Xerox® Security Guide for Light Production Mono Class Products 
 
   
Scanning to User Local USB Storage Product 
Scan data is transferred directly to the user’s USB product.  Filesystem encryption of user products are 
not supported.  
 
Add on Apps- Cloud, Google, DropBox, and others 
The Xerox App Gallery® contains several additional applications that extend the capabilities of Xerox 
products.  Discussion of App security is beyond the scope of this document.  Xerox Apps utilize the 
security framework provided by the 3
rd
 party vendor.  (For example, Microsoft O365 or Google apps 
would utilize Microsoft & Google’s security mechanisms respectively).  Please consult documentation for 
individual Apps and 3
rd
 party security for details. 
 
D-Series® Copier/Printers 
4110, 4112/4127, 4590 EPS 
Local Data Encryption (HDD, SDD, IC, SD Card) 
Federal Information Protection Standard 140-2 
Media Sanitization NIST 800-171 (Image Overwrite) 
All models use magnetic 
HDD 
Models with magnetic 
HDD.  See Appendix A:  
Product Security Profiles 
Models with magnetic HDD.  
See Appendix A:  Product 
Security Profiles 
Xerox Print Stream Encryption 
Scan to Repository Server 
SMB (with share encryption enabled) 
SMB (with share encryption enabled)