McAfee Endpoint Encryption for Files and Folders. Self Extractor White Paper
|
|
- Junior Hubbard
- 8 years ago
- Views:
Transcription
1 McAfee Endpoint Encryption for Files and Folders Self Extractor White Paper
2
3 About Endpoint Encryption for Files and Folders Self-Extractors Introduction Endpoint Encryption for Files and Folders is a solution for transparent and policy controlled file and folder encryption, i.e. protecting sensitive information from unauthorized access. In order to read files encrypted with Endpoint Encryption for Files and Folders, the user must have the product installed and also have access to the encryption key used to encrypt the file(s). Access to encryption keys is granted through the Endpoint Encryption Manager, where the keys also are created. For a further description of the large number of competitive advantages with Endpoint Encryption for Files and Folders, please contact a McAfee representative. Along with the need to encrypt files and folders on local disks, network shares, removable devices etc., there is a growing need to share encrypted data with users that do not have Endpoint Encryption for Files and Folders installed, e.g. submitting a confidential document to your organization s attorney firm. For this purpose, the Self- Extractor functionality in Endpoint Encryption for Files and Folders has been created. Purpose The purpose of the Self-Extractor function is to be able to share encrypted data with users that do not have Endpoint Encryption for Files and Folders installed on their computers, e.g. you want to hand over the input material for your financial statements to your accounting firm on a USB flash memory stick, but you obviously want the data to be protected when on the stick. Still, you cannot force the accountants to install the full Endpoint Encryption for Files and Folders client, nor can you have them come to your office working off your guest laptops. In situations like this, the Self-Extractor functionality of Endpoint Encryption for Files and Folders is ideal. How it works Creating the Self-Extractor The way the Self-Extractor functionality of Endpoint Encryption for Files and Folders works is very straightforward. The user with the Endpoint Encryption for Files and Folders client installed simply right-clicks the file or folder the user wants to transform into a Self-Extractor file. From the Endpoint Encryption for Files and Folders > context menu entry, the user opens the sub-menu containing two entries that pertain to Self-Extractors: 1
4 Create Self-Extractor ({filename}.exe), and Attach as Self-Extractor to If the user selects Create Self-Extractor ({filename}.exe), then the Self-Extractor is saved to whatever location the user selects, e.g. a USB flash memory drive. The user is prompted to select the password to be used to encrypt the Self-Extractor. Based on the PKCS#5( standard, an encryption key is derived from the password and then that key is used to encrypt the Self-Extractor. The password for the Self-Extractor must conform to the user s standard Endpoint Encryption password rules. For example, if the user s Endpoint Encryption password must be at least 6 characters long and contain at least one number, then the Self- Extractor password must also be at least 6 characters long and contain at least one number. It is possible to create Self-Extractors from both entire folders and individual files. The Self-Extractor is in essence a password encrypted copy of the source folder/source file, i.e. not the source folder/file itself. The source folder/file remains unaffected when the Self-Extractor is created. The Self-Extractor file will be an executable (*.exe). If the user selects Attach as Self-Extractor to , then the Self-Extractor executable file is automatically packaged into a compressed file (*.cab). The Endpoint Encryption for Files and Folders client calls whatever default application is used to create a new , to which the Self-Extractor cab file is automatically attached. Before the attachment is made, the Self-Extractor file itself is created by prompting the user for a password, i.e. the same procedure as when selecting Create Self-Extractor described above. Reading the Self-Extractor On the reading side, the way to open a Self-Extractor is even easier than creating the file. The recipient simply double clicks the Self-Extractor file, whereby a dialog will appear. In this dialog, the recipient must enter the very same password that was used when the Self-Extractor was created the creator of the Self-Extractor must in an appropriate manner tell the recipient what password has been used. Sending the password in the same as the Self-Extractor attachment is not a proper way. Preferably SMS messages or a telephone call should be used to transfer passwords for Self-Extractors. Without the correct password, Self-Extractors cannot be opened; there is no super-password. 2
5 By default, once the correct password is given the content of the Self-Extractor will open up automatically with the associated application. When the recipient then closes this application, the unpacked content of the Self-Extractor is also wiped from disk the actual Self-Extractor per se remains intact, however, so it may be opened again with the correct password. If the recipient wants to permanently save the unpacked content to disk, then the recipient needs to select this option in the dialog where the Self-Extractor password is entered. There, the recipient may browse where to save the unpacked content of the Self-Extractor. It is important to notice that the reader of the Self-Extractor does not need to have local Administrator rights on the PC where the Self-Extractor is read. Any regular user can open the Self-Extractor, provided the password is known. If the recipient received the Self-Extractor as an attachment, the procedure is the same as when clicking the Self-Extractor directly. As the *.cab format is recognized as a standard format, any PC machine will automatically start the default decompressing utility to unpack the content of the *.cab file, and the user may directly double click the Self-Extractor file once the unpackaged content is presented. Automatically created Self-Extractors on Removable Media Other than the two ways outlined above to create Self-Extractors, the Administrator may decide that any file users place on removable media, e.g. a USB memory stick, via Windows drag-and-drop operations is converted into a Self-Extractor. The purpose of this feature is to: secure the removable media such that the files are protected, should the user loose the USB memory, while at the same time: allowing the user to open and read the protected files on the removable media on any Windows computer without a need to first install Endpoint Encryption for Files and Folders. This auto-conversion may happen fully automated, without the user interference, or there may be an intermediate question presented to the user, asking if the file(s) shall be converted into a Self-Extractor when drag-dropped. If this feature is enabled and user answers No to the question to convert the file into a Self-Extractor, the file won t be put on the removable media; the drag-drop operation will fail. This feature only supports the Windows Explorer initiated file transfers to removable media, i.e.: Drag-and-drop operations 3
6 Copy-Paste Cut-Paste It is not supported when files are being created directly on the removable media, nor are the Command Prompt file transfer commands supported ( move and copy ). Limitation It s important to remember that the Self-Extractor doesn t contain functionality for the recipient to edit the content of the Self-Extractor and then sending the altered content back to the originator, unless of course the reader/recipient also has Endpoint Encryption for Files and Folders installed with the Self-Extractor option enabled. Further information For further information about Endpoint Encryption for Files and Folders, or any of the other award-winning Endpoint Encryption products, please contact your McAfee representative or visit 4
McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation
McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation 2013.06 McAfee Endpoint Encryption for Files and Folders (EEFF) uses powerful encryption technology to allow you to protect information
More informationRoyal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology
getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec
More informationUsing Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012
Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Contact the ITS Helpdesk at 402-559-7700 or helpdesk@unmc.edu with questions. How it works Basically, BitLocker
More informationPGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1
PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4
More informationUsing Websense Data Endpoint Client Software
1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization
More informationStep by step guide how to password protect your USB flash drive
Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos
More informationEncryption. Introduction to using 7-Zip
IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: its.training@manchester.ac.uk www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff
More informationEncrypting Files Using AxCrypt
Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else
More informationUSING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)
USING STUFFIT DELUXE StuffIt Deluxe provides many ways for you to create zipped file or archives. The benefit of using the New Archive Wizard is that it provides a way to access some of the more powerful
More informationBitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)
BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.
More informationExporting emails from Outlook Version 1.00
Exporting emails from Outlook Version 1.00 The rapid growth in volume of emails means that there is a growing need to archive old emails to media such as external hard disks and DVD s. The document will
More informationMcAfee Endpoint Encryption for Files and Folders. Best Practices. For EEFF product version 4.0.0
McAfee Endpoint Encryption for Files and Folders Best Practices For EEFF product version 4.0.0 McAfee, Inc. McAfee, Inc., 2821 Mission College Blvd., Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 Internet:
More informationVodafone Text Centre User Guide for Microsoft Outlook
Vodafone Text Centre User Guide for Microsoft Outlook 1 Contents Introduction 1 System requirements 2 Installation 3 The installation guide 3 First use 5 Send a message 8 Select recipient 8 Enter the message
More informationA. I do not have my own personal certificate I am a new client or want to download a new certificate
This user guide will help you to create your personal certificate in file/browser or smart card certificate. If you already own a personal certificate in file that you have saved on your computer, you
More informationHow to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
More informationDocumentation for Configuration of BeCrypt Removable Media Encryption
Documentation for Configuration of BeCrypt Removable Media Encryption Laptop Configuration Procedure and Details. Laptops were to be configured with BeCrypt encryption application in such a manner that
More informationINSTALLING NOVA DATA ENCRYPTION SOFTWARE
INSTALLING NOVA DATA ENCRYPTION SOFTWARE Introduction 1. Here is what you will need to do to install the college s data encryption software on your computer, laptop, or USB storage device. The encryption
More informationCopying Files to a Flash Drive or SD Card:
Copying Files to a Flash Drive or SD Card: Teachers: 1. Open My Computer from the Start Menu and see which drives are shown. Most computers, for example, have a hard disk drive such as a C: Local Disk
More informationUpgrading from Windows XP to Windows 7
Upgrading your PC from Windows XP to Windows 7 requires a custom installation which doesn't preserve your programs, files, or settings. It s sometimes called a clean installation for that reason. A custom
More informationInstalling Cobra 4.7
Installing Cobra 4.7 Stand-alone application using SQL Server Express A step by step guide to installing the world s foremost earned value management software on a single PC or laptop. 1 Installing Cobra
More informationHow To Connect To the WIT Wi-Fi Using Eduroam CAT Tools
How To Connect To the WIT Wi-Fi Using Eduroam CAT Tools Introduction To connect to the Internet in WIT with your laptop or phone, you need to have a current student login or a current staff login with
More informationKeePass Getting Started on Windows
KeePass Getting Started on Windows This guide includes the initial installation of KeePass 2.x on a Windows PC, creating your first password database, testing the software and entering your first accounts.
More informationMoving Rockwell Software Activation Keys to the VersaView 200R Industrial Computer
Page 1 of 1 01/16/03 K. Smidler Moving Rockwell Software Activation Keys to the VersaView 200R Industrial Computer Rockwell Software programs often have runtime components that require activations to utilize
More informationtips A quick and easy guide to securing your private information www.pkware.com
tips A quick and easy guide to securing your private information tips A quick and easy guide to securing your private information Basic Information 1. How to install SecureZIP for Windows Desktop for individual
More informationService & Support. How do you create a communication of RDP with an Industrial Thin Client SIMATIC ITC? Thin Client.
Cover How do you create a communication of RDP with an Industrial Thin Client SIMATIC ITC? Thin Client FAQ August 2012 Service & Support Answers for industry. Question This entry is from the Siemens Industry
More informationHow To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)
EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...
More informationSecureZIP User Guide
SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform
More informationDAZZLE INTEGRATED DATA BACKUP FEATURE.
DAZZLE INTEGRATED DATA BACKUP FEATURE. To simplify the backup process and to make sure even the busiest (or laziest) shops have no excuse not to make data backups, we have created a simple on-screen backup
More informationWatchDox for Windows. User Guide. Version 3.9.5
WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to
More informationBitLocker To Go User Guide
BitLocker To Go User Guide 1. Introduction BitLocker To Go a new feature of Windows 7 is a full-disk encryption protection technology for removable storage devices that are connected to one of the USB
More informationXythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
More informationCreating Digital Signatures
About Security You can secure a PDF using any of the following security methods: Add passwords and set security options to restrict opening, editing, and printing PDFs. Encrypt a document so that only
More informationCreating client-server setup with multiple clients
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
More informationService & Support. How do you create a communication of VNC with an Industrial Thin Client SIMATIC ITC? Thin Client.
Cover How do you create a communication of VNC with an Industrial Thin Client SIMATIC ITC? Thin Client FAQ August 2012 Service & Support Answers for industry. Question This entry is from the Siemens Industry
More informationInstallation Guide for Crossroads Software s Traffic Collision Database
Installation Guide for Crossroads Software s Traffic Collision Database This guide will take you through the process of installing the Traffic Collision Database on a workstation and a network. Crossroads
More informationElectronic Filing System Setting Up Your Adobe Acrobat Digital ID November 2012
Electronic Filing System Setting Up Your Adobe Acrobat Digital ID November 2012 To apply your electronic signature to electronic forms, you must first set up a Digital ID in Adobe Acrobat using the digital
More informationLesson 2. From computer to USB
Lesson 2 From computer to USB How do I save my designs from my computer to a USB Flash drive to stitch out on my BERNINA? So now you have designs on your computer and want to put them onto your BERNINA
More informationBelkin USB Flash Drive
Belkin USB Flash Drive Model F5U025 User Guide Belkin USB Flash Drive Overview Storing and moving data has never been easier. Introducing the Belkin USB Flash Drive. Simply plug the Flash Drive into the
More informationThe Information Security Tool Kit Think secure
The Information Security Tool Kit Think secure Password Protecting Your Printing - Aficio MP C5000 To ensure your print job is not lying around the printer and to keep your information secure, you can
More informationSafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
More informationShareSync Get Started Guide
ShareSync Get Started Guide WHAT IS SHARESYNC? ShareSync is a cloud file sync and share service. ShareSync allows you to easily sync files between multiple computers, the ShareSync web portal and mobile
More informationHow to create a portable encrypted USB Key using TrueCrypt
How to create a portable encrypted USB Key using TrueCrypt INTRODUCTION TrueCrypt Traveler Mode provides secure encryption for programs/files on portable devices such as USB Memory keys. It uses strong
More informationBitLocker To Go USB Flash Drive encryption User Guide
BitLocker To Go USB Flash Drive encryption User Guide Introduction BitLocker To Go is a new feature of Windows 7 which allows encryption of easily misplaced portable storage devices such as USB Flash Drives
More informationBacking up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts
WIN1020 November 2003 Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts INTRODUCTION... 1 PREPARATION... 1 BACKING UP EMAIL... 2 RESTORING EMAIL FROM A PERSONAL FILE FOLDER...
More informationTo add files to your email, first create the email. When you have opened a new email:
Email attachments You can send files, folders and other items within an email along with the mail message itself. Items which have been added to emails are called attachments. Adding an attachment to an
More informationWorking with USB Sticks
Addo Stuur Working with USB Sticks in Windows XP Working with USB Sticks in Windows XP 1 Working with USB Sticks in Windows XP The old-fashioned floppy disk is slowly falling out of fashion. More and more
More informationAccessing your Staff (N and O drive) files from off campus
Accessing your Staff (N and O drive) files from off campus It is possible to access your N and O drive files while you are off campus, for example whilst working from home or travelling. This document
More informationTest Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,
More informationHere is a guide on how to encrypt a part of your USB flash drive and access it on any computer:
How to password protect your USB flash drive. According to the XXX agency reports 80% of all lost and stolen USB flash drives contained a very important information: business or government data. The following
More informationIdentity Finder: Managing Your Results
Identity Finder: Managing Your Results The most important part of running Identity Finder is determining the most effective and secure way of managing the search results. Be sure to carefully read and
More informationCopies of QuickBooks aren t cheap, so the people who do your bookkeeping
appendix d Tracking with the Standalone r Copies of QuickBooks aren t cheap, so the people who do your bookkeeping are probably the only ones who have access to the program. Meanwhile, you may have dozens
More informationBankLink Books Clients
BankLink Books Clients This document is for those practices installing BankLink Books. The BankLink Service Agreement permits licensed BankLink practices to install the software in as many locations as
More informationATBONLINE BUSINESS. Customer User Guide Exporting Account Information to.ofx Format Software (Simply Accounting).
ATBONLINE BUSINESS Customer User Guide Exporting Account Information to.ofx Format Software (Simply Accounting). CONTENTS What You Need to Know about Simply Accounting and ATBOnline... 1 Procedures...
More informationDaRIS portal visual user guide
DaRIS portal visual user guide In this guide, we show some basic operations that you can do with DaRIS portal. Login / logout To access to the portal, click on this link https://mf-erc.its.monash.edu.au:8443/daris
More informationA. USB Portable Storage Device (PSD) Encryption Procedure
A. USB Portable Storage Device (PSD) Encryption Procedure After installing McAfee Endpoint Encryption software to your Windows PC, you can perform encryption to the USB PSD. I) When the USB PSD is inserted
More informationUser Guide. Version 3.0 April 2006
User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark
More informationBacking up your QuickBooks data file
Backing up your QuickBooks data file A regular backup regime is essential to minimise disruption to the business should there be an unexpected computer or network failure. A well prepared back up regime
More informationHow to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords
How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords School IT Systems Support Herts for Learning Ltd SROB220, Robertson
More informationMost of your tasks in Windows XP will involve working with information
OFFICE 1 File Management Files and Folders Most of your tasks in Windows XP will involve working with information stored on your computer. This material briefly explains how information is stored in Windows
More informationVirtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
More informationEncrypting a USB Drive Using TrueCrypt
Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and
More informationEncrypt USB Drive to Protect Data
Encrypt USB Drive to Protect Data Enable BitLocker on USB Flash Drives to Protect Data Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external
More informationSAS 9.3 Foundation for Microsoft Windows
Software License Renewal Instructions SAS 9.3 Foundation for Microsoft Windows Note: In this document, references to Microsoft Windows or Windows include Microsoft Windows for x64. SAS software is licensed
More informationUnderstanding Backup and Recovery Methods. Lesson 8
Understanding Backup and Recovery Methods Lesson 8 Objectives Objective Domain Matrix Technology Skill Objective Domain Description Objective Domain Number Understanding Local, Online, and Automated Understanding
More informationHow To Encrypt a File using Windows Explorer and WinZip. For Use With All PII Data
How To Encrypt a File using Windows Explorer and WinZip For Use With All PII Data As an employee or a contractor, you share in the responsibility for protecting the privacy of individuals whose information
More informationYou can find the installer for the +Cloud Application on your SanDisk flash drive.
Installation You can find the installer for the +Cloud Application on your SanDisk flash drive. Make sure that your computer is connected to the internet. Next plug in the flash drive and double click
More informationDPMS2 McAfee Endpoint Encryption New Installation
DPMS2 McAfee Endpoint Encryption New Installation Contents DPMS2 McAfee Endpoint Encryption New Installation... 1 1. Registering for the Application... 2 2. Downloading the Application... 6 3. Important
More informationGuest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved.
Guest PC for Mac OS X Version 1.6 User Guide Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Table of Contents About Guest PC... 1 About your Virtual Computer... 1 Creating a Virtual
More informationTable of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...
Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...
More informationE-Pollbook Flash Drive Guide for BitLocker
E-Pollbook Flash Drive Guide for BitLocker Michigan Department of State Bureau of Elections May 2016 1 E-Pollbook Flash Drive Guide for BitLocker - Table of Contents Introduction... 3 BitLocker... 3 Putting
More informationShareSync Get Started Guide
ShareSync Get Started Guide WHAT IS SHARESYNC? ShareSync is a cloud file sync and share service. ShareSync allows you to easily sync files between multiple computers, the ShareSync web portal and mobile
More informationTechnology Business Solutions. Online Backup Manager INSTALLATION
Technology Business Solutions Online Backup Manager 1. Go to the TBS OBM Software Registration Page Click the TBS Logo Under the select an account type choose the PRO version. Page1 of7 2.) Create a new
More informationIn the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.
QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in
More informationOverview... 2. Using the Secure Desktop Agent... 4. Troubleshooting... 10
Overview... 2 Installing... 2 Step 1: Download... 2 Step 2: Install... 2 Step 3: Sign In... 3 Step 4: That's It!... 3 Minimum System Requirements:... 3 Using the Secure Desktop Agent... 4 Accessing & Login
More informationSafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
More informationInstalling FileMaker Pro 11 in Windows
Installing FileMaker Pro 11 in Windows Before you begin the installation process, please exit other open programs and save your work. Installation notes Before you install FileMaker Pro, review the following
More informationInformation to configure your Windows 7 office computer is described below.
The Remote Desktop feature in Windows allows you to control your computer from another office or from home. Remote Desktop allows you to use the applications on your office computer, and access your data
More informationPersonal Vault. User Guide
Personal Vault User Guide i Contents McAfee Personal Vault 3 Personal Vault features... 4 Getting started... 5 Using McAfee Personal Vault... 6 The First-Use wizard: Step 1... 8 The First-Use wizard:
More informationCCH Axcess Portal Client User Guide
CCH Axcess Portal Client User Guide Keys Quick reference to the key aspects of a particular function Icon Legend Tip Notes Best practice tips and shortcuts Informational notes about functions Warning Important
More informationUSB Flash Security Free Edition Quick Start
Quick Start [For USB Flash Security Free Edition] 1 / 18 USB Flash Security Free Edition Quick Start Before use USB Flash Security 1. Free edition can only be installed on the USB Flash Drive up to 4GB
More informationetoken Enterprise For: SSL SSL with etoken
etoken Enterprise For: SSL SSL with etoken System Requirements Windows 2000 Internet Explorer 5.0 and above Netscape 4.6 and above etoken R2 or Pro key Install etoken RTE Certificates from: (click on the
More informationOperating Instructions
Operating Instructions (For Setting up the Printer Driver and the Panasonic Document Management System) Digital Imaging Systems Model No. DP-800P / 800E / 806P Installation Table of Contents Installation
More informationUsing an Automatic Back Up for Outlook 2003 and Outlook 2007 Personal Folders
Using an Automatic Back Up for Outlook 2003 and Outlook 2007 Personal Folders Part 1 Install the Personal Folder Backup Utility Note: You should close Outlook and any other applications before installing
More informationNotepad++ The COMPSCI 101 Text Editor for Windows. What is a text editor? Install Python 3
Notepad++ The COMPSCI 101 Text Editor for Windows The text editor that we will be using in the Computer Science labs for creating our Python programs is called Notepad++ and http://notepad-plus-plus.org
More informationBSDI Advanced Fitness & Wellness Software
BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc INSTRUCTION SHEET FOR MOVING YOUR DATABASE FROM ONE COMPUTER TO ANOTHER This document will outline the steps
More informationBSDI Advanced Fitness & Wellness Software
BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the
More informationArchiving and Managing Your Mailbox
Archiving and Managing Your Mailbox We Need You to Do Your Part We ask everyone to participate in routinely cleaning out their mailbox. Large mailboxes with thousands of messages impact backups and may
More informationApplication Note CTAN #374
Application Note CTAN #374 The Application Note is specific to the CT software packages MentorSoft, UniSoft and SeSoft Windows 7 64-bit and the Older CT Software Scope Windows 7 64-bit Professional 64-bit
More informationMapInfo Professional 12.0 Licensing and Activation
MapInfo Professional 12.0 Asia Pacific/Australia: Phone: +61 2 9437 6255 pbsoftware.australia@pb.com pbsoftware.singapore@pb.com www.pitneybowes.com.au/software Canada: Phone: 1 800 268 3282 pbsoftware.canada.sales@pb.com
More informationThe File Command Window
ADVANCED PROJECTWISE FILE COMMANDS 201 ABOUT THIS TRAINING This training is intended to give a user the ability to use advanced file commands. The student should first have a basic knowledge of ProjectWise
More informationPC Agent Quick Start. Open the Agent. Autonomy Connected Backup. Version 8.8. Revision 0
T E C H N I C A L N O T E Autonomy Connected Backup Version 8.8 PC Agent Quick Start Revision 0 Use this document as a quick reference for common Connected Backup PC Agent tasks. If the Agent is not on
More informationSecure File Transfer Guest User Guide Updated: 5/8/14
Secure File Transfer Guest User Guide Updated: 5/8/14 TABLE OF CONTENTS INTRODUCTION... 3 ACCESS SECURE FILE TRANSFER TOOL... 3 REGISTRATION... 4 SELF REGISTERING... 4 REGISTER VIA AN INVITATION SENT BY
More informationGE Intelligent Platforms. Activating Licenses Online Using a Local License Server
GE Intelligent Platforms Activating Licenses Online Using a Local License Server January 2016 Introduction: This document is an introduction to activating licenses online using a GE-IP Local License Server.
More informationAT&T Conferencing Add-in for Microsoft Outlook v10.5
AT&T Conferencing Add-in for Microsoft Outlook v10.5 July 2014 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T
More informationAcceptable Encryption Usage for UTHSC
This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged
More informationE-mail Encryption Recipient Guidelines
E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies
More informationSafeGuard Enterprise Web Helpdesk
SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk
More informationUSB HSPA Modem. User Manual
USB HSPA Modem User Manual Congratulations on your purchase of this USB HSPA Modem. The readme file helps you surf the Internet, send and receive SMS, manage contacts and use many other functions with
More informationMyUSBOnly User Guide Menu
MyUSBOnly User Guide Menu Welcome - Lock the Bad Guys out of your USB ports!... 2 System Requirement... 4 Important Notes... 4 FAQ How to install a trial version MyUSBOnly?... 5 FAQ How to buy and install
More informationManaging documents, files and folders
Managing documents, files and folders Your computer puts information at your fingertips. Over time, however, you might have so many files that it can be difficult to find the specific file you need. Without
More information