HP Web Jetadmin 10.2 - Configuring Hard Disk Security

Page 4
Secure Sanitizing Erase mode meets the U.S. Department of Defense 5220-22.M specification
using a succession of multiple data overwrites.
For Secure Sanitizing Erase, each deleted file is overwritten with:
the fixed character pattern (binary 01001000).
the compliment of the fixed character pattern (binary 10110111).
a random character:
o A 32k byte buffer of random characters is generated for each file delete operation using
the device’s unique uptime as the seed.
o Each byte of file data uses a unique random character from the buffer.
o The random character buffer is reused up to 32 times, and then regenerated using new
random data.
To ensure successful completion of each overwrite operation, each overwritten byte is verified.
Note: NIST SP-800-88 “Guidelines for Media Sanitization” (Sept 2006) supersedes the US
DOD 5220-2.M (1997 edition) specification.
Configuring WJA for Disk Security
Web Jetadmin can be leveraged to identify devices with hard disks as well as secure them. By
using automatic groups and configuration templates, a fleet of print and imaging devices can
be centrally managed.
Automatic Groups
Automatic groups can self populate themselves with devices based on user specified filter
criteria. For this disk security exercise, “Hard Disk” will be used. A custom view will be created
in order to identify the current configuration of the devices and to see which need remediation.
In addition to the default layout, the view will consist of:
Hard Disk
Secure Disk
Secure Disk Status
File System Password
Secure Erase Method