Xerox® Security Guide for Light Production Mono Class Products
Scanning to User Local USB Storage Product
Scan data is transferred directly to the user’s USB product. Filesystem encryption of user products are
not supported.
Add on Apps- Cloud, Google, DropBox, and others
The Xerox App Gallery® contains several additional applications that extend the capabilities of Xerox
products. Discussion of App security is beyond the scope of this document. Xerox Apps utilize the
security framework provided by the 3
rd
party vendor. (For example, Microsoft O365 or Google apps
would utilize Microsoft & Google’s security mechanisms respectively). Please consult documentation for
individual Apps and 3
rd
party security for details.
D-Series® Copier/Printers
4110, 4112/4127, 4590 EPS
Local Data Encryption (HDD, SDD, IC, SD Card)
Federal Information Protection Standard 140-2
Media Sanitization NIST 800-171 (Image Overwrite)
All models use magnetic
HDD
Models with magnetic
HDD. See Appendix A:
Product Security Profiles
Models with magnetic HDD.
See Appendix A: Product
Security Profiles
Xerox Print Stream Encryption
Scan to Repository Server
SMB (with share encryption enabled)
SMB (with share encryption enabled)