Specifying File Deletion Options

EFT Server's HS-PCI module (Payment Card Industry Data Security Standard High Security Module; add on to EFT Server to facilitate ongoing compliance with PCI DSS v1.1.) provides a data sanitation option. If you do not activate the HS-PCI module, this feature is disabled after the 30-day trial expires.

When EFT Server deletes a file, it can optionally securely delete or purge the file by writing over the initial data using encrypted and/or pseudorandom data. A menu of purging methods is available; available options depend on the library used.

*.pgp files are automatically excluded from the wipe process. When the wipe is enabled, ANY EFT Server delete operation also includes the wipe (sanitization) process.

You can specify which files EFT Server is to purge, including client-initiated delete commands, source files after successful OpenPGP encrypt operation, source file after move command across partition/drive, and others.

To specify a delete method

  1. In EFT Administrator, connect to EFT Server and click the Server tab.

  2. In the left pane, click the Site that you want to configure.

  3. In the right pane, click the Advanced tab.

  4. In the Data Sanitation area, click the down arrow to specify the Delete method. The following methods are available:

  5. Click Apply to save the changes on EFT Server.

  6. The following message appears when the purging mechanism is changed to anything other than the Windows standard delete method:

"Sanitizing deleted disk sectors is a CPU- and disk-intensive operation and can be quite time consuming. Run performance monitors before and after making this change to determine whether hardware upgrades are necessary to maintain prior levels of performance."

For further reference regarding data wiping, see the following articles:

(These links are outside of GlobalSCAPE's domain.)