overwriting security methods available for purchase from your Xerox Sales Representative: • On Demand Image Overwrite (ODIO) on page 138 • Immediate Image Overwrite on page 142 On Demand Image Overwrite (ODIO) This is the procedure to follow to install and setup the On Demand Image Overwrite security feature: 1. Overview on page 138 2. On Demand Image Overwrite (ODIO) on page 138 3. Use On Demand Image Overwrite at the Machine on page 139 4. Use the Feature over the Network on page 140 Overview On Demand Image Overwrite is a security measure for customers who are concerned about unauthorised access and duplication of classified or private documents. The On Demand Image Overwrite feature provides an on demand facility for a system administrator to erase all residual image data from the network controller memory of the machine by overwriting those areas used by the machine to spool and temporarily store image data. NOTE: When ODIO is initiated, the machine is taken offline until the overwrite is completed and any existing jobs in the queue are terminated, including print, fax and LAN fax jobs. 138 Xerox Phaser 3635 System Administration Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212

15 Security
138
Xerox Phaser 3635 System Administration Guide
2.
Press
[Enter]
.
3.
Click on the
[Properties]
tab.
4.
Click on the
[Security]
link.
5.
Select
[802.1X]
in the directory tree.
6.
Under the 802.1X area, checkmark the
[802.1X]
enable box.
7.
Select the
[Authentication Method]
from the drop-down menu.
8.
In the Credentials area, enter details for the
[Username]
and
[Password]
.
9.
Click on the
[Apply]
button to confirm
selection.
Image Overwrite Security
Overview
Image Overwrite Security protects against unauthorized retrieval of confidential data from
the machine by removing image data that is left when jobs are processed. When started, all
of the physical areas of the hard disks holding job data are overwritten with a series of
alphanumeric patterns.
There are 2 image overwriting security methods available for purchase from your Xerox
Sales Representative:
On Demand Image Overwrite (ODIO)
on
page 138
Immediate Image Overwrite
on
page 142
On Demand Image Overwrite (ODIO)
This is the procedure to follow to install and setup the On Demand Image Overwrite security
feature:
1.
Overview
on
page 138
2.
On Demand Image Overwrite (ODIO)
on
page 138
3.
Use On Demand Image Overwrite at the Machine
on
page 139
4.
Use the Feature over the Network
on
page 140
Overview
On Demand Image Overwrite is a security measure for customers who are concerned about
unauthorised access and duplication of classified or private documents.
The On Demand Image Overwrite feature provides an on demand facility for a system
administrator to erase all residual image data from the network controller memory of the
machine by overwriting those areas used by the machine to spool and temporarily store
image data.
NOTE:
When ODIO is initiated, the machine is taken offline until the overwrite is completed
and any existing jobs in the queue are terminated, including print, fax and LAN fax jobs.