BitLocker Encryption for non-tpm laptops

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "BitLocker Encryption for non-tpm laptops"

Transcription

1 BitLocker Encryption for non-tpm laptops Contents 1.0 Introduction What is a TPM? Users of non-tpm University laptops Existing Windows 7 laptop users Existing Windows 8.1 laptop users New laptop users Enabling BitLocker Working with BitLocker Unlocking your drive Changing your BitLocker password BitLocker Recovery Key Retrieving your recovery key from the self-service portal

2 1.0 Introduction To meet University security compliance all University owned laptops are to be encrypted using BitLocker and managed by our Microsoft BitLocker Administration and Monitoring (MBAM) server. BitLocker drive encryption is Microsoft s proprietary encryption program and is included with certain versions of Windows. BitLocker encrypts the data stored on the Windows operating system (OS) volume, ensuring your data is secure in the unlikely event your laptop is lost or stolen. 2.0 What is a TPM? A Trusted Platform Module (TPM) is a computer chip (microprocessor) dedicated to dealing with certain security related functions. These microprocessors are built into some, but not all, models of laptop used by the University. If your laptop does not have a TPM chip, some aspects of the encryption process are performed by software rather than the TPM hardware. Essentially this means non-tpm laptops will require the user to enter a password to unlock/decrypt the drive prior to logging in. This authentication could be handled by the TPM if present. 3.0 Users of non-tpm University laptops How we enable BitLocker on your University laptop will depend on its current setup. The process will be largely automated so please do not attempt to manually enable BitLocker as you would do at home. We will be managing this roll out to ensure your recovery keys are securely stored on our MBAM server and your compliance details are known. Please read the information below most relevant to your current setup to see how this process will begin. 3.1 Existing Windows 7 laptop users Although BitLocker is available for Windows 7, non-tpm laptops will need to be reimaged to Windows 8.1. This is required to ensure the best possible security for your laptop and to enable management via our MBAM server. Information Services will be contacting you to arrange your upgrade and will help take you through the encryption process described in section Existing Windows 8.1 laptop users Continue to use your laptop as normal. The BitLocker encryption process will begin automatically once we deploy the policy to your laptop. At this stage the dialog box shown in section 4.0 will automatically appear on your desktop. Follow the steps in section 4.0 to complete the encryption process. 3.3 New laptop users If you receive a new University (non-tpm) laptop it will come preinstalled with Windows 8.1. The encryption process will begin once you have logged in and the dialog box shown in section 4.0 automatically appears on your desktop. Follow the steps in section 4.0 to complete the encryption process. 4.0 Enabling BitLocker The following dialog box will automatically appear on your desktop. 2

3 1. Enter a strong password that meets the complexity policy. This password will be required to unlock/decrypt your drive. 2. Confirm your new password. 3. Click Please note: This is an additional password, it is not linked to or replaces your usual login/domain credentials. 4. Your disk will now begin encrypting. 5. Click the Close button to close the MBAM encryption wizard. 6. Click OK, your disk will continue to be encrypted in the background. 3

4 7. Continue to use your laptop as normal. You can also turn your laptop off, encryption will simply continue the next time your laptop is turned on. 8. You can monitor the encryption process by clicking the BitLocker icon in your system tray 9. When your disk has been successfully encrypted the below MBAM dialog box appears. Read the Things to remember bullet points and press Exit. 10. BitLocker is now enabled. Your operating system (OS) volume has been encrypted and a recovery key, unique to your OS volume, has been stored in the MBAM database. 4

5 5.0 Working with BitLocker BitLocker drive encryption will not affect the way you work on your laptop. Your drive and its contents are only encrypted when your laptop is turned off or in hibernation mode. It s best to think of BitLocker as offline protection for your data. 5.1 Unlocking your drive When you turn your laptop on a blue BitLocker password screen will appear. To unlock/decrypt your drive enter your password (created in section 4.0) and press the Enter key. 5.2 Changing your BitLocker password You can change your BitLocker password by following these steps: 1. Open Control Panel (icons view) Start > Settings > Control Panel 2. Select BitLocker Encryption Options 3. Under Fixed Disk Drives click Manage your password 4. Enter a new password, confirm your new password and click Reset Password. 5. Your new password will now be required to unlock your drive. 5

6 6.0 BitLocker Recovery Key Although very rare, some specific events may cause BitLocker to enter recovery mode when attempting to start your laptop. If you are unable to unlock your drive or your laptop enters BitLocker recovery mode you can retrieve your unique recovery key from our self-service portal. 6.1 Retrieving your recovery key from the self-service portal Steps to retrieving your recovery key: 1. If not at the BitLocker recovery screen press Esc to enter BitLocker recovery. 2. You will need to use your recovery key ID, highlighted below, to retrieve your recovery key from the self-service portal. 3. Open a web browser and navigate to: 4. Enter your staff username and password to gain access to the portal. 6

7 5. Please read the policy notice page, tick the confirmation box and click continue. 6. You will now be directed to the self-service recovery key page. Follow the 3 steps as instructed using your recovery key ID from step 2. 7

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM)

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative

More information

In order to enable BitLocker, your hard drive must be partitioned in a particular manner.

In order to enable BitLocker, your hard drive must be partitioned in a particular manner. ENABLE BITLOCKER ON WINDOWS VISTA - WITHOUT A TPM Requirements: You must be running Vista Enterprise or Vista Ultimate to enable BitLocker. Any other version of Vista is not compatible. It is recommended

More information

How to enable BitLocker on a Windows Laptop.

How to enable BitLocker on a Windows Laptop. How to enable BitLocker on a Windows Laptop. If the operating system on your Windows laptop matches any in the list below then your device will have Bitlocker installed on your machine as default. This

More information

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2 Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.

More information

Massey University Wireless Network Client Configuration Windows 7

Massey University Wireless Network Client Configuration Windows 7 Massey University Wireless Network Client Configuration Windows 7 Windows 7 wireless network Requirements You must have an active Massey network account, i.e. you should already be able to log onto the

More information

Windows BitLocker Drive Encryption Step-by-Step Guide

Windows BitLocker Drive Encryption Step-by-Step Guide Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft

More information

BITLOCKER USER GUIDANCE

BITLOCKER USER GUIDANCE BITLOCKER USER GUIDANCE This document provides guidance to users on the Bitlocker Encryption software installed on University of Wolverhampton laptops. Page 1 Further guidance and assistance can be obtained

More information

Password Manager Windows Desktop Client

Password Manager Windows Desktop Client Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard

More information

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. 1. Click the Windows Start button, then Control Panel How-To-WCC-Secure-Windows-7-11/4/2010-4:09

More information

Macs are not directly compatible with Noetix.

Macs are not directly compatible with Noetix. Those that use Macintosh computers to access Noetix cannot directly access Noetix through http://www.sandiego.edu/noetix. If one is on a Mac and goes to Noetix directly in a web browser, the page is likely

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

SYNTHESYS MANAGEMENT User Management

SYNTHESYS MANAGEMENT User Management SYNTHESYS MANAGEMENT User Management Synthesys.Net User Management 1 SYNTHESYS.NET USER MANAGEMENT INTRODUCTION...3 STARTING SYNTHESYS USER MANAGEMENT...4 Viewing User Details... 5 Locating individual

More information

Securewireless Windows 7 Setup Instructions

Securewireless Windows 7 Setup Instructions Securewireless Windows 7 Setup Instructions 1. Click on the wireless icon in the lower right hand corner of the taskbar and then click on Open Network and Sharing Center. 2. From the Network and Sharing

More information

Recall CommandIG. Installation Guide. File, Sync and Share Desktop Client

Recall CommandIG. Installation Guide. File, Sync and Share Desktop Client Recall CommandIG Installation Guide File, Sync and Share Desktop Client July 2015 Table of Contents 1. System Information... 3 1.1. Supported OS... 3 1.2. Supported Browsers... 3 2. Download Desktop Client...

More information

Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network

Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network Wireless Network Names and Credentials There are two wireless networks operating at the Goldfields

More information

Windows XP Exchange Client Installation Instructions

Windows XP Exchange Client Installation Instructions WINDOWS XP with Outlook 2003 or Outlook 2007 1. Click the Start button and select Control Panel: 2. If your control panel looks like this: Click Switch to Classic View. 3. Double click Mail. 4. Click show

More information

Encrypting with BitLocker for disk volumes under Windows 7

Encrypting with BitLocker for disk volumes under Windows 7 Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1

More information

How to enable Disk Encryption on a laptop

How to enable Disk Encryption on a laptop How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data

More information

CONNECTING TO THE DTS WIRELESS NETWORK USING WINDOWS VISTA

CONNECTING TO THE DTS WIRELESS NETWORK USING WINDOWS VISTA CONNECTING TO THE DTS WIRELESS NETWORK USING WINDOWS VISTA There are three steps to accessing the web through the DTS wireless network. 1. Obtain the wireless network Username and Password. This is something

More information

Connecting to eduroam using Windows 8

Connecting to eduroam using Windows 8 Connecting to eduroam using Windows 8 GUIDE User Services IT Services University of Malta 2013 User Services IT Services University of Malta Msida MSD 2080 Malta May only be reproduced with permission.

More information

Q. I use a MAC How do I change my password so I can send and receive my email?

Q. I use a MAC How do I change my password so I can send and receive my email? Password Change FAQ Q. I use a MAC How do I change my password so I can send and receive my email? A. First point a browser to http://www.redlands.edu/passwordmanager and change your password. Afterward,

More information

Microsoft Office 365 with MailDefender

Microsoft Office 365 with MailDefender (PC) for Microsoft Office 365 with MailDefender V1.0 Contents 1 Logging in to the Office 365 Portal... 3 1.1 Outlook Web Access Exchange & Lync... 3 1.2 Team Site SharePoint Online... 3 2 Configuring your

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

Creating a User Profile for Outlook 2013

Creating a User Profile for Outlook 2013 Creating a User Profile for Outlook 2013 This document tells you how to create a user profile for Outlook 2013 on your computer (also known as the Outlook client). This is necessary, for example, when

More information

E-Pollbook Flash Drive Guide for BitLocker

E-Pollbook Flash Drive Guide for BitLocker E-Pollbook Flash Drive Guide for BitLocker Michigan Department of State Bureau of Elections May 2016 1 E-Pollbook Flash Drive Guide for BitLocker - Table of Contents Introduction... 3 BitLocker... 3 Putting

More information

How do I use Citrix Staff Remote Desktop

How do I use Citrix Staff Remote Desktop How do I use Citrix Staff Remote Desktop September 2014 Initial Log On In order to login into the new Citrix system, you need to go to the following web address. https://remotets.tees.ac.uk/ Be sure to

More information

Spectrum Health Virtual Desktop (VDI) (available only to select users at this time)

Spectrum Health Virtual Desktop (VDI) (available only to select users at this time) This page allows access to several Spectrum Health password protected areas. If you have any issues using these services, please contact the Spectrum Health Help Desk at 616.391.1361. Additional Security

More information

How to Access Coast Wi-Fi

How to Access Coast Wi-Fi How to Access Coast Wi-Fi Below is a summary of the information required to configure your device to connect to the coast-wifi network. For further assistance in configuring your specific device, continue

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Using BitLocker to encrypt a Windows 8 device

Using BitLocker to encrypt a Windows 8 device Using BitLocker to encrypt a Windows 8 device 1. Before BitLocker can be used to encrypt the portable device, the Trusted Platform Module must be turned on via the BIOS. Boot the device and press F2, F10,

More information

Neoteris IVE Integration Guide

Neoteris IVE Integration Guide Neoteris IVE Integration Guide Published Date July 2015 The Secure Email Client upgrade option enables Neoteris IVE users to use standards based email clients to access corporate email from remote locations.

More information

16.4.3 Lab: Data Backup and Recovery in Windows XP

16.4.3 Lab: Data Backup and Recovery in Windows XP 16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The

More information

OFFICE OF INFORMATION TECHNOLOGY

OFFICE OF INFORMATION TECHNOLOGY OFFICE OF INFORMATION TECHNOLOGY EDUROAM SETUP IN SUTD VERSION 1.1 1 SEPTEMBER 2016 Page 1 Contents 1. Purpose... 3 2. Windows 7 Setup for eduroam... 3 3. Windows 10 Setup for eduroam... 11 4. ios Setup

More information

McAfee Endpoint Encryption (SafeBoot) User Documentation

McAfee Endpoint Encryption (SafeBoot) User Documentation TABLE OF CONTENTS Press the CTRL key while clicking on topic to go straight to the topic in this document. I. Introduction... 1 II. Installation Process Overview... 1 III. Checking for a Valid Current

More information

Secure Global Desktop (SGD)

Secure Global Desktop (SGD) Secure Global Desktop (SGD) Table of Contents Checking your Java Version...3 Preparing Your Desktop Computer...3 Accessing SGD...5 Logging into SGD...6 Using SGD to Access Your Desktop...7 Using SGD to

More information

MCBDirect Corporate Logging on using a Soft Token

MCBDirect Corporate Logging on using a Soft Token MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft

More information

Dell ControlPoint Security Manager

Dell ControlPoint Security Manager Dell ControlPoint Security Manager www.dell.com support.dell.com Notes NOTE: A NOTE indicates important information that helps you make better use of your computer. Information in this document is subject

More information

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL Version 2.0 Updated: March 2011 Contents 1. Mac Email Clients... 3 1.1 Configuring Microsoft Outlook 2011... 3 1.2 Configuring Entourage 2008... 4 1.3.

More information

Safety and Health Grant Program Database Remote Access Installation Guide

Safety and Health Grant Program Database Remote Access Installation Guide Safety and Health Grant Program Database Remote Access Installation Guide Version 1.01 October 29, 2011 Imagine Nation Software 8223 Yukon Hills Ct. Las Vegas, NV 89178 www.insoftware.net Contact: Michael

More information

Disk Encryption. Aaron Howard IT Security Office

Disk Encryption. Aaron Howard IT Security Office Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance

More information

Welcome Guide for MP-1 Token for Microsoft Windows

Welcome Guide for MP-1 Token for Microsoft Windows Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made

More information

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Contents Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Automatic Setup 1. Click on the Wireless icon in your system tray that looks like. 2. You will see a list of available

More information

Set Up E-mail Setup with Microsoft Outlook 2007 using POP3

Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Page 1 of 14 Help Center Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Learn how to configure Outlook 2007 for use with your 1&1 e-mail account using POP3. Before you begin, you will need

More information

WiFi Internet Access. Windows XP Setup Instructions. Please Return After Use. Produced Oct 2010

WiFi Internet Access. Windows XP Setup Instructions. Please Return After Use. Produced Oct 2010 WiFi Internet Access Windows XP Setup Instructions Produced Oct 2010 Please Return After Use About the Janet Roaming Service The University of Plymouth provides an infrastructure for guest users to use

More information

Cautions When Using BitLocker Drive Encryption on PRIMERGY

Cautions When Using BitLocker Drive Encryption on PRIMERGY Cautions When Using BitLocker Drive Encryption on PRIMERGY July 2008 Fujitsu Limited Table of Contents Preface...3 1 Recovery mode...4 2 Changes in hardware configurations...5 3 Prior to hardware maintenance

More information

The ECU Wireless system uses a captive portal authentication system. There are three steps to configure your computer for wireless access:

The ECU Wireless system uses a captive portal authentication system. There are three steps to configure your computer for wireless access: ECU WIRELESS SETUP The ECU Wireless system uses a captive portal authentication system. There are three steps to configure your computer for wireless access: 1. Install a wireless network card into your

More information

Remote Desktop Web Access. Using Remote Desktop Web Access

Remote Desktop Web Access. Using Remote Desktop Web Access Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off

More information

QUT PRINTING SERVICES. www.qps.qut.edu.au. Printing from your laptop. Connect your laptop to the student print queue

QUT PRINTING SERVICES. www.qps.qut.edu.au. Printing from your laptop. Connect your laptop to the student print queue QUT PRINTING SERVICES www.qps.qut.edu.au Printing from your laptop Connect your laptop to the student print queue Contents Using this guide 3 How to print from your laptop 3 Windows 8 4 Windows 7 Windows

More information

Neoteris IVE Integration Guide

Neoteris IVE Integration Guide Neoteris IVE Integration Guide NESD-00090-00 CAY051402 The Secure Email Client upgrade option enables Neoteris IVE users to use standardsbased email clients to access corporate email from remote locations.

More information

ICT DEPARTMENT. Windows 7. Wireless Authentication Procedures for Windows 7 & 8 Users For Linux and windows XP users visit ICT office

ICT DEPARTMENT. Windows 7. Wireless Authentication Procedures for Windows 7 & 8 Users For Linux and windows XP users visit ICT office ICT DEPARTMENT Wireless Authentication Procedures for Windows 7 & 8 Users For Linux and windows XP users visit ICT office Requirements: 1. Wireless enable laptop with Valid Anti-Virus 2. Configure your

More information

10.3.1.6 Lab - Data Backup and Recovery in Windows XP

10.3.1.6 Lab - Data Backup and Recovery in Windows XP 5.0 10.3.1.6 Lab - Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment

More information

SQL Server 2008 R2 Express Edition Installation Guide

SQL Server 2008 R2 Express Edition Installation Guide Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details

More information

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4 Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites

More information

HGC SUPERHUB HOSTED EXCHANGE EMAIL

HGC SUPERHUB HOSTED EXCHANGE EMAIL HGC SUPERHUB HOSTED EXCHANGE EMAIL OUTLOOK 2010 MAPI MANUALLY SETUP GUIDE MICROSOFT HOSTED EXCHANGE V2013.5 Table of Contents 1. Get Started... 1 1.1 Start from Setting up an Email account... 1 1.2 Start

More information

Manual Configuration Instructions

Manual Configuration Instructions NOTE: The manual configuration instruction below are in the process of being revised to reflect the network name change to eduroam. All configuration settings for the TSCeduroam requires a username in

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

VERALAB LDAP Configuration Guide

VERALAB LDAP Configuration Guide VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to

More information

Cesview IIi 1.3 Installation and Automation Guide

Cesview IIi 1.3 Installation and Automation Guide Cesview IIi 1.3 Installation and Automation Guide Contents: New ser Quick Guide Cesview IIi asic Installation o Additional Server Installation Notes o Additional rowser Only (Client) Installation Notes

More information

Connecting to Remote Desktop Windows Users

Connecting to Remote Desktop Windows Users Connecting to Remote Desktop Windows Users How to log into the College Network from Home 1. Start the Remote Desktop Connection For Windows XP, Vista and Windows 7 this is found at:- Star t > All Programs

More information

NetIQ Advanced Authentication Framework - Password Filter. Installation Guide. Version 5.1.0

NetIQ Advanced Authentication Framework - Password Filter. Installation Guide. Version 5.1.0 NetIQ Advanced Authentication Framework - Password Filter Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Installing

More information

In order for BitLocker to be used with a TPM chip, you may need to activate this in BIOS of the laptop.

In order for BitLocker to be used with a TPM chip, you may need to activate this in BIOS of the laptop. ENABLE BITLOCKER ON WINDOWS VISTA USING TPM Requirements: You must be running Vista Enterprise or Vista Ultimate to enable BitLocker. Any other version of Vista is not compatible. A laptop with an enabled/activated

More information

WIRELESS SETUP FOR WINDOWS 7

WIRELESS SETUP FOR WINDOWS 7 Computing & Communications WIRELESS SETUP FOR WINDOWS 7 For assistance during the configuration process please call the Computing and Communications Help Desk at 639-2049, avdesk@swgc.mun.ca Who should

More information

Printing to Windows Shares from xprintserver using IPP/HTTP

Printing to Windows Shares from xprintserver using IPP/HTTP Scenario: User has a printer connected directly to a Windows Server 2003 or 2008 server and wants to print to it from an ios device using the xprintserver. Solution: Use Internet Printing support in Windows

More information

How to Move an SAP BusinessObjects BI Platform System Database and Audit Database

How to Move an SAP BusinessObjects BI Platform System Database and Audit Database How to Move an SAP BusinessObjects BI Platform System Database and Audit Database Technology Used SAP BI Platform 4.1 (this includes SAP BusinessObjects Enterprise 4.1, SAP BusinessObjects Edge 4.1 and

More information

The user matching the password that is entered at the Bootguard screen will be automatically logged into the Windows Active Directory.

The user matching the password that is entered at the Bootguard screen will be automatically logged into the Windows Active Directory. Symantec Endpoint Encryption Instructions The State College of Florida is in the process of purchasing licenses to Symantec Endpoint Encryption for installation on college owned computers. Advantages of

More information

Encryption Process and Procedures Table of Contents

Encryption Process and Procedures Table of Contents Encryption Process and Procedures Table of Contents Introduction Why do we need software encryption? Online Resources Pre Encryption Activities Process Flow Backing up your computer Run Chkdsk and Defrag

More information

ONE Mail Direct for Desktop Software

ONE Mail Direct for Desktop Software ONE Mail Direct for Desktop Software Version: 1 Document ID: 3931 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2015, ehealth Ontario All rights reserved No part of this document may

More information

Wireless Network Configuration Guide

Wireless Network Configuration Guide CIT Table of Contents Introduction... 1 General Wireless Settings... 1 1. Windows XP Wireless Configuration... 2 2. Windows XP Intel Pro Wireless Tool... 7 3. Windows Vista Using the Windows Wireless Tools...

More information

Configuring the Active Directory Plug-in

Configuring the Active Directory Plug-in Wazza s QuickStart Configuring the Active Directory Plug-in Mac OS X 10.3.4 Background Using the Mac OS X 10.3.x built-in Active Directory (AD) plug-in, Mac users can authenticate with a Windows Active

More information

Embarcadero Performance Center 2.7 Installation Guide

Embarcadero Performance Center 2.7 Installation Guide Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.

More information

Download Abacus Payroll Software and Activating Software:

Download Abacus Payroll Software and Activating Software: Download Abacus Payroll Software and Activating Software: Before you can install Abacus Payroll Software you need to ensure that your computer/laptop meets the following requirements: Windows 7 or Higher

More information

Configuring Outlook 2002-2003 for IMAP. Creating a New IMAP Account. Modify an Existing Account

Configuring Outlook 2002-2003 for IMAP. Creating a New IMAP Account. Modify an Existing Account mai l. uml. edu mai l. uml. edu Configuring Outlook 2002-2003 for IMAP This document will show you how to setup or modify Outlook 2003 as an IMAP client. It is intended for Faculty and Staff whose mailboxes

More information

Windows XP Instructions Windows 7 Instructions Mac OS Instructions ipad Instructions... 10

Windows XP Instructions Windows 7 Instructions Mac OS Instructions ipad Instructions... 10 The following provides instructions on how to connect to the SJCD-Secure Wireless Network from a variety of operating systems and devices. If you experience any difficulty with these instructions, please

More information

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install

More information

Magaya Software Installation Guide

Magaya Software Installation Guide Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to

More information

BounceBack User Guide

BounceBack User Guide Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:

More information

Cloud Attached Storage

Cloud Attached Storage Backing Up and Restoring SQL Server Databases Cloud Attached Storage February 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in

More information

Contents. VPN Instructions. VPN Instructions... 1

Contents. VPN Instructions. VPN Instructions... 1 VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit

More information

INSTALLATION GUIDE July 2015

INSTALLATION GUIDE July 2015 INSTALLATION GUIDE July 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may

More information

Instructions: Configuring Outlook 2003 with Exchange 2010 on the FIUMail

Instructions: Configuring Outlook 2003 with Exchange 2010 on the FIUMail Instructions: Configuring Outlook 2003 with Exchange 2010 on the FIUMail Environment Some users have been using Outlook 2003 with their IMAP or POP account, and already have a profile set up. For those

More information

1. Cloud Data Center... 1. 2. Login to ICT Marketplace Portal... 1. 3. Dashboard... 2. 3. Data center management... 3. 3.1. New data center...

1. Cloud Data Center... 1. 2. Login to ICT Marketplace Portal... 1. 3. Dashboard... 2. 3. Data center management... 3. 3.1. New data center... Contents 1. Cloud Data Center... 1 2. Login to ICT Marketplace Portal... 1 3. Dashboard... 2 3. Data center management... 3 3.1. New data center... 3 4. View Data Centers... 6 5. Remove Data Centers...

More information

HP MediaSmart Server Software Upgrade from v.2 to v.3

HP MediaSmart Server Software Upgrade from v.2 to v.3 HP MediaSmart Server Software Upgrade from v.2 to v.3 Table of Contents Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New 3 Features That Will

More information

BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011

BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011 BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011 Purpose To provide a step-by-step procedure for encrypting installed laptop

More information

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account? Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply

More information

Edith Cowan University Information Technology Services Centre

Edith Cowan University Information Technology Services Centre Information There are three wireless networks on campus which give you access to the ECU website, the staff intranet, the internet and other ECU resources: ECU This is the easiest to use and safest wireless

More information

MBAM Self-Help Portals

MBAM Self-Help Portals MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa

More information

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption

More information

Aspire. Basic Steps for Remote Desktop Protocol (RDP) Setup

Aspire. Basic Steps for Remote Desktop Protocol (RDP) Setup Basic Steps for Remote Desktop Protocol (RDP) Setup Basic RDP Setup for a school hosted at USOE. Setting up an RDP connection Remote Desktop Protocol When a school begins using ASPIRE SOFTWARE for the

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Remote Access: Citrix Client Setup

Remote Access: Citrix Client Setup Introduction: The following documentation is intended to assist first time or active users with installation of the Citrix ICA connection software required to access the MSVU Remote Access system desktop

More information

Backing Up and Restoring Microsoft Hyper-V Server Virtual Machines. Cloud Attached Storage. February 2014 Version 4.0

Backing Up and Restoring Microsoft Hyper-V Server Virtual Machines. Cloud Attached Storage. February 2014 Version 4.0 Backing Up and Restoring Microsoft Hyper-V Server Virtual Machines Cloud Attached Storage February 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document

More information

AeroLab Wireless Network Code of Conduct. Connecting to the AeroLab Wireless Network

AeroLab Wireless Network Code of Conduct. Connecting to the AeroLab Wireless Network AeroLab Wireless Network Code of Conduct The AeroLab wireless network is intended for academic use only. Any use of the wireless network for BitTorrent or other Peer-to-Peer file sharing is strictly prohibited.

More information

educ Office 365 email: Remove & create new Outlook profile

educ Office 365 email: Remove & create new Outlook profile Published: 29/01/2015 If you have previously used Outlook the with the SCC/SWO service then once you have been moved into Office 365 your Outlook will need to contact the SCC/SWO servers one last time

More information

How to set up Outlook Anywhere on your home system

How to set up Outlook Anywhere on your home system How to set up Outlook Anywhere on your home system The Outlook Anywhere feature for Microsoft Exchange Server 2007 allows Microsoft Office Outlook 2007 and Outlook 2003 users to connect to their Outlook

More information

TERAcloud w w w. t e r a c l o u d. u k

TERAcloud w w w. t e r a c l o u d. u k Accessing your account Once you have received the confirmation email, there will be a link to your personal area where you can download the backup application. In the example here we are using the support

More information

Quick Instructions Installing on a VPS (Virtual Private Server)

Quick Instructions Installing on a VPS (Virtual Private Server) Introduction A Virtual Private Server is a virtual PC held in a remote data centre, which can be accessed via a username/password from any other computer. There are a number of scenarios where you might

More information

The safer, easier way to help you pass any IT exams. Exam : 70-688. Managing and Maintaining Windows 8. Title : 1 / 19

The safer, easier way to help you pass any IT exams. Exam : 70-688. Managing and Maintaining Windows 8. Title : 1 / 19 Exam : 70-688 Title : Managing and Maintaining Windows 8 Version : Demo 1 / 19 1.DRAG DROP Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and do not

More information

User Guide for eduroam

User Guide for eduroam User Guide for eduroam 獲 以 下 認 證 : Certificado pela: Certified by: 澳 門 望 廈 山 Colina de Mong-Há, Macau 電 話 : (853) 8598 3120 Tel: (853) 8598 3120 傳 真 : (853) 8598 3151 Fax: (853) 8598 3151 www.ift.edu.mo

More information

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required

More information