XEROX WorkCentre 6400 Information Assurance Disclosure Paper4Ver. 1.00, May 2010 Page 4 of 443.2. Login and Authentication Methods ........................................................................................................................253.2.1. System Administrator Login [All product configurations] ...........................................................................................253.2.2. User authentication.....................................................................................................................................................................253.3. System Accounts ...........................................................................................................................................................273.3.1. Printing [Multifunction models only]....................................................................................................................................273.3.2. Network Scanning [Multifunction models only] ..............................................................................................................273.4. Diagnostics......................................................................................................................................................................273.4.1. Service [All product configurations]......................................................................................................................................273.4.2. tty Mode...........................................................................................................................................................................................273.4.3. Summary..........................................................................................................................................................................................284. SECURITY ASPECTS OF SELECTED FEATURES ......................................................................294.1. Audit Log..........................................................................................................................................................................294.2. Xerox Standard Accounting.......................................................................................................................................334.3. Automatic Meter Reads ..............................................................................................................................................334.4. Encrypted Partitions.....................................................................................................................................................334.5. Image Overwrite............................................................................................................................................................344.5.1. Algorithm .........................................................................................................................................................................................344.5.2. User Behavior .................................................................................................................................................................................344.5.3. Overwrite Timing ..........................................................................................................................................................................355. RESPONSES TO KNOWN VULNERABILITIES .........................................................................365.1. Security @ Xerox (www.xerox.com/security)........................................................................................................366. APPENDICES.......................................................................................................................................376.1. Appendix A – Abbreviations ......................................................................................................................................376.2. Appendix B – Supported MIB Objects ....................................................................................................................396.3. Appendix C –Standards...............................................................................................................................................426.4. Appendix E – References.............................................................................................................................................44