Setup guide
● Web browser quit—Shreds all selected Web-related assets, such as browser URL history,
when you close a Web browser.
● Key sequence—Allows you to specify a key sequence to initiate shredding. For details,
see
Using a key sequence to initiate shredding on page 86.
NOTE: A .dll file is shredded and removed from the system only if it has been moved to the
Recycle Bin.
3. To schedule a future time to shred selected assets, select the Activate Scheduler check box,
enter your Windows password, and then select a day and time.
4. Click Apply.
Setting a free space bleaching schedule
Free space bleaching can be performed occasionally for assets that you delete by selecting Simple
Delete Settings in File Sanitizer, by moving the assets to the Windows Recycle Bin, or by deleting
the assets manually. Free space bleaching provides no additional security to shredded assets.
NOTE: A scheduled task starts at a specific time. If the system is turned off or is in Standby at the
scheduled time, File Sanitizer will not attempt to relaunch the task.
1. Open File Sanitizer, and then click Bleaching.
2. To schedule a future time to bleach your hard drive, select the Activate Scheduler check box,
enter your Windows password, and then select a day and time.
3. Click Apply.
NOTE: The free space bleaching operation can take a significant length of time. Be sure that your
computer is connected to AC power. Although free space bleaching is performed in the background,
increased processor usage may affect your computer's performance. Free space bleaching can be
performed after hours or when the computer is not in use.
Selecting or creating a shred profile
You can specify a predefined profile or create your own profile.
Selecting a predefined shred profile
When you choose a predefined shred profile, a list of assets is automatically selected. You can also
view the predefined list of assets that are selected for shredding.
1. Open File Sanitizer, and then click Settings.
2. Click a predefined shred profile:
● High Security
● Medium Security
● Low Security
Setup procedures 83










