Customize D-Secure File Eraser Network to align with your organization's security policies, compliance requirements, and operational workflows. Fine-tune erasure methods, configure trace removal preferences, and protect critical files from accidental deletion.
D-Secure File Eraser Network provides comprehensive configuration options that let you tailor the software's behavior to match your specific security requirements and operational needs. Proper configuration ensures that erasure operations meet compliance standards (GDPR, HIPAA, DoD regulations) while maintaining efficient workflows for your IT team.
Settings are organized into four main categories: General Settings control overall application behavior, Erasure Algorithms determine how data is overwritten, Erase Traces Settings specify what digital footprints to remove, and Ignore File Lists protect important files from accidental erasure. All settings are saved automatically and apply globally across the application unless overridden for specific tasks.
Accessing Settings:
Click the Home ribbon tab, then click the Settings button. The Settings dialog opens with tabbed navigation for each category.
General Settings control the core operational behavior of D-Secure File Eraser Network. These settings affect how the application interacts with your network, performs erasure operations, and presents information to users. Navigate to Home → Settings → General tab to configure these options.
Purpose: Automatically verify network connectivity to target computers before attempting erasure operations.
How it works: When enabled, D-Secure pings each selected computer to confirm it's online and accessible before initiating file scans or erasure. This prevents wasted time attempting operations on offline machines.
Recommendation: Enable this for large networks where computers may be offline. Disable if you're working on a small network where all computers are reliably connected, as it saves a few seconds per operation.
Purpose: Set the data overwriting method used by default for all erasure operations.
How it works: This algorithm is pre-selected whenever you start a new erasure task. You can always change it for specific operations, but having a sensible default speeds up routine work.
Most Common Choices:
Purpose: Determine how thoroughly the software verifies that data was properly overwritten after erasure.
Options Explained:
No Verification (Fastest)
Skips verification entirely. Use for non-sensitive data where speed is more important than absolute certainty. Erasure still occurs, but you rely on the algorithm without double-checking.
Random Verification (Balanced)
Samples random sectors from erased areas to verify overwriting. Good compromise—catches most issues without significantly impacting time. Recommended for most business use.
Total Verification (Most Secure)
Reads every sector to confirm proper overwriting. Required for highly sensitive data and compliance with strict regulations. Doubles operation time but provides absolute certainty.
Purpose: Display a final confirmation dialog before irreversible erasure begins.
How it works: When enabled, after you select files and click "Erase," a dialog appears asking "Are you sure? This cannot be undone." You must click "Yes, Erase Now" to proceed. This prevents accidental clicks from triggering permanent data loss.
Recommendation: Leave enabled for safety, especially if multiple administrators use the software. Experienced power users working on routine tasks may disable it for faster operations, but use caution.
Purpose: Display file sizes alongside file names in the browsing interface.
How it works: When browsing remote computers' file systems, enabling this adds a "Size" column showing each file's size in KB, MB, or GB. Useful for identifying large files that may take longer to erase.
Tip: Enable if you frequently need to estimate erasure times based on file sizes. Disable to declutter the interface if you primarily erase by traces rather than individual files.
D-Secure File Eraser Network includes 17+ industry-standard erasure algorithms developed by government agencies, military organizations, and security researchers worldwide. Each algorithm uses different overwriting patterns and pass counts to ensure data cannot be recovered. Choosing the right algorithm balances security needs with time constraints—more passes provide higher security but take proportionally longer.
DoD 5220.22-M (3 passes ECE)
US Department of Defense standard. Most popular - excellent security with reasonable speed.
DoD 5220.22-M (7 passes)
Extended DoD standard with additional passes for higher security.
DoD 5200.28-STD (7 passes)
DoD Rainbow Series standard for classified material.
US Army AR380-19 (3 passes)
US Army regulation for handling sensitive information.
NATO (7 passes)
North Atlantic Treaty Organization data sanitization standard.
AFSSI 5020 (3 passes)
US Air Force System Security Instruction standard.
NIST 800-88 Clear
US National Institute of Standards - modern sanitization guideline, widely accepted.
GOST R 50739-95
Russian government standard for information security.
German VSITR (7 passes)
German Federal Office for Information Security standard.
British HMG IS5 (3 passes)
UK Her Majesty's Government infosec standard.
RCMP TSSIT OPS-II (4 passes)
Royal Canadian Mounted Police Technical Security Standard.
Gutmann (35 passes)
Most secure option. Developed by Peter Gutmann. Extremely thorough but very slow.
Schneier (7 passes)
Created by cryptographer Bruce Schneier - balanced security.
Pfitzner (33 passes)
Roy Pfitzner method - very high security with 33 specialized passes.
Zeroes (1 pass)
Overwrites with zeros. Fastest option. Suitable for non-sensitive internal cleanup.
Pseudo-Random (1 pass)
Overwrites with random data. Slightly better than Zeroes, still very fast.
Choosing the Right Algorithm
Speed vs. Security Trade-off: More passes = higher security but longer time. A 100GB hard drive erased with Zeroes (1 pass) might take 30 minutes, while Gutmann (35 passes) could take over 15 hours.
General Guidance: For most business scenarios, DoD 5220.22-M (3 passes) provides excellent security with acceptable speed. Reserve Gutmann and 33-pass methods for exceptionally sensitive data where time is secondary to complete assurance. Single-pass methods are fine for routine cleanup of non-confidential data.
Verification is the process of confirming that data has been properly overwritten after erasure completes. While erasure algorithms are highly reliable, verification provides additional assurance for audit trails and compliance reporting. The verification method you choose impacts total operation time and the level of certainty you receive.
Fastest • No additional time • Lowest certainty
The erasure algorithm runs, but no verification pass occurs afterward. The operation completes immediately after the final overwrite pass finishes. You trust that the algorithm worked correctly without double-checking.
When to use:
Balanced • +10-15% time • Good certainty
After erasure completes, D-Secure randomly samples sectors across the erased area and reads them to verify they contain the expected overwrite pattern. Typically checks 5-10% of total sectors, which catches most potential issues while adding minimal time.
When to use:
✓ This is the default recommendation for 90% of use cases
Slowest • +100% time • Absolute certainty
Reads every single sector in the erased area to confirm proper overwriting. Essentially doubles the operation time since it must read back everything that was written. Provides mathematical certainty that erasure completed correctly—catches even rare hardware errors.
When to use:
⚠️ Time consideration: 100GB might take 2-4 hours with verification vs. 1-2 hours without
Digital traces are the footprints left behind by your operating system, applications, and internet browsing. These traces can reveal what files you accessed, websites you visited, applications you used, and searches you performed—even after the original files are deleted. D-Secure's Erase Traces feature removes these digital breadcrumbs to protect privacy and comply with data protection regulations. Configure which traces to remove by navigating to Settings → Erase Traces.
Modern web browsers store extensive records of your online activity. Each browser has independent trace storage, so you must configure settings separately for each installed browser. D-Secure detects and supports all major browsers automatically.
Supported Browsers:
What Gets Erased:
Important: Close all browsers before erasing traces for best results. Open browsers may regenerate some traces immediately or lock files preventing erasure.
Desktop applications create traces similar to browsers—recording recent files, search history, and usage patterns. These traces can expose sensitive business information long after the actual files are deleted or moved.
📧 Email & News Clients
Erases recent contacts, search history, and temporary file caches from Outlook, Thunderbird, and similar applications. Does NOT delete actual emails—only traces of email activity.
🔄 P2P File Sharing
Removes download histories and shared file lists from BitTorrent clients, eMule, and similar peer-to-peer applications.
📄 Microsoft Office Recent Files
Clears the "Recent Documents" list from Word, Excel, PowerPoint, and other Office applications. Prevents others from seeing what files you've been working on.
💬 Chat & Messaging
Removes conversation logs, contact lists, and file transfer histories from Skype, Teams, and other messaging applications.
Windows operating system creates numerous traces during normal operation. These system-level traces can reveal computer usage patterns, installed software, and file operations performed.
Recycle Bin
Permanently erases all files in Recycle Bin across all drives
Temporary Files
Cleans Windows Temp folder, user temp, and application temp directories
Memory Dumps & Crash Reports
Removes crash dump files that may contain sensitive data from RAM
Windows Event Logs
Clears Application, Security, and System event logs (use carefully—needed for troubleshooting)
Most Recently Used (MRU) Lists
Removes Windows Recent Items, jump lists, and "run" command history
Windows Update Cache
Cleans downloaded update files and installation logs
The Ignore File List is a crucial safety feature that protects important files and folders from accidental erasure. Any item you add to this list will be automatically skipped during all erasure operations, regardless of whether it's manually selected or caught in a broader selection. This prevents catastrophic mistakes like erasing critical system files or important business documents. Use this to create a safety net around your most valuable data.
Access the Ignore List: Navigate to Home → Settings → Ignore File List tab
Click Add Items: The Add dialog appears with three protection options
Choose Protection Type: Select how you want to protect files
By File Extension
Protect all files with specific extensions across all locations. Example: Adding .pdf protects all PDF files everywhere.
Best for: System files (.dll, .sys), important document types (.xlsx, .docx), database files (.mdb, .accdb)
By Specific File Name
Protect files with exact names, regardless of location. Example: Adding important-client-data.xlsx protects that specific file everywhere.
Best for: Critical configuration files (config.ini), license files (license.dat), unique important documents
By Folder Name/Path
Protect entire directories and all their contents. Example: Adding C:\CriticalData protects everything inside.
Best for: System folders (Windows, Program Files), backup directories, project folders, database directories
Save and Verify: Click OK to save. The items appear in your ignore list and are immediately protected
✅ Recommended Additions
🔄 Managing the List
Critical Warning
Items in the ignore list are ALWAYS skipped during erasure—even if you explicitly select them. This is intentional for safety, but can be confusing if you forget something is on the list.
If you need to erase a protected item, you MUST remove it from the ignore list first. There is no override option to prevent accidental erasure of protected data.
⚙️ Regular Reviews
Audit settings quarterly to ensure they align with current security policies and compliance requirements. Update algorithms if new standards are mandated.
🎯 Match Security to Data
Use high-security algorithms (DoD 7-pass, Gutmann) for sensitive data. Use faster algorithms (Zeroes, DoD 3-pass) for routine non-confidential cleanup to save time.
📝 Document Configuration
Screenshot your settings or export configurations for compliance documentation. This proves due diligence during audits.
🧪 Test Before Production
Test new settings on non-critical test data before deploying to production systems. Verify expected results and timing.
🛡️ Maintain Ignore Lists
Keep ignore list updated with critical system paths and business-critical file types. Remove obsolete entries to prevent bloat.
👥 Train Administrators
Ensure all administrators understand the implications of each setting. Misconfigurations can lead to insufficient security or excessive operation times.