XEROX WorkCentre 6400 Information Assurance Disclosure Paper
3.2.
3.2.2. User authentication.....................................................................................................................................................................25
3.3.
System Accounts ...........................................................................................................................................................27
3.4.
Diagnostics......................................................................................................................................................................27
3.4.2. tty Mode...........................................................................................................................................................................................27
3.4.3. Summary..........................................................................................................................................................................................28
4.
4.1.
Audit Log..........................................................................................................................................................................29
4.2.
Xerox Standard Accounting.......................................................................................................................................33
4.3.
Automatic Meter Reads ..............................................................................................................................................33
4.4.
Encrypted Partitions.....................................................................................................................................................33
4.5.
Image Overwrite............................................................................................................................................................34
4.5.1. Algorithm .........................................................................................................................................................................................34
4.5.2. User Behavior .................................................................................................................................................................................34
4.5.3. Overwrite Timing ..........................................................................................................................................................................35
5.
5.1.
6.
APPENDICES....................................................................................................................................... 37
6.1.
Appendix A - Abbreviations ......................................................................................................................................37
6.2.
6.3.
Appendix C -Standards...............................................................................................................................................42
6.4.
Appendix E - References.............................................................................................................................................44
Ver. 1.00, May 2010
4
Page 4 of 44