Xerox® Security Guide for Entry Production Color Class Products 
March 2019   Page  4-21 
 
 
The time that the event happened in hh:mm:ss format. 
The type of event. The number corresponds to a unique description. 
An abbreviated description of the type of event. 
Columns 6–10 list other information about the event, such as: 
Identity: User Name, Job Name, Computer Name, Printer Name, Folder Name, or 
Accounting Account ID display when Network Accounting is enabled. 
Completion Status  
Image Overwrite Status: The status of overwrites completed on each job. Immediate 
Image must be enabled. 
     
A maximum of 15,000 events can be stored on the device. When the number of events exceeds 15,000, 
audit log events will be deleted in order of timestamp, and then new events will be recorded.  The audit 
log be exported at any time by a user with administrative privileges.  Note that as a security precaution, 
audit log settings and data can only be accessed via HTTPS. 
Operational Security 
Firmware Restrictions 
The list below describes supported firmware delivery methods and applicable access controls. 
 Local Firmware Upgrade via USB port: 
Xerox service technicians can update product firmware using a USB port on the PC UI. This ability is 
restricted to CSE installation only. 
Additional Service Details 
Xerox products are serviced by a tool referred to as the Portable Workstation (PWS). Only Xerox 
authorized service technicians are granted access to the PWS. Customer documents or files cannot be 
accessed during a diagnostic session, nor are network servers accessible through this port. If a network 
connection is required while servicing a Xerox device, service technicians will remove the device from any 
connected networks.  The technician will then connect directly to the device using an Ethernet cable, 
creating a physically secure and isolated network during service operations. 
Backup & Restore (Cloning) 
Certain system settings can be captured in a ‘clone’ file that may be applied to other systems of the same 
model. Clone files are encoded but not encrypted and have the potential to contain sensitive information 
depending on which product feature setting is selected. Access to both create and apply a clone file can 
be restricted using role-based access controls.  Clone files can only be created and applied through the 
Embedded Web Server. 
EIP Applications 
Xerox products can offer additional functionality through the Xerox Extensible Interface Platform (EIP).  
Third party vendors can create Apps that extend the functionality of a product.  Xerox signs EIP 
applications that are developed by Xerox or Xerox partners. Products can be configured to prevent 
installation of unauthorized EIP applications. The Versant® supports EIP applications. ColorPress® does 
not support EIP.