15 Security138 Xerox WorkCentre 4250/4260 Series System Administration Guide2. Press [Enter].3. Click on the [Properties] tab.4. Click on the [Security] link.5. Select [802.1X] in the directory tree.6. Under the 802.1X area, checkmark the [802.1X] enable box.7. Select the [Authentication Method] from the drop-down menu.8. In the Credentials area, enter details for the [Username] and [Password].9. Click on the [Apply] button to confirm selection.Image Overwrite SecurityOverviewImage Overwrite Security protects against unauthorized retrieval of confidential data fromthe machine by removing image data that is left when jobs are processed. When started, allof the physical areas of the hard disks holding job data are overwritten with a series ofalphanumeric patterns.There are 2 image overwriting security methods available for purchase from your XeroxSales Representative:• On Demand Image Overwrite (ODIO) on page 138• Immediate Image Overwrite on page 142On Demand Image Overwrite (ODIO)This is the procedure to follow to install and setup the On Demand Image Overwrite securityfeature:1. Overview on page 1382. On Demand Image Overwrite (ODIO) on page 1383. Use On Demand Image Overwrite at the Machine on page 1394. Use the Feature over the Network on page 140OverviewOn Demand Image Overwrite is a security measure for customers who are concerned aboutunauthorised access and duplication of classified or private documents.The On Demand Image Overwrite feature provides an on demand facility for a systemadministrator to erase all residual image data from the network controller memory of themachine by overwriting those areas used by the machine to spool and temporarily storeimage data.NOTE: When ODIO is initiated, the machine is taken offline until the overwrite is completedand any existing jobs in the queue are terminated, including print, fax and LAN fax jobs.