McAfee Endpoint Encryption for Files and Folders. Best Practices. For EEFF product version 4.0.0

Size: px
Start display at page:

Download "McAfee Endpoint Encryption for Files and Folders. Best Practices. For EEFF product version 4.0.0"

Transcription

1 McAfee Endpoint Encryption for Files and Folders Best Practices For EEFF product version 4.0.0

2 McAfee, Inc. McAfee, Inc., 2821 Mission College Blvd., Santa Clara, CA 95054, USA Tel: (+1) Internet: Document: Endpoint Encryption for Files and Folders Best Practices Last updated: Friday, 12 August 2011 Copyright (c) McAfee, Inc., and/or its affiliates. All rights reserved. McAfee and/or other noted McAfee related products contained herein are registered trademarks or trademarks of McAfee, Inc., and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. Any other non-mcafee related products, registered and/or unregistered trademarks contained herein is only by reference and are the sole property of their respective owners.

3 Table of Contents Introduction... 5 General Recommendations... 6 Client operating system...6 Log off system when not in use...6 Encryption keys in large deployments...6 Do not encrypt entire local drives...6 Prevent deployment to non-supported client OS...6 Pragmatic policy assignment rules...6 Minimize usage of System Tree based Assignments...7 Self-Extractors: Maximum data input size...7 Self-Extractors: Password rules...7 Folder encryption... 8 Local volumes...8 Program Files directory...8 Drive letters...8 The User profile folder...8 The Desktop folder...8 The Microsoft Outlook data directories...9 Removing a folder encryption policy...9 Only select folders containing sensitive files...9 Encrypted parent folder decrypted subfolder...9 Removable Media Encryption General recommendations Regular encryption recommendations EERM encryption recommendations File Extension Encryption Try to avoid using the wildcard ( * ) as extension Enter process name and extension CD/DVD encryption Supported burning applications CD format limitations EEFF client required to read encrypted CD/DVD User Local Keys User Local Keys vs. User Personal Keys Limited support in EEFF Use Key Request Exclusions Delete User Local Keys with caution Encryption Options Tune I/O Utilization to preserve network traffic Option Use wiping when encrypting and deleting files Blocked Processes Key Request Exclusions Network share encryption Very large network folders Tune Maximum number of clients allowed Tune I/O Utilization to preserve network traffic Consider the option Enable limiting of file size Encryption Keys Deactivate keys instead of Delete keys User Personal Keys and multiple epo databases... 20

4 Troubleshooting recommendations Client Status report Trace files Dump files EEFF files... 22

5 Introduction Introduction This document describes Best Practices for McAfee Endpoint Encryption for Files and Folders v4.0 (EEFF 4). The document is divided into sections where each section represents a policy property page in the EEFF extension in McAfee epo or a specific EEFF topic. For example, if you are considering deploying a folder encryption policy on a network share, the corresponding Best Practices sections in this Guide are Folder Encryption and Network encryption. Likewise, if you are only considering using removable media encryption, all sections except Removable Media and General best practices can be ignored. This is not a Product Guide or Product Description for EEFF 4. For such documentation, please consult the EEFF 4 core documentation set. This document only aims at giving advice and best practice guidelines when deploying EEFF 4. 5

6 General Recommendations General Recommendations Client operating system Assure the client operating system, including Service Pack levels, is officially supported. Log off system when not in use Log off the system when not using it. Locking the screen does not unload the keys. Encryption keys in large deployments In large deployments (30,000 + nodes), you should not deploy the keys to all systems at once. This will overload the Tomcat process on the epo server (since that is the only thing that can process data channel messages and keys are distributed via the data channel). Adopt a phased deployment strategy and keep key delivery to a level suitable to your server; a rough recommendation would be no more than 100 systems per hour. Larger servers could handle more, like 1000 systems per hour but McAfee recommends engaging professional services to determine the optimal rate for your environment. Do not encrypt entire local drives EEFF is a file and folder encryption software, not full disk encryption software. Thus, except for removable drives, it is not recommended to encrypt entire drives with EEFF, e.g. C: Prevent deployment to non-supported client OS Use epo to prevent deployments to Windows XP 64 bit and Windows Vista 64 bit. This can be done by leveraging tagging in epo. Simply create tags to identify a system s operating system, and then instruct the product deployment task to only to go systems with the appropriate operating system tag. Pragmatic policy assignment rules As a general approach, consider creating policies in a way that allows you to create a single default policy for your environment and assign that policy to all systems via a System Policy Assignment rule. Then use the User Based Policy Assignment Rules to create additional exception policies. This minimizes the amount of processing that epo has to do. 6

7 General Recommendations Minimize usage of System Tree based Assignments Try to reduce the usage of System Tree Based Policy Assignment Rules. Instead, it is recommended to use the System Based Policy Assignment Rules and the User Based Policy Assignment Rules. Self-Extractors: Maximum data input size The maximum data input size for a Self-Extractor is 10 MB. Although larger data input can be used, the recommended maximum input is 10 MB since the Self-Extractor code is optimized for this maximum data input. Self-Extractors: Password rules The password rules for Self-Extractors follow the default rules in Windows for complex passwords. These rules are static and cannot be changed in EEFF 4.0. Policy control of these password rules will be implemented in later versions of EEFF. The static password rules are: password is at least six characters long password contains characters from at least three of the following five categories: o English uppercase characters (A - Z) o English lowercase characters (a - z) o Base 10 digits (0-9) o Non-alphanumeric (For example:!, $, #, or %) Unicode characters password does not contain three or more characters from the user's account name Reference: 7

8 Folder encryption Folder encryption Local volumes Do not encrypt entire local volumes and in particular the system volume. Doing this may cause deadlocks in the client systems. Program Files directory Do not encrypt the [Program Files] directory as it may cause deadlocks in the client systems. Drive letters Do not assign folder encryption onto removable devices (e.g. a USB-Hard disk) drive based on the drive letter. As the drive letter assigned to the removable device very well may change each time the device is attached, and other drives may be assigned the letter previously assigned to the removable device, it could lead to unintentional encryption of other devices. The User profile folder Do not encrypt the entire User profile. Although the User s profile is a folder per se, it is not recommended to encrypt that entire folder with a folder encryption policy as it may render deadlocks. Instead, try to isolate what folders may actually contain sensitive data worth encrypting. If this is a real concern, consider deploying McAfee HostDLP to assess the content of each file and have sensitive files encrypted via the EEFF-HDLP integration. The Desktop folder Be careful if you plan to encrypt the Desktop folder. Only do this if you re sure you don t have static links to other drives on the desktop. LNK-linked shortcuts are fine, but static hard links to other drives will render these targets being encrypted if the shortcuts are on the Desktop. It is a best practice to specify specific directories in the EEFF folder policy screen. This is done by choosing [Desktop] and then adding the specific paths like [Desktop]\FolderA and [Desktop]\FolderB. Only choose [Desktop] if you re sure you don t have static links to other drives on the desktop. 8

9 Folder encryption The Microsoft Outlook data directories Don t encrypt the Microsoft Outlook data directories containing the OST and PST files. The McAfee recommendation is to use Windows EFS for this instead. Removing a folder encryption policy Removing a folder encryption policy does not render the content of that folder being automatically decrypted. In order to decrypt a folder listed as encrypted, you need to use the option Folder should be decrypted. Only select folders containing sensitive files Always try to pinpoint the folders containing sensitive data rather than generalizing on a high directory level, e.g. [USER]., If this is a real concern, use file extension encryption or consider deploying McAfee HostDLP to assess the content of each file and have sensitive files encrypted via the EEFF-HDLP integration. Encrypted parent folder decrypted subfolder By default, all sub-folders to a folder being encrypted will also get encrypted. However, it is possible to have a subfolder set as decrypted even if (any) parent folder is set to be encrypted, i.e. it is possible to encrypt the My Documents folder through a folder encryption policy and then have the subfolder My Video decrypted also through a policy. 9

10 Removable Media Encryption Removable Media Encryption General recommendations Definition of Removable Media in EEFF Any device that is attached to the computer and is assigned a drive letter, except for network drives, and that report itself to the operating system as Removable. The media shall also set a flag Removable in the operating system and also report to the operating system whenever a media is inserted. McAfee Encrypted USB devices are exempted by default McAfee Encrypted USB (EUSB) devices are all excluded from removable media encryption in both EERM and EEFF by default. Thus, there is no need to enter them as exempted devices. Policy enforcement for certain drives only upon write For certain devices, where a media is inserted into a reading device attached to the computer, removable media encryption policies will only be applied when there is a write operation initiated to the media. Examples of such devices are: Floppy Disk drives (FDD), and Magneto-Optical (MO) storage drives Floppy-disk drive available space When applying encryption to FDD, the floppy must contain enough free disk space to encrypt the files. If a file is larger than 50% of the floppy, the encryption will fail and the file will be left in plaintext. There is no warning message informing the user about this. Regular encryption recommendations Disabling regular removable media encryption No automatic decryption of existing files If a removable media device has already been subject to a regular removable media encryption policy, the data on the media will remain encrypted even if you disable it by switching the policy to Use no removable media encryption. The only way to decrypt the data on the media is to modify the key used in the policy. It needs to be set to Decrypt. Changing the policy to Use no removable media encryption will only affect new devices (e.g. devices that were never subject to the regular encryption policy). 10

11 Removable Media Encryption New files will keep getting encrypted Disabling the Use regular encryption option does not mean that new files created on a removable media that have been subject to the removable media encryption policy will be in plaintext - new files will still be encrypted when written to the media (the encryption policy is still applied to the removable media itself). In order to remove an applied encryption policy on removable media, the option Make all removable media plaintext must be enabled. Option Ignore existing content on media This option is disabled by default. This means that all existing files on attached removable media will become encrypted (not ignored). When this setting is enabled, only new files will be encrypted when placed on removable media attached to a system that has this policy applied. When this option is disabled, all existing files become encrypted, i.e. not ignored. Therefore, they can no longer be read from systems without Endpoint Encryption for Files and Folders. Be mindful when leaving this option disabled. EERM encryption recommendations Upgrading the EERM client on an encrypted device It is not recommended to copy/paste the new MfeEERM.exe file from an EEFF system onto an existing EERM protected device, because: 1. The new MfeEERM.exe may simply not fit in the available space on an EERM protected device. In particular, this applies when the entire device is protected. 2. If the policy to make Unprotected Files and Folders Read-Only is in effect, it is not possible to paste the new executable on the device in the first place. 3. If the new executable is smaller than the existing one, it means there will be a small space available for plaintext files, i.e. a security hole. The best way to upgrade an EERM client on an encrypted device is to backup all data in the encrypted container, reformat the device, re-initialized it from a system with the latest EEFF client installed and then put the backup data back into the encrypted container on the re-initialized device. Use User Personal Key as Recovery Key If the recovery option Recovery Key is used it is recommended to use the User Personal Key as recovery key. Using a regular key as recovery key allows all users with access to that recovery key to do recovery on other users devices where the same recovery key is in use. Using the User Personal Key as recovery key also allows auditing and forensics in a situation where e.g. an Administrator or Auditor needs to get access to a user s encrypted device. By changing the access rights for that user s User Personal Key to 11

12 Removable Media Encryption also include the Auditor, the devices can be recovered directly by the Auditor and the data content read. Exclude very-high capacity devices Exclude very large capacity devices, say above 128 GB. Although it is indeed possible to also encrypt very large capacity devices with EERM, the initialization will take a very long time. For very high capacity devices McAfee recommends hardware with built-in encryption, e.g. McAfee Encrypted USB. McAfee Device Control can then be used to block all devices that are not encrypted with EERM or are not hardware with built-in encryption. 12

13 File Extension Encryption File Extension Encryption Try to avoid using the wildcard ( * ) as extension The wildcard ( * ) extension in file extension encryption is very powerful. Truly every file created by the stated application will be encrypted, including templates, index files etc. Although attractive to use due to its ease, it is strongly recommended to carefully define what file types may be created with sensitive data worth encrypting. Make a serious attempt to list the file types being created in your organization that may contain sensitive data. For example, a template file (e.g. *.dot) does not normally contain any sensitive data. If this is a real concern, consider deploying McAfee HostDLP to assess the content of each file and have sensitive files encrypted via the EEFF-HDLP integration. Enter process name and extension You need to enter process name and the [exe] extension; e.g. notepad.exe. Process names may easily be identified by starting the corresponding application and then locate the process name in the Windows Task Manager. 13

14 CD/DVD encryption CD/DVD encryption Supported burning applications Assure the burning software is on the list of supported CD/DVD burning applications in the EEFF documentation (Product Release Notes). Using a non-supported burner may render CD/DVDs being plaintext, despite the policy stipulates encryption. CD format limitations Assure the CD/DVD media that is used is on the list of supported CD/DVD formats. EEFF client required to read encrypted CD/DVD An encrypted CD/DVD can only be read on a system that has EEFF installed and the encryption key available 14

15 User Local Keys User Local Keys User Local Keys vs. User Personal Keys Please note the difference between User Local Keys and the User Personal Key features. User Local Keys are keys the users manually can create on their own on their local machines and share manually via export/import. The availability of the User Local Key functions for the user is subject to policy control. User Personal Keys are individual keys for each user automatically created in McAfee epo and also managed centrally in McAfee epo. The user is never engaged in creating and managing User Personal Keys all management for User Personal Keys is done in epo. Limited support in EEFF 4.0 User Local Keys is not fully supported in EEFF 4.0 due to certain deferred issues. Thus, use this feature sensibly. Use Key Request Exclusions If there are files encrypted using User Local Keys, make sure you use Key Request Exclusions for relevant processes that may trigger an authentication prompt. If you don t then applications like virus scanners may get stuck on encrypted files while waiting for the user to authenticate. Delete User Local Keys with caution Be very careful with allowing users to delete local user encryption keys. If deleted, there is no way to restore that key. 15

16 Encryption Options Encryption Options Tune I/O Utilization to preserve network traffic If you want to encrypt large folders on a network share, it is recommended to set this value to 20 30%. Option Use wiping when encrypting and deleting files In general, be careful about using the use wiping when encrypting and deleting files. Basically, do not use this feature unless you absolutely must because it will slow your system down. Blocked Processes The intent of the feature Use blocked processes only if you are sure of why you want to do this. The main purpose of process blocking is to prevent encrypted data from being unintentionally exposed in plaintext; this is done by circumventing the Endpoint Encryption for Files and Folders encryption engine. One example of this is to prevent encrypted data from being uploaded to external FTP sites. By blocking the FTP process, it is not possible for the user to upload data in plaintext to an FTP server. The aim of this feature is not to share encrypted data via e.g. web-mail or the Internet. The Blocked Processes feature is not designed for such usage. Consider the process exemption feature as a prevention feature, a part of the concept of digital rights management, rather than a way for users to share encrypted data. For sharing encrypted files beside regular file shares or removable media, consider using the features of attachment encryption or Self-Extractors. Processes that are OK to block FTP processes File-sharing processes File backup processes Processes that are risky to block Internet browser processes client processes 16

17 Encryption Options Note: The data will remain encrypted, but the applications may alter the file and render the data unreadable when sent to a network resource or recipient. The source file will remain intact at all times. Processes that must never be blocked Data compression applications like WinZip The Windows Explorer Windows processes EEFF client processes Virus scanning processes Processes for other McAfee products Key Request Exclusions Processes that must never be put as exclusions The Windows Explorer EEFF client processes 17

18 Network share encryption Network share encryption Very large network folders Explicitly encrypt large shares in advance For large network folders that shall be encrypted, rather than having the folders encrypted through a folder encryption policy, consider a manual (explicit) encrypt of the network folder(s) in advance, from a machine with EEFF deployed. Initiate the encryption from this single machine, after logging on with an appropriate EEFF user, and then let the encryption run, say, maybe overnight. The reason is to avoid extreme payload on the file server(s) from many clients seeking to 1. Enumerate, 2. Fetch 3. Encrypt and 4. Upload files to/from the server(s). By doing this, the risk of network failure and file server payload overflow is minimized. Tune network parameters When encrypting large folders on a network share through a policy, it is strongly recommended to tune the network encryption intensity. The following values are recommended: I/O Utilization: 20% (Set in Encryption options policy) Bandwidth limit: 100 KB/sec. (Set in Network policy) Network latency: 600 ms. (Set in Network policy) Tune Maximum number of clients allowed You also may want to tune the network folder encryption based on the capacity of the client machines and the overall network traffic. Use the parameter Maximum number of clients allowed to encrypt folder to, say 10, for increasing the encryption intensity if there is generous network capacity. Tune I/O Utilization to preserve network traffic If you want to encrypt large folders using a folder encryption policy on a network share, it is recommended to tune the I/O Utilization value to 20 30%. Consider the option Enable limiting of file size You can use this option to prevent (very) large files from being encrypted by the policy enforcement; particularly for network shares where encryption of large files may cause heavy network traffic. 18

19 Network share encryption Files encrypted with explicit (right-click) Encrypt are not subject to this limitation, nor are files encrypted by a file extension encryption policy. Other files not subject to this limitation are files that are drag-dropped to encrypted folders and files saved to encrypted folders. Again, the option only applies for files in folders being encrypted according to a folder encryption policy. 19

20 Encryption Keys Encryption Keys Deactivate keys instead of Delete keys In McAfee epo it is strongly recommended never to delete Keys. Instead, it is sufficient to just deactivate. This is to safeguard against any eventuality where a document is encrypted with a key that is no longer in the system. A deleted encryption key cannot be restored. User Personal Keys and multiple epo databases Don t use user personal keys in a multi-database epo environment. This is only safe to do if a user only registers with one and the same epo database and always gets policies and keys from the same single epo instance. 20

21 Troubleshooting recommendations Troubleshooting recommendations Client Status report Always collect and submit the EEFF Client Status report (if possible) for all troubleshooting cases. Trace files Submit only when necessary Only create trace files if the issue really can be investigated using these files. Not all types of issues require trace files. See the EEFF Troubleshooting Guide for details. Keep the EEFF driver trace minimal in size When creating an EEFF driver trace file, ensure tracing is started just before the issue is reproduced, and stopped immediately after the issue has been reproduced. All other activities should be avoided when driver tracing is enabled; this is because the driver trace output file quickly grows very large. Don t try to read or interpret trace files Don t attempt to read or interpret/analyze any EEFF trace file as it may damage the file. Only the Engineering teams with the right debugging tools can make any use of the trace files. No secret information in the trace files No encryption key secrets data are ever included in any trace files. The only thing related to encryption keys in the trace files (and the Client Status report) is the name of the encryption key and its identifier (GUID). Give info for trace files For issues where trace files are collected, also provide details about the reproduced issue, e.g. file name, paths etc. This will greatly simplify Engineering s analysis work. Dump files For all system stop errors (BSODs): Get the dump file. Trace files are not relevant when investigating system stop errors. Only the dump file is of any importance for this kind of issue. A full memory dump is normally the best, but usually a Mini dump also gives lots of information. See the Troubleshooting Guide for additional information on how to collect dump files. Do not attempt to open and analyze the dump files as this may damage the dump file. Simply create the file and send it to McAfee Support. 21

22 Troubleshooting recommendations EEFF files For support purposes it may be useful to see in the Windows Explorer what the purpose is of each EEFF client DLL file. A short description can be made visible by enabling the Description column in the Windows Explorer. 22

McAfee File and Removable Media Protection 4.3.0

McAfee File and Removable Media Protection 4.3.0 Best Practices Guide McAfee File and Removable Media Protection 4.3.0 For use with epolicy Orchestrator 4.6.6, 4.6.7, 5.0.1, 5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission.

More information

How To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4

How To Encrypt Files And Folders With A Password Protected By A Password Encrypted By A Safesafe (Mafee) 4.2.2 (Eeff) 4 Product Guide McAfee Endpoint Encryption for Files and Folders 4.2 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation

McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation 2013.06 McAfee Endpoint Encryption for Files and Folders (EEFF) uses powerful encryption technology to allow you to protect information

More information

POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment

POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6. New Deployments Only Windows Deployment POC Installation Guide for McAfee EEFF v4.1.x using McAfee epo 4.6 New Deployments Only Windows Deployment 1 Table of Contents 1 Introduction 4 1.1 System requirements 4 1.2 High level process 5 1.3 Troubleshooting

More information

McAfee Endpoint Encryption Manager

McAfee Endpoint Encryption Manager McAfee Endpoint Encryption Manager Product Release Notes Version 5.2.6 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 Internet: www.mcafee.com Document:

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic. OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2 Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

1 of 10 1/31/2014 4:08 PM

1 of 10 1/31/2014 4:08 PM 1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information

IBackup Drive User Guide

IBackup Drive User Guide IBackup Drive User Guide TABLE OF CONTENTS Introduction... 3 Features... 4 Install IBackup Drive... 5 Login to IBackup Drive... 5 About Main Screen... 7 Settings... 8 Toolbar Options... 11 IBackup Drive

More information

DriveLock and Windows 8

DriveLock and Windows 8 Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

PGP Portable Quick Start Guide Version 10.2

PGP Portable Quick Start Guide Version 10.2 PGP Portable Quick Start Guide Version 10.2 Introduction to PGP Portable Use PGP Portable to distribute encrypted files to users who do not have PGP Desktop software. Use PGP Portable to transport files

More information

UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0

UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0 UltraBac Documentation UBDR Gold Bare Metal Disaster Recovery Administrator Guide UBDR Gold v8.0 UBDR Administrator Guide UBDR Gold v8.0 The software described in this guide is furnished under a license

More information

`````````````````SIRE USER GUIDE

`````````````````SIRE USER GUIDE `````````````````SIRE USER GUIDE Table of Contents INTRODUCTION 3 SYSTEM REQUIREMENTS 4 RUNNING SANDISK BACKUP 5 Setup Your First Backup 6 Create Your Backup 7 Custom Backup 8 Dmailer Online 10 Launch

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

FAQ. F-Secure Online Backup

FAQ. F-Secure Online Backup F-Secure Online Backup Before installation... 3 Does the F Secure Online Backup program work if there are other online backup programs installed on my computer?... 4 Are two online backup programs better

More information

Imaging Computing Server User Guide

Imaging Computing Server User Guide Imaging Computing Server User Guide PerkinElmer, Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44 (0) 24 7669 0091 E cellularimaging@perkinelmer.com

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Installation and Deployment

Installation and Deployment Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats

More information

McAfee Endpoint Encryption Reporting Tool

McAfee Endpoint Encryption Reporting Tool McAfee Endpoint Encryption Reporting Tool User Guide Version 5.2.13 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local

More information

USER MANUAL. v. 11.3 ------------------------ January 2014 ------------------------

USER MANUAL. v. 11.3 ------------------------ January 2014 ------------------------ USER MANUAL v. 11.3 ------------------------ January 2014 ------------------------ 1 Contents At a Glance Miscellaneous 3 About EncryptDisc 14 Product info 4 About this manual 15 Copyright & trademark

More information

TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista

TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

User Guidance. CimTrak Integrity & Compliance Suite 2.0.6.19

User Guidance. CimTrak Integrity & Compliance Suite 2.0.6.19 CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface User Guidance

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Remote Filtering Software

Remote Filtering Software Remote Filtering Software Websense Web Security Solutions v7.7-7.8 1996 2013, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2013 The products and/or

More information

Managed Antivirus Quick Start Guide

Managed Antivirus Quick Start Guide Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt

More information

SOFTWARE INSTALLATION INSTRUCTIONS

SOFTWARE INSTALLATION INSTRUCTIONS AUDITGARD LGA Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS Implementation Package The AuditGard Software implementation package includes: 707013 AuditGard Software Install CD 42145 Programming/Audit

More information

Installing Windows XP Professional

Installing Windows XP Professional CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows

More information

Help. F-Secure Online Backup

Help. F-Secure Online Backup Help F-Secure Online Backup F-Secure Online Backup Help... 3 Introduction... 3 What is F-Secure Online Backup?... 3 How does the program work?... 3 Using the service for the first time... 3 Activating

More information

Egress Switch Reader. User Guide 2.3

Egress Switch Reader. User Guide 2.3 Egress Switch Reader User Guide 2.3 November 2015 Confidentiality statement This document contains information confidential and proprietary to Egress Software Technologies. It shall not be disclosed in

More information

Full Disk Encryption Agent Reference

Full Disk Encryption Agent Reference www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or

More information

R-MAIL for Outlook Express

R-MAIL for Outlook Express R-MAIL for Outlook Express User's Manual (C) Copyright 2006 R-tools Technology Inc. 2002...2006 R-tools Technology Inc. All rights reserved. No part of this User's Manual may be copied, altered, or transferred

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

NTI Backup Now EZ v2 User s Guide

NTI Backup Now EZ v2 User s Guide NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Samsung Drive Manager User Manual

Samsung Drive Manager User Manual Samsung Drive Manager User Manual The contents of this manual are subject to change without notice. Companies, names and data used in examples are not actual companies, names or data unless otherwise noted.

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Manage the Endpoints. Palo Alto Networks. Advanced Endpoint Protection Administrator s Guide Version 3.1. Copyright 2007-2015 Palo Alto Networks

Manage the Endpoints. Palo Alto Networks. Advanced Endpoint Protection Administrator s Guide Version 3.1. Copyright 2007-2015 Palo Alto Networks Manage the Endpoints Palo Alto Networks Advanced Endpoint Protection Administrator s Guide Version 3.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,

More information

Getting Started with VMware Fusion

Getting Started with VMware Fusion Getting Started with VMware Fusion VMware Fusion for Mac OS X 2008 2012 EN-000933-00 2 Getting Started with VMware Fusion You can find the most up-to-date technical documentation on the VMware Web site

More information

Portions of this product were created using LEADTOOLS 1991-2010 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2010 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2010 Installation Guide, product version 6.4. This guide is item number DOC-110, revision 1.045, May 2010 Copyright 1995-2010 Lenel Systems International, Inc. Information

More information

McAfee Optimized Virtual Environments for Servers. Installation Guide

McAfee Optimized Virtual Environments for Servers. Installation Guide McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

Backup and Recovery FAQs

Backup and Recovery FAQs May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General

More information

TPM. (Trusted Platform Module) Installation Guide V2.1

TPM. (Trusted Platform Module) Installation Guide V2.1 TPM (Trusted Platform Module) Installation Guide V2.1 Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM... 6 2.2 Installing

More information

Symantec Endpoint Encryption Device Control Release Notes

Symantec Endpoint Encryption Device Control Release Notes Symantec Endpoint Encryption Device Control Release Notes Symantec Endpoint Encryption Device Control 8.2.0 www.symantec.com About Symantec Endpoint Encryption Device Control Symantec Endpoint Encryption

More information

McAfee Endpoint Encryption for Files and Folders. Self Extractor White Paper

McAfee Endpoint Encryption for Files and Folders. Self Extractor White Paper McAfee Endpoint Encryption for Files and Folders Self Extractor White Paper About Endpoint Encryption for Files and Folders Self-Extractors Introduction Endpoint Encryption for Files and Folders is a

More information

Understanding Backup and Recovery Methods

Understanding Backup and Recovery Methods Lesson 8 Understanding Backup and Recovery Methods Learning Objectives Students will learn to: Understand Local, Online, and Automated Backup Methods Understand Backup Options Understand System Restore

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012.

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Copyright 1995-2012 Lenel Systems International, Inc. Information

More information

COMBOGARDPRO. 39E Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS

COMBOGARDPRO. 39E Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS COMBOGARDPRO 39E Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS IMPLEMENTATION PACKAGE The ComboGard Pro Software implementation package includes: 707012 ComboGard Pro Software Install

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

Selected Windows XP Troubleshooting Guide

Selected Windows XP Troubleshooting Guide 1 Selected Windows XP Troubleshooting Guide To locate lost files: Compiled by: Jason M. Cohen Check these locations to locate lost files: The My Documents folder Click Start, and then click My Documents.

More information

System Image Backup and Recovery

System Image Backup and Recovery System Image Backup and Recovery Enveloc s new System and Drive Imaging feature is an important part of an effective disaster recovery plan and can allow you to restore a machine after a complete crash

More information

Upgrading Client Security and Policy Manager in 4 easy steps

Upgrading Client Security and Policy Manager in 4 easy steps Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security

More information

Egress Switch Client Deployment Guide V4.x

Egress Switch Client Deployment Guide V4.x Egress Switch Client Deployment Guide V4.x www.egress.com 2007-2013 Egress Software Technologies Ltd Table of Contents System Requirements... 4 Deployment Process... 4 Computer & User Based Policy Application...

More information

Kaspersky Password Manager

Kaspersky Password Manager Kaspersky Password Manager User Guide Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions that may arise.

More information

Imation LOCK User Manual

Imation LOCK User Manual Page: - 0 - Imation LOCK User Manual Security Application Program V2.0 - D Page: - 1 - Table of Contents A. Introduction... 2 B. General Description... 2 C. Features... 2 D. Before Using the Security Application

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

SP Widget. Users Manual

SP Widget. Users Manual SP Widget Users Manual 1 Contents 1. Disclaimer notice... 4 2. Product intro...5 3. System requirements... 5 4. Introduction... 6 4.1 Activating SP Widget... 6 Illustration 4.1... 6 4.2 Browser interface...

More information

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup

More information

Creating a Virtual CDFS File Server

Creating a Virtual CDFS File Server Table of Contents Table of Contents Introduction 1 Foreword... 1 Legal Notices... 2 Document Conventions... 2 What Virtual CD FS can do for you... 3 New Features in Version 9... 4 Virtual CD FS Licensing...

More information

USER MANUAL. v. 11.4.1 ---------------------- December 2015 ----------------------

USER MANUAL. v. 11.4.1 ---------------------- December 2015 ---------------------- USER MANUAL v. 11.4.1 ---------------------- December 2015 ---------------------- Contents At a Glance Miscellaneous 3 About EncryptDisc 14 Product info 4 About this manual 15 Copyright & trademark 15

More information

About this release. McAfee Application Control and Change Control 6.1.1. Addendum. Content change tracking. Configure content change tracking rule

About this release. McAfee Application Control and Change Control 6.1.1. Addendum. Content change tracking. Configure content change tracking rule Addendum McAfee Application Control and Change Control 6.1.1 About this release For use with epolicy Orchestrator 4.6 5.0 Software This document is an addendum to the McAfee Change Control and Application

More information

Application Compatibility Best Practices for Remote Desktop Services

Application Compatibility Best Practices for Remote Desktop Services Application Compatibility Best Practices for Remote Desktop Services Introduction Remote Desktop Services in Windows Server 2008 R2 allows Windows Server to be accessed by multiple users concurrently to

More information

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec

More information

File and Printer Sharing with Microsoft Windows

File and Printer Sharing with Microsoft Windows Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of

More information

User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)

User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013) 1 Laplink DiskImage 7 Professional Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/contact E-mail: CustomerService@laplink.com Laplink Software, Inc. 600 108th Ave.

More information

General DBA Best Practices

General DBA Best Practices General DBA Best Practices An Accelerated Technology Laboratories, Inc. White Paper 496 Holly Grove School Road West End, NC 27376 1 (800) 565-LIMS (5467) / 1 (910) 673-8165 1 (910) 673-8166 (FAX) E-mail:

More information

FAQ. F-Secure Online Backup 2.1

FAQ. F-Secure Online Backup 2.1 FAQ F-Secure Online Backup 2.1 Before installation... 4 Does the F-Secure Online Backup program work if there are other online backup programs installed on my computer?... 4 Are two online backup programs

More information

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

NetBak Replicator 4.0 User Manual Version 1.0

NetBak Replicator 4.0 User Manual Version 1.0 NetBak Replicator 4.0 User Manual Version 1.0 Copyright 2012. QNAP Systems, Inc. All Rights Reserved. 1 NetBak Replicator 1. Notice... 3 2. Install NetBak Replicator Software... 4 2.1 System Requirements...

More information

Norton Save and Restore

Norton Save and Restore Norton Save and Restore Norton Save and Restore User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

How Endpoint Encryption Works

How Endpoint Encryption Works WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint

More information

USB flash drive (128MB,256MB,512MB,1GB,2GB,4GB)

USB flash drive (128MB,256MB,512MB,1GB,2GB,4GB) USB flash drive (128MB,256MB,512MB,1GB,2GB,4GB) Despite the different brands and names you've heard for USB flash drives JumpDrives, Pocket drives, Pen drives, and Thumb drives they all pretty much operate

More information

Sentinel Installation Guide

Sentinel Installation Guide Installation Guide All rights reserved. Neither this documentation nor any part of it may be reproduced, stored in a retrieval system, translated into another language, or transmitted in any form or by

More information

Backing up and restoring HP Systems Insight Manager 6.0 or greater data files in a Windows environment

Backing up and restoring HP Systems Insight Manager 6.0 or greater data files in a Windows environment Technical white paper Backing up and restoring HP Systems Insight Manager 6.0 or greater data files in a Windows environment Table of contents Abstract 2 Introduction 2 Saving and restoring data files

More information

White Paper: Whole Disk Encryption

White Paper: Whole Disk Encryption How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

Using Websense Data Endpoint Client Software

Using Websense Data Endpoint Client Software 1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization

More information