McAfee Encrypted USB Manager 3.1 Deployment and Administration Guide

Size: px
Start display at page:

Download "McAfee Encrypted USB Manager 3.1 Deployment and Administration Guide"

Transcription

1 McAfee Encrypted USB Manager 3.1 Deployment

2 COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS SAFEBOOT is a registered trademark or trademark of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. Microsoft and Windows are registered trademarks of Microsoft Corporation. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. Attributions Refer to the product Release Notes. CONTACT INFORMATION Download Site Technical Support KnowledgeBase Search (includes access to product documentation) McAfee Technical Support ServicePortal (Logon credentials required) Customer Service Web Phone US, Canada, and Latin America toll-free: Monday Friday, 8 a.m. 8 p.m., Central Time Contact information for other countries can be accessed online by selecting a link under Worldwide Offices at: ii

3 Contents Introducing McAfee Encrypted USB Manager... 5 What s new... 5 Benefits... 6 Capabilities... 7 Supported devices... 7 Supported software... 8 Product overview... 8 Management console... 8 End-user software... 9 Licensing Installing and upgrading Manager Setting up a Manager device database Database authentication options Configuring ADAM for Manager Setting up Manager to use certificates Configuring the Certificate template Registering for an Enrollment Agent Certificate Setting up a key recovery system Setting up Manager to use RSA SecurID tokens Controlling access to the McAfee Encrypted USB Manager RSA Web Service. 17 Installing Manager Contents of Installation CD Configuring Manager Creating a custom installation Installing the client Upgrading Manager Deploying McAfee Encrypted USB Devices The deployment cycle Initialization Issuance Personalization Usage The role of the administrator Initialization Officer Issuance Officer Help Desk Operator Security Officer Help Desk support Initializing devices Creating initialization profiles Editing and deleting initialization profiles Applying initialization profiles to devices Erasing devices Issuing devices to users

4 Contents Creating usage profiles Password policies Managing usage profiles Applying new usage profiles to devices Adding users to devices Removing users from devices Revoking users and devices Revoking a user Revoking a device Issuing and managing credentials Creating credential profiles Certificate profiles RSA SecurID profiles Copying, editing and deleting profiles Issuing credentials to users Removing credentials Performing a key recovery operation Managing devices Viewing device database statistics Upgrading device firmware Recovering data Rescuing devices Viewing device information Generating reports Managing portable content Creating a portable content file Adding and deleting content Copying, renaming, and moving items in the navigation pane Exporting portable content Updating portable content on devices Creating a portable software package Distributing the portable software package Installing the portable software package Configuring Web Login Config Creating applications Adding credentials Adding forms Configuring the Connector menu General System Tray Menu Configuring the client Glossary Index

5 Introducing McAfee Encrypted USB Manager McAfee Encrypted USB Manager (formerly SafeBoot for USB Enterprise) is a scalable software solution for managing large deployments of Portable Security Devices from McAfee. With McAfee Encrypted USB Manager (referred to as Manager throughout the rest of the document), you can control devices through their complete life cycle, from initialization through to delivery to end users and eventual recycling. This guide provides a general overview of Manager and the deployment process. It also describes the administrative steps involved in deploying and managing devices. This chapter contains information about the following: What s new Benefits and capabilities of Manager Supported devices Supported software Manager product overview Licensing Professional services What s new Manager 3.1 This version provides support for McAfee Standard Driverless Encrypted USB devices. McAfee Standard Driverless Encrypted USB is a single-user device that allows only password authentication. The default read-only image is built-in and cannot be upgraded or modified. You can use McAfee Standard Driverless Encrypted USB on computers running only Microsoft Windows. The following operations are not available with McAfee Standard Driverless Encrypted USB devices: partition sizing, upgrading firmware (does not use a management code), rescuing devices, and issuing credentials. Manager 3.0 includes the following new features: Portable content file enhancements The Portable Content Manager (PCM) application provides a graphical interface to create and manage the portable content file for the read-only partition of devices. Administrators can also use PCM to configure McAfee applications, such as Web Login Config, Connector, and McAfee Encrypted USB Managed. For more information, see Managing portable content on page 48. Support for credential management Administrators can now issue certificates and RSA SecurID tokens to users with Manager. End users can manage certificates and RSA SecurID tokens with McAfee Encrypted USB Managed. For more information, see Issuing and managing credentials on page 39. 5

6 Introducing McAfee Encrypted USB Manager Benefits Built-in reporting capability You can now generate pre-configured reports using Manager. Reports provide auditing data and information about devices, users, and deployment status. For more information, see Generating reports on page 46. Enhanced data recovery options When you create a usage profile you can set data recovery options. When users cannot authenticate to their device, Help Desk operators can re-establish device access (default setting) or you can permanently erase all device so that it is inaccessible to both the user and the administrator. For more information, see Creating usage profiles on page 33. Features added in Manager 2.4: Enhanced password configuration Allows you to add complex password rules to a usage profile, such as retry limits, minimum password length, minimum number of characters (special, numeric, alphabetical), a password reuse threshold, and a minimum and maximum lifetime for the password. For more information, see Password policies on page 35. Two-factor authentication You can now require users to authenticate using two-factor (biometric and password) authentication. For more information, see Usage profile settings on page 33. Profile status You can change the status of a usage or initialization profile to indicate whether it is active or inactive. For more information, see Editing and deleting initialization profiles on page 30 and Managing usage profiles on page 36. Support for Mac OS X with McAfee Encrypted USB Managed. Benefits Control Manager provides the following main benefits. A managed deployment of McAfee Encrypted USB Devices allows you to: Control device configurations and security policies that determine how devices can be used. Provide help desk support when necessary for end users who have problems authenticating. Perform data recovery operations on a device (for audit and compliance reasons) without the user being present. Efficient administration Administrative tasks use concise workflows that allow you to process devices efficiently with minimum effort. Administrators can create profiles that contain parameters for device configuration and user settings. Profiles allow administrators to initialize and issue devices to users in batches whereby they plug in a device, apply the appropriate profile, and move on to the next device. Immediate end-user productivity During initialization, devices are pre-configured with everything end users need. No software installation on end user workstations is necessary. Client wizards guide end users through common tasks so that user training is not required and end users can start using devices as soon as they receive them. 6

7 Introducing McAfee Encrypted USB Manager Capabilities Simplified and scalable Minimal effort is required to deploy Manager. Other than hosting the device database, no other servers are needed. Simplified management operations ensure maximum efficiency when initializing, issuing, and updating devices. Capabilities Manager provides the following capabilities that facilitate administrative operations. Table 1-1: Important Manager capabilities Capability Policies for device configuration and use Credential management Device rescue Data recovery Portable software updates Self-enrollment Separation of administrative roles Audit trails Corporate directory integration Description You can create multiple device profiles to define device configurations and security policies for different user groups or departments. Profiles ensure the efficiency of the initialization and issuance processes. For more information about these processes, see Initializing devices on page 28 and Issuing devices to users on page 33. Credential profiles let you define certificate or RSA SecurID token settings so that you can issue credentials to users. Help desk operators can securely reset the authentication mechanism of a device over the phone to assist users who can no longer authenticate to their device. Encrypted data may need to be recovered for security audits or due to the termination of employment. Security Officers can recover data from a user s device without the user being present. You can create portable software packages for end users to upgrade the read-only partitions of their devices. This lets you manage and provide additional applications to end users as your portable application needs change. To increase scalability and minimize administrator workload, end users can enroll their own fingers on a device for biometric authentication. For more information, see Personalization on page 25. The management software component of Manager contains four main functional modules that correspond to four administrative roles. Modules can be installed together or separately to allow your company to separate management roles. For more information about administrative roles, see The role of the administrator on page 26. All administrative operations performed using Manager are logged. Manager integrates directly with the existing corporate directory to bind users to devices during the issuance process so you do not have to maintain a separate repository for user data. Supported devices Manager supports the following McAfee Encrypted USB Devices: McAfee Zero Footprint Biometric Encrypted USB (formerly SafeBoot for USB Phantom Bio) McAfee Zero Footprint Non-Biometric Encrypted USB (formerly SafeBoot for USB Phantom Non-Bio) McAfee Standard Driverless Encrypted USB McAfee Encrypted USB Hard Disk (formerly SafeBoot for USB Hard Disk) 7

8 Introducing McAfee Encrypted USB Manager Supported software McAfee Standard Encrypted USB (formerly SafeBoot for USB Standard) Supported software The following software is supported with Manager. Table 1-2: Software Component Supported software Web browser (required for user interface with Microsoft Windows only) Microsoft Internet Explorer 7.0 Internet Explorer 6.0 Databases IBM Informix Dynamic Server 9.4 Microsoft SQL Server 2005 SP1 Microsoft SQL Server 2000 SP4 Microsoft SQL Express Note: Professional Services can help configure other databases. User directory Windows 2003 Active Directory Active Directory Application Mode (ADAM) Note: Professional Services can help configure other directories. Certificate authorities Microsoft McAfee Encrypted USB Managed Manager Microsoft Windows 2000 SP4 (Client Help Desk is unavailable after a user authenticates) Windows XP SP2 Windows Vista (Business and Enterprise editions) Mac OS X Initialization, Issuance, and Data Recovery processes: Windows XP SP2 Windows Vista (Business and Enterprise editions) Help Desk processes: Windows 2000 SP4 Windows XP SP2 Product overview McAfee Encrypted USB Manager includes a management console and end user software. Management console Manager is an installed suite of utilities that administrators use to control devices and perform the following operations: Device initialization Device issuance Device rescue and help desk support Data recovery Credential (certificates and RSA SecurID tokens) 8

9 Introducing McAfee Encrypted USB Manager Product overview Generating reports License management The initialization and issuance operations are designed as efficient workflows so that you can deploy many devices in a short period of time. You can have multiple Manager computers that connect to one device database to allow distribution and delegation of administrative responsibilities. The following illustration demonstrates the architecture of Manager. Figure 1-1: Manager End-user software McAfee Encrypted USB Managed (referred to as client in the rest of the document) is portable software that is pre-installed on the read-only partition of devices during the initialization process. End users are guided through wizards and workflows to perform the following operations: Personalize a new device by enrolling fingers for biometric authentication, setting a password, or both Manage existing authentication settings by updating finger enrollments or changing passwords Manage digital identities View device status information Rescue a device with assistance from the Help Desk Other portable software programs can be installed on the device with the client to provide necessary applications to your end users. The following illustration demonstrates a typical device configuration for an issued device. Figure 1-2: Issued device with the client 9

10 Introducing McAfee Encrypted USB Manager Licensing Licensing Licenses are distributed using license files that allow you to manage a set number of devices per device database. To obtain a license file, contact your sales representative at McAfee. Manager will notify you when the device database is approaching the device limit and will indicate the number of devices still available to be issued. The corporate license is checked each time a device is added to ensure that the number of devices in the database does not exceed the site license. When you purchase a new license file from McAfee or upgrade an existing license file, you must import the file to the device database using Manager. To view current license information From the main menu of Manager, click License Management. The Current License Information section contains details such as, license status and maximum number of devices allowed. To import a license file 1 From the main menu of Manager, click License Management. 2 In the Tasks section, click Import License File. 3 Select the license file, type the activation code, and then click Import. 10

11 Installing and upgrading Manager McAfee Encrypted USB Manager contains four modules that you can install together or divide among multiple workstations according to the administrative role that will use the module. By default, Manager installs all four modules. For more information about administrative roles, see The role of the administrator on page 26. Before you install Manager, you should create an Manager device database on your server and run the McAfee Encrypted USB Manager SQL script (located on the installation CD) to configure the database. You can also configure ADAM. Manager supports credential issuance. You can set up authentication credentials, such as certificates or RSA SecurID tokens, so that you can issue them to end users. For more information about issuing credentials using Manager, see Issuing credentials to users on page 41. As part of the installation process, you must configure Manager to correspond to your company s network environment. You can complete the configuration using one of the following methods: Modify Manager on each workstation after you install it. Modify Manager on the first workstation and use the modified version to create a custom installation. You can distribute the custom installation of Manager for each subsequent install. If you want to deploy McAfee Standard Encrypted USB devices, you must install the client. You can also upgrade from a previous version of Manager. This chapter contains information about: Setting up a Manager device database Configuring ADAM for Manager Setting up Manager to use certificates Setting up Manager to use RSA SecurID tokens Installing Manager Configuring Manager Creating a custom installation Installing the client Upgrading Manager Setting up a Manager device database On the device database server, create a new database to contain the Manager device information. After you create the database, run the McAfee Encrypted USB Manager SQL script. You should create the database and run the script against the database server before you install and configure Manager. Use the database script that corresponds to the server you are using. The script file is located in the following directory path on the installation CD (where D is the CD drive): IBM Informix Dynamic Server 9.4 D:\Database Configuration Scripts\Informix\9.4\McAfee Encrypted USB Manager.sql 11

12 Installing and upgrading Manager Configuring ADAM for Manager Microsoft SQL Server 2005 D:\Database Configuration Scripts\Microsoft SQL Server\2005\McAfee Encrypted USB Manager.sql Microsoft SQL Server 2000 D:\Database Configuration Scripts\Microsoft SQL Server\2000\McAfee Encrypted USB Manager.sql The script creates database tables, indexes and data on the Manager database. If you are upgrading from a previous version of Manager, the scripts are located in the Upgrade folder for the appropriate database server. For more information, see Upgrading Manager on page 22 Note: When setting up the database, if you are not using Windows pass-through authentication, you should create database account(s) to be used during the connection to the database. Database authentication options It is strongly recommended that you set controls on the device database that restrict access to only authorized persons. Options for controlling access 1 Windows pass-through authentication reuses Windows Domain Login credentials 2 Database login accounts involves setting up database user names, passwords and permissions on the device database server if not using Windows pass-through authentication. You can configure the database login to prompt the operator when using Manager, or to automatically log on to the database. When you include login credentials in the Presenter.ini file, the system assumes that automatic login has been configured. Configuring ADAM for Manager If you are using Active Directory Application Mode (ADAM) as the LDAP directory, you must configure ADAM to work correctly with Manager. Configuration involves the following steps (in order): Selecting appropriate settings when you create the ADAM instance Editing your registry settings Allowing anonymous LDAP binding to an ADAM instance Setting properties for the LDAP Manager Note: LDAP Manager is an advanced Windows-based LDAP editor and browser. You can download it from the Web. You can also use other LDAP editors to manage ADAM. To select settings when creating an ADAM instance 1 Add service permission to the Windows account you specified in previous steps. 2 Select the user who is currently logged on. 3 Import the selected LDIF files for this instance of ADAM. 4 Add all available LDF files. 12

13 Installing and upgrading Manager Setting up Manager to use certificates Tip: For more information about creating an ADAM instance, see documentation from Microsoft regarding ADAM. To edit registry settings 1 On the taskbar, click Start, and then click Run. 2 Type Regedit and click OK. 3 In the Registry Editor, navigate to the following registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa 4 In the details pane, right-click forceguest, and then click Modify. 5 In Value data, type 0, and then click OK. To allow anonymous LDAP binding to an ADAM instance 1 On the taskbar, click Start, point to All Programs, point to ADAM, and then click ADAM ADSI Edit. 2 Connect and bind to the configuration directory partition of the ADAM instance on which you want to allow anonymous Lightweight Directory Access Protocol (LDAP) binding. 3 In the console tree, double-click the following: configuration directory partition (CN=Configuration,CN={GUID}) services container (CN=Services) Windows NT container (CN=Windows NT) 4 Right-click the directory service container (CN=Directory Service), and then click Properties. 5 In the Attributes area, click dsheuristics, and then click Edit. 6 In the Value area, modify the value of the seventh character in the attribute (counting from the left) to 2, as follows: To set properties in LDAP Manager Include the following property settings in the LDAP Manager application: Connection Name: for example Manager LDAP Server name: localhost Username: admin username for user who is currently logged on to the computer Password: your password Select NTLM for authentication And Connect Click Directory, and complete any necessary steps, for example, create users. Tip: You must manually refresh the LDAP Manager application or the LDAP Editor by clicking F5 to show your changes. Setting up Manager to use certificates If you want to use Manager to issue certificates to end users, you must configure the certificate template and register for an enrollment agent certificate. You can also set up a key recovery system. 13

14 Installing and upgrading Manager Setting up Manager to use certificates Configuring the Certificate template You must configure the certificate templates on the Certificate Server before you can issue certificates to users in Manager. The certificate templates must allow an Enrollment Agent to issue the certificate to a user on their behalf. To configure the certificate template 1 Right-click the certificate template and click Properties. 2 Click the Issuance Requirements tab, and then select the This number of authorized signatures check box. Use the default settings for the other options. 3 Click Apply. Registering for an Enrollment Agent Certificate The Enrollment Agent administrator must have an Enrollment Agent certificate so that the administrator can issue certificates using Manager. You must complete the registration process before you install or start Manager. The following procedure describes one way to register. However, you should use the method that is appropriate to your business practices. To register for an Enrollment Agent certificate 1 Log on as the domain administrator to the computer where Manager is installed. 2 In a Web browser, type the following URL: 3 Click Request a certificate, and then click Advanced certificate request. 4 Click Create and submit a request to this CA. 5 From the Certificate Template list, click Enrollment Agent. Use the default settings for the other options. 6 Click Submit. If a Warning dialog box appears, click Yes to continue. 7 Click Install this certificate. Setting up a key recovery system If you want to provide a method for key recovery, you must do the following: Create a Key Recovery Certificate Enable key recovery on the Certificate Authority Create a Key Recovery Certificate The key recovery certificate is used by the Certificate Authority to protect the private decryption keys of users. You must complete the following three steps to create the key recovery certificate: Create and submit a request for a key recovery certificate Approve the certificate request in the Microsoft Management Console (MMC) Install the key recovery certificate To create and submit a request for a key recovery certificate 1 Log on to the Certificate Server as the user who will perform the key recovery operation. 14

15 Installing and upgrading Manager Setting up Manager to use certificates 2 In a Web browser, type the following URL: If asked for credentials, use the domain credentials for the user who will perform the certificate recovery operation. If a message appears that indicates Content is blocked for security reasons, add the Web page to the trusted zone. 3 Click Request a certificate, and then click Advanced certificate request. 4 Click Create and submit a request to this CA. 5 From the Certificate Template list, click Key Recovery Agent. 6 Click Submit. If a Warning dialog box appears, click Yes to continue. A page will display to indicate that the request has been received. To approve the certificate request 1 In the MMC, click to the expand the Certification Authority node by clicking the Plus (+) sign. 2 Click the Certificate Authority and then double-click the Pending Requests folder to view the request you submitted in the procedure To create and submit a request for a key recovery certificate on page Right-click the request, click All Tasks, and then click Issue. To install the key recovery certificate 1 In a Web browser, return to the following URL by typing, 2 Click View the status of a pending certificate request. 3 Click the certificate that you approved in the procedure To approve the certificate request on page Click Install this certificate. If a Warning dialog box appears, click Yes to continue. Note: It is recommended that you create a backup of the certificate and private key by exporting them to a file. Save the file in a secure location. Creating a backup ensures that you can still perform a key recovery operation if the existing key recovery certificate and key pair become lost or damaged. Enable key recovery on the Certificate Authority Once you install the key recovery certificate, you must set up the certificate server for key recovery. For information about performing a key recovery operation, see Performing a key recovery operation on page 42. To enable key recovery 1 In the MMC, click to the expand the Certification Authority node by clicking the Plus (+) sign. 2 Right-click the name of your Certificate Authority and click Properties. 3 Click the Recovery Agents tab, and then click Archive the Key. 4 Click Add. 5 Select your key recovery certificate and click Apply. Note: You can verify that the certificate status has changed to valid by closing the Properties window and reopening it to the Recovery Agents tab to view the certificate status. 15

16 Installing and upgrading Manager Setting up Manager to use RSA SecurID tokens Setting up Manager to use RSA SecurID tokens The McAfee Encrypted USB Manager RSA Web Service is an optional component of Manager. You must install the Web Service if you want to issue RSA SecurID tokens to end users. RSA SecurID tokens are used for strong authentication when a user logs on to access network or corporate resources remotely. You must install the McAfee Encrypted USB Manager RSA Web Service on the server where RSA Authentication Manager is installed. RSA Authentication Manager must be installed with an Internet Information Services (IIS) Web server on a Windows Server 2003 operating system. You must also ensure that the IIS server is configured to allow ASP.net extensions. After you install the McAfee Encrypted USB Manager RSA Web Service, you must configure the TokenIssuance file to define Host Agents used with RSA Authentication Manager. Host Agents are the IP addresses of Agents that are installed with an application to control security for that application. The end user can authenticate to the Agent using the RSA SecurID token and gain access to the application, for example Citrix. The TokenIssuance file contains other variables that you can configure if necessary. You can also control access to the McAfee Encrypted USB Manager RSA Web Service. To install the McAfee Encrypted USB Manager RSA Web Service 1 On the Manager Installation CD, in the RSAWebServiceSetup folder, double-click the Setup.exe file to start the installation and follow the instructions in the Install wizard. 2 If you have multiple Sites, select the Site where you want to install the Web service application. 3 You must also provide a name for the Virtual Directory of the Web service Web application. 4 When the wizard prompts you for a User ID and password, type the same User ID and password that was used to log on to Windows when RSA Authentication Manager was installed (if necessary, use the Administrator account ID and password). 5 Complete the remaining steps in the installation wizard. After you finish the installation, your McAfee Encrypted USB Manager RSA Web Service address is: Directory]/RSAManagerService.asmx Site is the Web address or DNS name of the Web site that you selected during the installation. Virtual Directory was created in Step 3. To enable ASP.net extensions on the IIS Server 1 Click Start, click Control Panel, and then double-click Administrative Tools. 2 Double-click Internet Information Services (IIS) Manager, and then doubleclick the computer running IIS. 3 Double-click the Web Service Extensions folder. 4 Ensure that the status of the ASP.net server extensions is set to Allowed. If the status is Prohibited, click the server extension, and then click Allow. To configure Host Agents 1 In a text editor, open the TokenIssuance.ini file that is located in the following directory: C:\Program Files\McAfee\RSA Webservice Setup\Config 16

17 Installing and upgrading Manager Setting up Manager to use RSA SecurID tokens 2 In the Agents area, after the Equal (=) sign, type the IP addresses for each Agent that is used with RSA Authentication Manager. You can add agents if you require more than the default number that is listed. To configure other variables in the TokenIssuance file 1 In a text editor, open the TokenIssuance.ini file that is located in the following directory: C:\Program Files\McAfee\RSA Webservice Setup\Config (where C is the drive on which you installed the RSA WebService) 2 Locate the variable you want to configure and after the Equal (=) sign, type the action that you want to occur. The following table provides a list of variables, possible actions that you can set, and the default action that is currently set. Table 1-1: Variables in TokenIssuance.ini file Variable Name Possible Actions Default Action UserAlreadyPresent User exists in RSA Server UserNotPresent User does not exist in RSA Server SoftTokenPresent Action to take if the user already has a token ReplaceToken Action to take for the PIN when the token is replaced MinTimeToDeath Minimum time (in days) for which the token is valid DefaultShell ERROR REUSE ERROR CREATE ADD REPLACE RESCIND REVOKE ERROR KEEPIN NEWPIN Any non-negative number REUSE CREATE RESCIND NEWPIN 30 days /bin/sh Controlling access to the McAfee Encrypted USB Manager RSA Web Service You can secure the McAfee Encrypted USB Manager RSA Web Service by granting access to designated: Users by enabling Windows Integrated Authentication Workstations, workstation groups, or workstations in a particular domain by setting IP address and domain name restrictions Granting access to designated users You can permit only designated users to access the McAfee Encrypted USB Manager RSA Web Service using Windows Integrated Authentication. Windows Integrated Authentication allows transparent, user-based authentication between the client workstation and Web server. You must perform the following steps to enable Windows Integrated Authentication. Set the authentication mode in the configuration file for the McAfee Encrypted USB Manager RSA Web Service 17

18 Installing and upgrading Manager Setting up Manager to use RSA SecurID tokens Set the authentication mode for the McAfee Encrypted USB Manager RSA Web Service virtual directory Configure the list of users who can access the McAfee Encrypted USB Manager RSA Web Service To set the authentication mode in the configuration file 1 Click Start, click Control Panel, and then double-click Administrative Tools. 2 Double-click Internet Information Services (IIS) Manager, and then doubleclick the computer running IIS. 3 Double-click the Web Sites folder and click McAfee Encrypted USB Manager RSA Web Service. 4 Right-click the Web Config folder and click Properties. 5 Click the ASP.NET tab and click Edit Configuration. 6 Click the Authentication tab and then in the Authentications Settings area, select Windows from the Authentication Mode list. To set the authentication mode for the McAfee Encrypted USB Manager RSA Web Service virtual directory 1 Right-click the McAfee Encrypted USB Manager RSA Web Service virtual directory and click Properties. 2 Click the Directory Security tab. 3 In the Authentication and access control area, click Edit. 4 Click to clear the Enable anonymous access check box. 5 In the Authentication access area, click the Integrated Windows authentication check box. To configure the list of users 1 Right-click the McAfee Encrypted USB Manager RSA Web Service virtual directory and click Permissions. 2 Do one of the following: To add users, select the user/group and click Add. To remove users, select the user/group and click Remove. Granting access to designated workstations, groups, or workstations in a specific domain You can set IP address and domain name restrictions to allow access to the McAfee Encrypted USB Manager RSA Web Service to only designated workstations, workstation groups, or workstations that belong to a specific domain. 18

19 Installing and upgrading Manager Installing Manager To set IP address or domain-based access 1 Right-click the McAfee Encrypted USB Manager RSA Web Service virtual directory and click Properties. See step one of the To set the authentication mode for the McAfee Encrypted USB Manager RSA Web Service virtual directory on page Click the Directory Security tab. 3 In the IP address and domain name access area, click Edit. 4 Click the Denied access option to deny Web Service access to computers that are not included in the list. 5 If you want to add other exceptions to the list, click Add and select the appropriate settings. Installing Manager You can install Manager using the setup wizard on the Installation CD. The installation allows you to select which modules Device Initialization, Device Issuance, Data Recovery, and Help Desk to install. Contents of Installation CD The following software, documentation, and utilities are included on the Manager Installation CD. Installation executable file Database configuration scripts to create the device database Documentation ManagerSetup for Manager RSAWebServiceSetup to install the McAfee Encrypted USB Manager RSA Web Service for RSA SecurID token issuance To install Manager On the Manager Installation CD, in the ManagerSetup folder, double-click the Setup.exe file to start the installation and follow the instructions in the Install wizard. Note: After you install Manager, you must set parameters such as, and LDAP settings, and the database connection string. For more information, see Configuring Manager on page 19. Configuring Manager After you install Manager, you must configure Manager by completing the following steps: 1 Creating an ODBC Data Source Name (DSN) on each workstation where Manager is installed (if one does not already exist). The Encrypted USB Manager Configuration Assistant references the database connection string for the ODBC DSN. 2 Setting the following parameters using the Encrypted USB Manager Configuration Assistant: settings used when issuing devices; settings include the server, user name, password, and address. Database connection LDAP server settings 19

20 Installing and upgrading Manager Configuring Manager 3 Customizing the message (if required) that users receive when the device is ready for use. Note 1: You must also configure the Help Desk contact number that appears in the client. End users will dial this number for assistance if they cannot authenticate to their device. For more information, see Configuring the client on page 57. Note 2: For information about installing the configured version of Manager on other computers, see Creating a custom installation on page 21. To create the ODBC DSN Follow the instructions in the Microsoft Windows ODBC Data Source Administrator wizard and select the following settings where appropriate: Use SQL Server as the driver for which you want to set up a data source. The data source name should match the ODBC DSN string to be used in the Encrypted USB Manager Configuration Assistant where the default name is Manager. Change the default database to the Manager database that you created on the SQL Server. To set parameters in the Encrypted USB Manager Configuration Assistant 1 On the Start menu, click Programs, McAfee, and then click Encrypted USB Manager Configuration Assistant. 2 Follow the instructions in the configuration wizard. For the Database Connection String, you can leave username and password data blank if the workstations used are part of the Active Directory Domain and the Windows SQL Server has been set up with pass-though authentication enabled. You can also leave these parameters blank if the user is to be asked for credentials. For LDAP settings, you can leave username and password boxes blank if the workstations used are part of the Active Directory Domain. Note: If you are using Active Directory Application Mode (ADAM), you must configure it correctly before running the Encrypted USB Manager Configuration Assistant. For more information, see Configuring ADAM for Manager on page 12. To customize the message 1 If you want to change the text in the subject line of the generated message, open the Presenter.ini file in a text editor from the following location: C:\Program Files\McAfee\McAfee Encrypted USB Manager 3.1\Config (where C is the drive on which you installed Manager) 2 In the section, replace the text New McAfee Device for the IssuedSubject= setting with your customized subject text. 3 If you want to customize the text of the message, open the IssuedMessage.txt file in a text editor and edit the text. The file is located in the following directory path: C:\Program Files\McAfee\McAfee Encrypted USB Manager 3.1\Config (where C is the drive on which you installed Manager) Note: The %USERNAME% and %PASSWORD% text strings that appear in the text of the default message are replaced with the actual device user name and password when the message is generated. 20

21 Installing and upgrading Manager Creating a custom installation Creating a custom installation When you install Manager on multiple computers, you can manually configure each installation or you can modify the first installation and install the modified version on subsequent computers. Creating a custom installation involves copying the original contents of the Manager installation CD to your workstation. After you install and configure the first instance of Manager, you replace the original files with the configured version, and then create a new installation CD. To create a custom Manager installation 1 Copy the CD image from the installation CD to your workstation. 2 Complete all of the steps in the section Configuring Manager on page Copy the Presenter.ini and IssuedMessage.txt files from the following location: C:\Program Files\McAfee\McAfee Encrypted USB Manager 3.1\Config (where C is the drive on which you installed Manager) 4 Replace the original Presenter.ini and IssuedMessage.txt files in the CD image folder on your workstation by pasting the configured files (copied in step three). The copied CD image folder is located in the following directory path: C:\Manager\ManagerSetup\Config (where C:\Manager is the directory to which you copied the CD image). 5 If you customized the Help Desk contact number in the McAfee Encrypted USB Managed, you can include the change in the custom installation. Copy the PortableContentFiles folder from the following location: C:\Program Files\McAfee\McAfee Encrypted USB Manager 3.1(where C is the drive on which you installed Manager). Replace the original PortableContentFiles folder in the CD image folder on your workstation, located in the following directory path: C:\Manager\ManagerSetup (where C:\ is the directory to which you copied the CD image). 6 The installation setup has now been configured to your company s environment. You can create a new installation CD based on the custom install configuration. Note: You must create the ODBC DSN on each workstation where you want to install a custom version of Manager. Installing the client For most devices, the client requires no installation as it is loaded on the read-only partition of the device during the initialization process. However, McAfee Standard Encrypted USB does not have a read-only partition on which to load the client. Therefore, for this device, you must install the client on the client workstation. To install the client 1 On the client Installation CD, in the ClientSetup folder, double-click the Setup.exe file to start the installation. If the CD AutoRun feature is enabled on your computer, the installation starts automatically. 2 Follow the instructions in the Install wizard. Tip: The installation wizard puts an icon on the desktop and in the Start menu to start the client. 21

22 Installing and upgrading Manager Upgrading Manager Upgrading Manager Manager You can upgrade to McAfee Encrypted USB Manager 3.1 from a previous version using the setup wizard on the Installation CD. To upgrade Manager 1 Uninstall the previous version of Manager. You must back up the issuedmessage.txt file. You should also copy the database, LDAP, and settings in the presenter.ini file (for future reference). The issuedmessage.txt and presenter.ini file are located in the following folder: C:\Program Files\McAfee\McAfee Encrypted USB Manager 2.x\Config (where C is the drive on which you installed Manager) 2 On the Manager Installation CD, in the ManagerSetup folder, double-click the Setup.exe file to start the upgrade process and follow the instructions in the Install wizard. Note 1: After you upgrade Manager, you must reconfigure all previously set parameters, such as and LDAP settings, and the database connection string. For more information, see Configuring Manager on page 19. Note 2: If you backed up the old Presenter.ini file, do not use it to replace the new file that installed during the upgrade process. Otherwise, required settings in the new file will be overwritten. Note 3: You can access the upgrade scripts for the server in the Upgrade folder, for example, D:\Database Configuration Scripts\Microsoft SQL Server\2005\Upgrade\McAfee Encrypted USB Manager.sql (where D is the CD drive). The client When you upgrade Manager, a new default portable content file that contains the client is automatically installed. You can configure this file and then create a new software package to distribute and install on devices. For more information, see Updating portable content on devices on page 50. When you upgrade McAfee Standard Encrypted USB devices, use the client Installation CD and complete the instructions in the following procedure, Installing the client on page

23 Deploying McAfee Encrypted USB Devices Understanding the administrative tasks involved in each phase of the deployment cycle can help you plan and administer your device deployment. You can assign tasks to administrators based on four defined roles. This chapter contains the following information: A description of a typical deployment cycle An outline of the different administrative roles The role of the Help Desk The deployment cycle Before you deploy McAfee Encrypted USB Devices, it is important to understand the stages involved in a deployment cycle. One administrator can perform all tasks or you can separate the tasks among multiple administrators. For more information, see The role of the administrator on page 26. The following illustration provides a visual overview of a managed deployment cycle. Figure 1-1: Deployment cycle Initialization Initialization is the first phase after your company receives its devices from McAfee. Initializing a device prepares it for issuance. Your company takes control of the device during this phase. An initialized device has no defined users and no corporate security policies set. You can create initialization profiles to simplify this phase and allow batch initialization of devices. Initialization Officers perform the following tasks to initialize devices: 23

24 Deploying McAfee Encrypted USB Devices The deployment cycle Create initialization profiles Before you can initialize a device, you must create an initialization profile. Initialization profiles contain the policies that determine how a device is configured, for example, the size of a partition and the software to put on the device. Initialization Officers set the following parameters when creating a profile: Public and read-only partition size Read-only drive type Read-only partition contents (including the client and other portable software) Management code Initialize devices Once you create the initialization profiles, you can then initialize many devices efficiently using a selected profile. McAfee Encrypted USB Manager configures the device with the parameters you set in the profile. Each time you initialize a device, Manager checks the corporate license to verify that the total number of initialized devices does not exceed the site license. The initialization process binds a device to your company and configures the read-only partition with the portable software you want to deploy. The read-only partition software must include the client (does not apply to McAfee Standard Encrypted USB). Other initialization tasks Erasing a device Creating software update packages Updating an existing device with a different device profile Upgrading firmware for existing devices Importing an existing device that is not currently managed by Manager Note: For more information about how to perform the tasks during this phase of deployment, see Initializing devices on page 28. Issuance Issuance is the next phase of deployment following initialization where device users are defined along with security policies. During this phase, an issuance officer configures the device with security policies and other settings that prepare the device for usage. Security policies and other settings are created and maintained in usage profiles. The issuance officer also binds devices to corporate users prior to delivery to the end user. The issuance process involves the following operations. Create a usage profile When you create a usage profile, you can set the following policies: Method used to deploy devices to users (provisioning mode) Number of device users Ability to share private partitions Password parameters Number of finger enrollments allowed Security level for biometric authentication Retry limit for biometric authentication Data Recovery options Authentication mode one-factor or twofactor Credential issuance settings for certificates or RSA SecurID tokens 24

25 Deploying McAfee Encrypted USB Devices The deployment cycle Issue devices to users You issue devices by adding users to the device. When you add a user, you can specify the private partition size (if applicable). The usage profile is applied to the device when you create the first user. The usage profile determines whether or not the end user must be present during the issuance process to personalize the device with a fingerprint, password, or both. You can also allow users to personalize their own devices called user self-personalization. For more information, see Personalization on page 25. When you issue devices to users, you can also issue credentials. For more information, see Issuing and managing credentials on page 39. Deliver devices to recipients A generated notifies end users of their device delivery (and its initial password if applicable). However, you must still ensure that the correct device is delivered to the target end user. Since devices contain no physical markings to identify the user to whom it has been issued, it is recommended that you tag each issued device. Tags can be a paper printout or sticker that identifies the intended recipient. If you want assistance in setting up this process, contact McAfee Professional Services. Other issuance tasks: Personalization Usage Remove users from devices Manage usage profiles including applying a new profile, editing, deleting, or deactivating a profile Revoke users or devices The personalization phase prepares a device for daily use by end users once they receive an issued device. Personalization tasks can include enrolling fingers for biometric authentication, changing the initial password, or both. The following two types of deployment are available to complete the personalization process: Face-to-face the end user must be physically present with the Issuance Officer to personalize the device. Face-to-face deployment provides strong identity proofing because Issuance Officers can verify that the correct user is authorized for the device. User self-personalization users personalize their devices independently using a self-serve wizard in the client. Users who must authenticate with only one factor will automatically receive a notification with a temporary password once a device has been issued. The temporary password is required to complete the selfserve wizard. Users who require two-factor authentication, must call the Help Desk to receive an authorization code to complete the self-personalization process. The user will provide the Help Desk Operator with a confirmation code when the selfpersonalization process is complete.the phone call allows the Help Desk Operator to confirm the identity of the user and ensure that they are added to the Manager system. During the usage phase, devices are in use daily by end users for various functions, such as unlocking the device and updating finger enrollments or passwords. End users can also call the Help Desk to rescue their device if they can no longer authenticate to it. Other tasks that administrators can perform include: 25

McAfee Encrypted USB Hard Disk Non-Bio Quick Start Guide

McAfee Encrypted USB Hard Disk Non-Bio Quick Start Guide McAfee Encrypted USB Hard Disk Non-Bio Quick Start Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

High Availability Setup Guide

High Availability Setup Guide High Availability Setup Guide Version: 9.0 Released: March 2015 Companion Guides: The UniPrint Infinity Administrator s Guide, Cluster Guide and Mobile Setup Guide can be found online for your convenience

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Installation and Configuration Guide

Installation and Configuration Guide Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Password Manager Windows Desktop Client

Password Manager Windows Desktop Client Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Release Notes for McAfee epolicy Orchestrator 4.5

Release Notes for McAfee epolicy Orchestrator 4.5 Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator

More information

Embarcadero Performance Center 2.7 Installation Guide

Embarcadero Performance Center 2.7 Installation Guide Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Archive Attender Version 3.5

Archive Attender Version 3.5 Archive Attender Version 3.5 Getting Started Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com Page 1 Under the copyright laws, neither the documentation nor the software can be copied, photocopied,

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01 Oracle Enterprise Single Sign-on Provisioning Gateway Administrator Guide Release 10.1.4.1.0 E12613-01 March 2009 Oracle Enterprise Single Sign-on Provisioning Gateway, Administrator Guide, Release 10.1.4.1.0

More information

ilaw Installation Procedure

ilaw Installation Procedure ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Installation Instructions Release Version 15.0 January 30 th, 2011

Installation Instructions Release Version 15.0 January 30 th, 2011 Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof

More information

Crystal Reports Installation Guide

Crystal Reports Installation Guide Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks

More information

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations

More information

Entrust Managed Services PKI

Entrust Managed Services PKI Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2 HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Full Disk Encryption Agent Reference

Full Disk Encryption Agent Reference www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or

More information

Mail Attender Version

Mail Attender Version Mail Attender Version Getting Started Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com Page 1 Under the copyright laws, neither the documentation nor the software can be copied, photocopied,

More information

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide

More information

NetWrix Server Configuration Monitor

NetWrix Server Configuration Monitor NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW

More information

Version 3.8. Installation Guide

Version 3.8. Installation Guide Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0

Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Microsoft Corporation Published: September 2009 Abstract This step-by-step guide describes a sample scenario for installing Microsoft

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

Vector Asset Management User Manual

Vector Asset Management User Manual Vector Asset Management User Manual This manual describes how to set up Vector Asset Management 6.0. It describes how to use the: Vector AM Console Vector AM Client Hardware Inventory Software Inventory

More information

McAfee epolicy Orchestrator 4.5 Cluster Installation Guide

McAfee epolicy Orchestrator 4.5 Cluster Installation Guide McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

More information

Endpoint Security VPN for Windows 32-bit/64-bit

Endpoint Security VPN for Windows 32-bit/64-bit Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

HP ProtectTools User Guide

HP ProtectTools User Guide HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark

More information

Microsoft Dynamics GP. Engineering Data Management Integration Administrator s Guide

Microsoft Dynamics GP. Engineering Data Management Integration Administrator s Guide Microsoft Dynamics GP Engineering Data Management Integration Administrator s Guide Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is

More information

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition The installation of Lync Server 2010 is a fairly task-intensive process. In this article, I will walk you through each of the tasks,

More information

RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide

RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide Contact Information See our Web sites for regional Customer Support telephone and fax numbers. RSA Security Inc. RSA Security

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

For Active Directory Installation Guide

For Active Directory Installation Guide For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Getting Started with. Ascent Capture Internet Server 5. 10300260-000 Revision A

Getting Started with. Ascent Capture Internet Server 5. 10300260-000 Revision A Ascent Capture Internet Server 5 Getting Started with Ascent Capture Internet Server 5 10300260-000 Revision A Copyright Copyright 2001 Kofax Image Products. All Rights Reserved. Printed in USA. The information

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide

McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Remote Management System

Remote Management System RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED

More information

Dell Active Administrator 8.0

Dell Active Administrator 8.0 What s new in Dell Active Administrator 8.0 January 2016 Dell Active Administrator 8.0 is the upcoming release of Dell Software's complete solution for managing Microsoft Active Directory security auditing,

More information

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0 Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

AD RMS Step-by-Step Guide

AD RMS Step-by-Step Guide AD RMS Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide provides instructions for setting up a test environment to

More information

NETWRIX PASSWORD MANAGER

NETWRIX PASSWORD MANAGER NETWRIX PASSWORD MANAGER ADMINISTRATOR S GUIDE Product Version: 6.1 February/2012 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

FileMaker Server 11. FileMaker Server Help

FileMaker Server 11. FileMaker Server Help FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Building the SAP Business One Cloud Landscape Part of the SAP Business One Cloud Landscape Workshop

Building the SAP Business One Cloud Landscape Part of the SAP Business One Cloud Landscape Workshop Building the SAP Business One Cloud Landscape Part of the SAP Business One Cloud Landscape Workshop TABLE OF CONTENTS 1 INTRODUCTION... 3 2 LANDSCAPE DETAILS... 3 2.1 Server Details... 3 2.2 Landscape

More information

SolarWinds Migrating SolarWinds NPM Technical Reference

SolarWinds Migrating SolarWinds NPM Technical Reference SolarWinds Migrating SolarWinds NPM Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

Cluster Guide. Version: 9.0 Released: March 2015. Companion Guides:

Cluster Guide. Version: 9.0 Released: March 2015. Companion Guides: Cluster Guide Version: 9.0 Released: March 2015 Companion Guides: UniPrint Infinity Companion Guides can be found online for your convenience and are intended to assist Administrators with the operation

More information

Cluster Guide. Released: February 2013. Companion Guides:

Cluster Guide. Released: February 2013. Companion Guides: Cluster Guide Released: February 2013 Companion Guides: UniPrint Infinity Companion Guides can be found online for your convenience and are intended to assist Administrators with the operation of UniPrint

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

Server Sentinel Client Workstation

Server Sentinel Client Workstation Server Sentinel Client Workstation Installation and Reinstallation Guide Server Sentinel 4.4.3 and Higher April 2008 . unisys imagine it. done. Server Sentinel Client Workstation Installation and Reinstallation

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Installing and Configuring WhatsUp Gold

Installing and Configuring WhatsUp Gold Installing and Configuring WhatsUp Gold This guide provides information about installing and configuring WhatsUp Gold v14.2, including instructions on how to run the WhatsUp web interface through an Internet

More information

026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide

026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide 026-1010 Rev 7 06-OCT-2011 Site Manager Installation Guide Retail Solutions 3240 Town Point Drive NW, Suite 100 Kennesaw, GA 30144, USA Phone: 770-425-2724 Fax: 770-425-9319 Table of Contents 1 SERVER

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

KofaxExpress. Installation Guide 3.1.0 2012-05-01

KofaxExpress. Installation Guide 3.1.0 2012-05-01 KofaxExpress 3.1.0 Installation Guide 2012-05-01 2008-2012 Kofax, Inc., 15211 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved. Use is subject to license terms. Third-party software

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Portions of this product were created using LEADTOOLS 1991-2010 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2010 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2010 Installation Guide, product version 6.4. This guide is item number DOC-110, revision 1.045, May 2010 Copyright 1995-2010 Lenel Systems International, Inc. Information

More information