1 This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged by operating systems. Acceptable Encryption Usage for UTHSC Avoiding the legal hassles of stolen computers, thumb drives, and portable devices. Information Security July 2014 pg. 0
2 Table of Contents Purpose... 2 Introduction... 2 Microsoft Windows Systems... 3 Turning On BitLocker Drive Encryption on a Fixed or Removable Data Drive (Windows 7)... 3 Using BitLocker to encrypt a USB Flash Drive... 5 Using BitLocker To Go Reader (for Windows Vista and XP Only)... 8 Macintosh and Linux Systems Xythos Appendices for FIPS and FIPS Validation Appendix A - Advanced Encryption Standard Algorithm Validation List Appendix B - Validated Cryptographic Modules List Appendix C - Cryptographic Program Modules Validation In Process List P a g e
3 Purpose This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged by operating systems. Introduction Enabling UTHSC users to protect sensitive data is the job of IT security. Protecting sensitive UTHSC data is the job of the user. This document empowers users to protect months and years of research, protect privacy of patients, and guard against the costly and damaging effects of compromised data. Be informed, be protected and be secure. Objectives: 1. Provide access to validated encryption software 2. Provide instruction for use 3. Supply supporting documentation of validation 4. Maintain updated information. Compliance with NIST Standards and Guidelines In accordance with the provisions of FISMA,1 the Secretary of Commerce shall, on the basis of standards and guidelines developed by NIST, prescribe standards and guidelines pertaining to federal information systems. The Secretary shall make standards compulsory and binding to the extent determined necessary by the Secretary to improve the efficiency of operation or security of federal information systems. Standards prescribed shall include information security standards that provide minimum information security requirements and are otherwise necessary to improve the security of federal information and information systems. Federal Information Processing Standards (FIPS) are approved by the Secretary of Commerce and issued by NIST in accordance with FISMA. FIPS are compulsory and binding for federal agencies.2 FISMA requires that federal agencies comply with these standards, and therefore, agencies may not waive their use. Special Publications (SPs) are developed and issued by NIST as recommendations and guidance documents. For other than national security programs and systems, federal agencies must follow those NIST Special Publications mandated in a Federal Information Processing Standard. FIPS 200 mandates the use of Special Publication , as amended. In addition, OMB policies (including OMB Reporting Instructions for FISMA and Agency Privacy Management), state that for other than national security programs and systems, federal agencies must follow certain specific NIST Special Publications.3 Other security-related publications, including interagency reports (NISTIRs) and ITL Bulletins, provide technical and other information about NIST's activities. These publications are mandatory only when specified by OMB. Compliance schedules for NIST security standards and guidelines are established by OMB. 2 P a g e
4 Microsoft Windows Systems Turning On BitLocker Drive Encryption on a Fixed or Removable Data Drive (Windows 7) Updated: August 26, 2009 Applies To: Windows 7 This scenario provides the procedure for turning on BitLocker Drive Encryption protection on a fixed or removable data drive on a computer. Caution When encrypting a removable drive, do not suddenly remove the drive. If you need to remove a drive before encryption is complete, pause the encryption process and then use either the Safely Remove Hardware icon from the notification area or the Eject command from Windows Explorer to remove the drive. Removing the drive during the encryption process without pausing and intentionally removing the device can cause the data on the drive to be corrupted. Before you start To complete the procedure in this scenario: You must be able to provide administrative credentials to turn on BitLocker for fixed data drives. Standard user accounts can turn on BitLocker To Go on removable data drives. You must be able to configure a printer if you want to print the recovery key. Your computer must meet BitLocker requirements. For more information, see "Requirements for BitLocker Drive Encryption" in BitLocker Drive Encryption Step-by- Step Guide for Windows 7. To turn on BitLocker Drive Encryption on a fixed or removable data drive 1. Click Start, click Control Panel, click System and Security, and then click BitLocker Drive Encryption. 2. Click Turn On BitLocker for the fixed or removable data drive that you want to encrypt. 3 P a g e
5 Note If you have configured the Group Policy settings in your organization to back up BitLocker recovery information to Active Directory Domain Services (AD DS), the computer must be able to connect to the domain to complete this process. 3. The BitLocker setup wizard will ask you how you want to unlock this drive. Fixed data drives can be configured to automatically unlock when the operating system drive is encrypted, to unlock after a password is supplied, or to unlock after a smart card is inserted. Removable data drives can be configured to unlock after a password is supplied or to unlock after a smart card is inserted. If you want the removable data drive to automatically unlock, you can specify that option after encryption has occurred by clicking Manage BitLocker from the BitLocker Drive Encryption Control Panel item or by selecting the Automatically unlock on this computer from now on check box when you unlock the drive. 4 P a g e
6 4. Before BitLocker encrypts the drive, the BitLocker setup wizard prompts you to choose how to store the recovery key. You can choose from the following options: Save the recovery key to a USB flash drive. Saves the recovery key to a USB flash drive. This option cannot be used with removable drives. Save the recovery key to a file. Saves the recovery key to a network drive or other location. Print the recovery key. Prints the recovery key. Use one or more of these options to preserve the recovery key. For each option that you select, follow the wizard steps to set the location for saving or printing the recovery key. When you have finished saving the recovery key, click Next. Important The recovery key is required when a BitLocker-protected fixed data drive configured for automatic unlocking is moved to another computer, or the password or smart card associated with unlocking the fixed or removable drive is not available, such as when a password is forgotten or a smart card is lost. You will need your recovery key to unlock the encrypted data on the drive if BitLocker enters a locked state. This recovery key is unique to this particular drive. You cannot use it to recover encrypted data from any other BitLockerprotected drive. For maximum security, you should store recovery keys apart from the drives they are 5. The associated BitLocker with. setup wizard asks if you are ready to encrypt the drive. Click Start Encrypting. 6. The Encrypting status bar is displayed. You can monitor the ongoing completion status of the drive encryption by moving the mouse pointer over the BitLocker Drive Encryption icon in the notification area, at the far right of the taskbar. By completing this procedure, you have encrypted a fixed or removable data drive, associated a key protector with an unlock method for the drive, and created a recovery key that is unique to this drive. Using BitLocker to encrypt a USB Flash Drive To enable BitLocker encryption on a USB flash drive, do the following: 1. Insert the USB flash drive, click Start, and then click Computer. 2. Right-click the USB flash drive, and then click Turn On BitLocker. BitLocker initializes the drive. 5 P a g e
7 3. On the Choose How You Want To Unlock This Drive page, choose one or more for the following options, and then click Next: Use A Password To Unlock This Drive - Select this option if you want the user to be prompted for a password to unlock the drive. Passwords allow a drive to be unlocked in any location and to be shared with other people. Use My Smart Card To Unlock The Drive - Select this option if you want the user to use a smart card and enter the smart card PIN to unlock the drive. Because this feature requires a smart card reader, it is normally used to unlock a drive in the workplace and not for drives that might be used outside the workplace. 6 P a g e
8 4. On the How Do You Want To Store Your Recovery Key page, click Save The Recovery Key To A File. 5. In the Save BitLocker Recovery Key As dialog box, choose a save location, and then click Save. You can now print the recovery key if you want to. When you have finished, click Next. 6. On the Are You Ready To Encrypt This Drive page, click Start Encrypting. Do not remove the USB flash drive until the encryption process is complete. How long the encryption process takes depends on the size of the drive and other factors. The encryption process does the following: 1. Adds an Autorun.inf file, the BitLocker To Go reader, and a Read Me.txt file to the USB flash drive. 2. Creates a virtual volume with the full contents of the drive in the remaining drive space. 3. Encrypts the virtual volume to protect it. USB flash drive encryption takes approximately 6 to 10 minutes per gigabyte to complete. The encryption process can be paused and resumed provided that you don t remove the drive. As a result, when AutoPlay is enabled and you insert the encrypted drive into a USB slot on a computer running Windows 7, Windows 7 runs the BitLocker To Go reader, which in turn displays a dialog box. When you are prompted, enter the password, smart card PIN, or both to unlock the drive. Optionally, select Automatically Unlock On This Computer From Now On to save the password in an encrypted file on the computer s system volume. Finally, click Unlock to unlock the volume so that you can use it. From the Microsoft Press book Windows 7 Administrator s Pocket Consultant by William R. Stanek. 7 P a g e
9 Using BitLocker To Go Reader (for Windows Vista and XP Only) BitLocker is more than just a USB protector. It protects any type of removable drive and it works independently of the OS's BitLocker, so "regular" BitLocker isn't required. However, BitLocker Reader must be installed on systems running Windows Vista or earlier. (Go to Page 9) 8 P a g e
10 BitLocker To Go overlays a "discovery volume" on the physical drive, which contains the BitLocker To Go Reader and installation instructions. The reader is also available for download from the link below: c9-4cd4-8e8d-f551f06f6b3d Install BitLocker To Go Reader following the wizard instructions. Insert USB drive into USB slot. Users can read from, but not write to, protected devices on Windows Vista and Windows XP. Only password-protected volumes (not smart card or domain) are usable with the reader. Enter the password and click unlock. NOTE: You will not be able to open the document from the drive, copy it to your desktop and open normally. If changes are made to the document, you will NOT be able to save it back on the USB drive. 9 P a g e
11 Macintosh and Linux Systems Encryption for the Macintosh (OS X Leopard, Snow Leopard, & Lion) You can turn on disk encryption to encrypt the information in your home folder. Encryption scrambles the data in your home folder so that unauthorized users, applications, or utilities can t access your data. To set up disk encryption for your home folder, you must be an administrator on your computer, or you must get an administrator s help. When you turn on disk encryption for the first time, your home folder is encrypted. While your home folder is being encrypted, you won t be able to log in to your account or use your computer to do other tasks. The process could take a while, depending on how much information you have in your home folder. Before you begin, make sure you have enough free space on the hard disk that contains your home folder. You need as least as much free space as your home folder currently occupies. For example, if your home folder uses 20 MB, make sure you have at least 20 MB of available space. This space is needed temporarily during the encryption process. You must create a master password in case you forget your regular login password. WAR NI NG : Don t forget your master password. If you turn on disk encryption and then forget both your login password and your master password, you won t be able to log in to your account, and your files and settings will be lost forever. To set up disk encryption on your computer: 1. Choose Apple menu > System Preferences, click Security, and then click Disk Encryption. 2. Open the FileVault pane of Security preferences 3. If the Security preferences pane is locked, click the lock icon, and then type an administrator name and password. 4. If the Security preferences pane shows that a master password hasn t been set, click Set Master Password, and then type a password in the Master Password box. 10 P a g e
12 5. Type the password again in the Verify box. 6. Type a hint in the Hint box to help you remember the password. 7. Click OK. 8. Click Turn On Encryption. You are logged out of your account during the encryption process. When the encryption process is finished, log back in to your account. Your home folder icon changes to show that it s encrypted. 11 P a g e
13 Xythos and ephi Xythos provides a collaborative work area for your data. By default, our installation of Xythos provides both secure data transmission and backup for disaster recovery. Xythos is suitable for use with ephi (or other confidential data) if you follow the procedures below. To use Xythos with ephi, you must (1) enable File Versioning, (2) enable File Logging on a per document basis and (3) change the defaults in Issue Tickets so that you identify your collaborators and provide them with a password. You will also need to have (4) an Access Report run that shows disclosure to others of your data before all your data is deleted. These four actions are required to comply with HIPAA and are not optional. File Versioning The Versioning function is an effective way to keep track of the changes made to any file. (See the online HELP file within Xythos for other information about Versioning.) Turn Versioning on for a file: 1. Click the box next to your document. 2. Click on the Manage icon at the top of the screen and then choose Versioning. 3. Use the Enable Versioning button to turn versioning on. 4. Click the Exit button to exit the Versioning screen. File Logging The Logging option allows you to keep a record of who accesses your files and when they do so. The current Logging status of a file, on or off, can be seen in the file's Summary/Manage screen. When an action is performed against a file, an entry is added to the log history including: The user who performed the action The type of action performed The date and time the action occurred The IP Address of the machine from where the action occurred Actions include but are not limited to users viewing or editing the file, permission changes, and file comments that are added, edited, or deleted. (See the online HELP file within Xythos for other information about File logging.) Turn logging on or to view a history of file access: 1. Click the box next to your document. 2. Click on the Manage icon at the top of the screen and then choose Logging. 3. Within the Logging screen, click the Enable Logging button. 4. Click the Exit button to exit the Logging screen. The Logging screen displays the history of who has accessed the file for the time period in which Logging is on. Note that a logging history can only be applied to files, not to folders. 12 P a g e
14 Issuing Tickets To issue a ticket for a document containing ephi, name your ticket to identify to whom you are sending the ticket, define the permissions you are granting your collaborator, set a lifetime for the ticket, and enable a password (the dialog box may say optional, but for ephi, it s NOT optional, See the online HELP file within Xythos for other information about Tickets.) During the creation of a new ticket, the file or folder's Permissions screen is updated with the new permissions. To issue a ticket: 1. Select the file or folder you want to which you want to grant access. 2. Click the Manage button and select the Ticket option from the drop down menu. 3. Click on New Ticket. 4. Enter a name for the ticket if you wish. Select the appropriate permissions. Set the length the ticket will be valid (after this time the ticket will no longer allow access to this file). You may password protect this file. Click OK. 5. *Note: DO NOT include the password in the same as the link to the file* 6. Edit the if you wish. You can only change the text that is NOT inside the table. Click the Finish button. Access Report You should always have a report run that details the disclosure of that ephi, for your records, before you delete the document. You will need to keep that report at least three years. To run a report: 1. Choose the document in your Xythos area by checking the box name. 2. Choose Manage. Choose Logging. 3. The access log for that document will be shown on the screen. You should either screen-print or copy and paste the information into a document on your computer. For more detailed help documentation and frequently asked questions, please visit the UTHSC Xythos webpage at: https://academic.uthsc.edu/edtech/xythos/ 13 P a g e
15 Appendices for FIPS and FIPS Validation Appendix A - Advanced Encryption Standard Algorithm Validation List 14 P a g e
16 Appendix B - Validated Cryptographic Modules List 15 P a g e
17 Appendix C - Cryptographic Program Modules Validation In Process List 16 P a g e
Encrypt USB Drive to Protect Data Enable BitLocker on USB Flash Drives to Protect Data Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external
Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Contact the ITS Helpdesk at 402-559-7700 or firstname.lastname@example.org with questions. How it works Basically, BitLocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.
BitLocker To Go USB Flash Drive encryption User Guide Introduction BitLocker To Go is a new feature of Windows 7 which allows encryption of easily misplaced portable storage devices such as USB Flash Drives
BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011 Purpose To provide a step-by-step procedure for encrypting installed laptop
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to
Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.
Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install
Page: - 0 - Imation LOCK User Manual Security Application Program V2.0 - D Page: - 1 - Table of Contents A. Introduction... 2 B. General Description... 2 C. Features... 2 D. Before Using the Security Application
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark
Lesson 4 Managing Applications, Services, Folders, and Libraries Learning Objectives Students will learn to: Understand Local versus Network Applications Remove or Uninstall an Application Understand Group
Installing FileMaker Pro 11 in Windows Before you begin the installation process, please exit other open programs and save your work. Installation notes Before you install FileMaker Pro, review the following
WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows
Kaspersky Password Manager USER GUIDE Dear User! Thank you for choosing our product. We hope that this documentation helps you in your work and provides answers you may need. Any type of reproduction or
Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup
Verbatim Secure Data USB Drive User Guide User Guide Version 2.0 All rights reserved Table of Contents Table of Contents... 2 1. Introduction to Verbatim Secure Data USB Drive... 3 2. System Requirements...
istar User Manual for Comsol USB Flash Drive Format Utility Introduction Type of Format Quick: Full: Configure device only: Erase and check blocks at the same time. If there are any Bad blocks, mark them
HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Using Mac OS X 10.7 Filevault with Centrify DirectControl August 2011, Revision 2 OS X 10.7's Filevault has the ability to encrypt the entire disk. Full Disk Encryption is compatible with Centrify Active
Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and
Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4
How To Communicate with the HIS Project Team This guide is intended to provide you with support for communicating with the HIS Project Team. There may be instances where the HIS Project Team will require
User Guide for OpenDrive Application v184.108.40.206 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...
Online Backup and Recovery Manager Setup for Microsoft Windows. Backup Wizard Default Interface Recovery Wizard Online Backup and Recovery Manager Setup Backup Wizard After installing and launching the
Lexia Network Installation Instructions For Lexia Early Reading 3.x, Primary Reading 1.x, Foundation Reading 1.x, Strategies for Older Students 4.x, Cross-Trainer 1.x and Quick Reading Test 2.x (NOT for
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
Software User Guide For the safe use of your camera, be sure to read the Safety Precautions thoroughly before use. Types of software installed on your computer varies depending on the method of installation
The Remote Desktop feature in Windows allows you to control your computer from another office or from home. Remote Desktop allows you to use the applications on your office computer, and access your data
Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class A Guide for Users MozyPro is an online backup service with an easy to use interface so you can start backing
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Sophos UTM Remote Access via PPTP Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without
First Time On-Campus VLab Setup Windows XP Edition General: This guide is a step-by-step walkthrough of downloading, installing and configuring VMware View Client for the University of Cincinnati s VLab
TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
OS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN MANAGING KEYCHAINS Mac OS X features a sophisticated system that automatically protects all your authentication assets in encrypted
Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3 IV. Remote Connect to Your Work Computer... 4
GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 email@example.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS
HP ProtectTools Getting Started Copyright 2012 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Intel is a trademark
Hi-Speed USB Flash Disk User s Manual Guide System Requirements Windows 98, ME, 2000, XP, Mac OS 10.1, Linux 2.4 or above AMD or Intel Pentium 133MHz or better based computer USB 1.1, USB 2.0 or higher
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
Cloud Catcher TM Software User Manual Version 2.0 Technical Support SanDisk Knowledgebase Contact SanDisk Table of Contents Overview... 2 Minimum System Requirements... 2 Languages Supported... 2 Installing
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before
Procedure to Install Printer to the LifeWindow 6000 Rev 3. The LifeWindow OS is Windows XP embedded. Printers with driver to XPe are supported. Some printers with driver to XP can also be installed. Please
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
Truecrypt installation and usage guide for Windows XP, 7, Vista and 8 WARNING!!: Before installing Truecrypt encryption software on your computer, you should create an Acronis image back up of your computer
Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
1 EasyLock User Manual Intuitive Encryption Application for portable Storage Devices User Manual Version 220.127.116.11 2004-2010 CoSoSys Ltd. 2 Table of Contents Table of Contents... 2 1. Introduction... 3 2.
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
Using BitLocker to encrypt a Windows 8 device 1. Before BitLocker can be used to encrypt the portable device, the Trusted Platform Module must be turned on via the BIOS. Boot the device and press F2, F10,
Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
How to Recover Your Old (Expired) Certificates If you want to read signed or encrypted email messages that you sent or received using a nowexpired certificate, you first need to recover that certificate
BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data
ENABLE BITLOCKER ON WINDOWS VISTA - WITHOUT A TPM Requirements: You must be running Vista Enterprise or Vista Ultimate to enable BitLocker. Any other version of Vista is not compatible. It is recommended
NovaBACKUP Network User s Guide NovaStor / January 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change
RDM+ Remote Desktop for Mobiles RDM+ Desktop for Windows Getting Started Guide Introduction... 3 1. Installing RDM+ Desktop on a computer... 3 2. Preparing for remote connection... 4 3. RDM+ Desktop window...
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
Kaspersky Password Manager User Guide Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions that may arise.
MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative
Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance
Quick Start [For USB Flash Security Free Edition] 1 / 18 USB Flash Security Free Edition Quick Start Before use USB Flash Security 1. Free edition can only be installed on the USB Flash Drive up to 4GB
Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's
MULTIFUNCTIONAL DIGITAL SYSTEMS Network Fax Guide 2009 KYOCERA MITA Corporation All rights reserved Preface Thank you for purchasing Multifunctional Digital Color Systems. This manual explains the instructions
Virtual TimeClock Installation, Setup, & Uninstall Guide Virtual TimeClock 15 Network Edition for Mac Overview This guide will help you quickly install, configure, and if needed, uninstall Virtual TimeClock
Attix5 Pro Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition V6.0 User Manual for Mac OS X Copyright Notice and Proprietary Information All rights reserved. Attix5, 2011 Trademarks