Erasing Temporary Data Files From The Hard Disk; Configuring Security Audit Log Settings - Lexmark MS610dn Administrator's Manual

Embedded web server-security: administrator's guide
Hide thumbs Also See for MS610dn:
Table of Contents

Advertisement

Using security features in the Embedded Web Server
c
From the Day(s) menu, select which day or days the schedule should run (example: "Weekdays (Mon‑Fri)").
d
Click Add to save the action to the schedule.
Notes:
Use of USB devices is enabled by default.
For each "Disable" schedule entry, you must also create an "Enable" schedule entry to reactivate use of the
USB devices.

Erasing temporary data files from the hard disk

On certain devices, administrators can use "Erase Temporary Data Files" to remove residual confidential material from
the device and free up memory space. This setting uses random data patterns to securely overwrite files stored on the
hard drive that have been marked for deletion. Overwriting can be accomplished with a single pass—for a quick wipe
—or with multiple passes for greater security. Multiple pass wiping is compliant with the DoD 5220.22‑M standard for
securely erasing data from a hard disk.
Note: Not all printers have a hard disk installed. If you do not see "Erase Temporary Data Files" in the main Security
menu, then it is not supported on your device.
1
From the Embedded Web Server, click Settings > Security > Erase Temporary Data Files.
Note: Wiping Mode can only be set to Auto.
2
Modify the following settings:
Single Pass—To overwrite the printer hard disk in a single pass with a repeating bit pattern. This is the factory
default setting.
Multi–Pass—To overwrite the printer hard disk with random bit patterns several times, followed by a verification
pass. A secure overwrite is compliant with the DoD 5220.22M standard for securely erasing data from a hard
disk. Highly confidential information should be wiped using this method.
3
Click Submit to save the changes.

Configuring security audit log settings

Note: This is available only in select printer models.
The security audit log allows administrators to monitor security‑related events on a device including, among others,
user authorization failures, successful administrator authentication, or Kerberos files being uploaded to a device. By
default, security logs are stored on the device, but may also be transmitted to a network syslog server for further
processing or storage.
1
From the Embedded Web Server, click Settings > Security > Security Audit Log.
2
Select Enable Audit to activate security audit logging (syslog).
3
Type the IP address or host name of the Remote Syslog Server, and then select the Enable Remote Syslog check
box to transmit log events to a network syslog server.
Note: The Enable Remote Syslog check box is unavailable until an IP address or host name is entered.
4
Enter the Remote Syslog Port number used on the destination server. The default value is 514.
27

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents