University of Rochester Sophos SafeGuard Encryption for Windows Support Guide

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "University of Rochester Sophos SafeGuard Encryption for Windows Support Guide"

Transcription

1 Sophos SafeGuard Encryption for Windows Support Guide University Information Technology Security & Policy September 15, 2015 Version Date Modification 1.0 September 15, 2015 Initial guide

2 Contents 1.0 Too many invalid logon attempts Decrypting the Hard Drive/Uninstall Sophos Device Recovery... 5 A. Recovering Data by slaving Hard Drives... 5 B. Recovering/Restoring a Client with broken MBR (Master Boot Record) using WinPE... 7 C. Retrieving data using Virtual Client Windows 8/8.1 MBR recovery Reinstall

3 1.0 Too many invalid logon attempts If a user consecutively enters an incorrect password 16 times for a Windows system that is not bound to the UR domain, Sophos will put the computer into pre- boot authentication mode before Windows will boot. Follow the steps below to remove pre- boot authentication. There are different steps for different OS versions. For Windows systems that are bound to the UR domain, the domain account will lock at 15 attempts and the account will need to be unlocked in Active Directory or the user must wait 30 minutes for the account to automatically unlock. Windows 7 Professional System will be in a pre- boot state. In order to unlock a machine that has exceeded the maximum number of logins, follow the steps below. 1. A HEAT ticket should be created following and include the following information: Name of the department IT staff member who owns the system Username of the account Name of the computer Assignment to category 2 specified as Security Call typed specified as Full Disk Encryption Specific details regarding the issue 2. A Security staff member will contact the user to walk them through the pre- boot process. 3. A challenge code will be presented in which the Security officer will provide the response code which will allow the system to boot to Windows. Windows 7 Enterprise/Ultimate, Windows 8, or Windows 8.1 BitLocker Recovery 1. In pre- boot authentication on the computer hit the escape key to get to BitLocker recovery 2. When the pre- boot authentication screen prompt you for a recovery key, a HEAT ticket should be created and include the following information: Name of the department IT staff member requesting the recovery Username of the account Name of the computer Assignment to category 2 specified as Security Call typed specified as Full Disk Encryption Specific details regarding the issue 3. When a security member receives the ticket, they will contact the user and give them the recovery key. 4. On the pre- boot authentication screen, the user will enter the recovery key and then the system will boot to Windows. 3

4 2.0 Decrypting the Hard Drive/Uninstall Sophos In the event that you need to decrypt the hard drive, the following procedure can be followed. 1. A HEAT ticket should be created and include the following information: Name of the department IT staff member requesting the recovery Username of the account Name of the computer Assignment to category 2 specified as Security Call typed specified as Full Disk Encryption Specific details regarding the issue 2. When the security staff contacts you, log into the system with an account that has administrative privileges on that machine. 3. Right- click the Sophos SafeGuard icon on the taskbar, click on Synchronize and restart the computer. 4. After the computer restarts, right- click the Sophos SafeGuard icon in the taskbar and select Status. Ensure there are no packets waiting for transmission. 5. For this part there are different steps depending on the OS version you re using Windows 7 Professional: 1. Go to the start menu on the lower right hand corner 2. From the menu click on Computers 3. Right click on the drive that should be decrypted 4. Choose Encryption Decryption from the context menu. Windows 7 Enterprise, Windows 8, or Windows 8.1: 1. Go to the start menu 2. Search for BitLocker and click on manage bitlocker 3. Go to BitLocker and turn it off; when prompted for decryption, click on decrypt drive 6. After the decryption is finish go to programs and features 7. Uninstall Sophos SafeGuard Preinstall first, then Sophos SafeGuard Client Configuration, and then Sophos SafeGuard Client in order to completely uninstall Sophos 4

5 3.0 Device Recovery UR Sophos SGN for Windows Support Guide Under certain circumstances, Microsoft Windows may fail to boot up. The reason for this can be an incompatibility with software on the system, a dying a hard drive, or a virus infection. In such a situation, authentication to the hard drive in general is possible. The available disaster recovery options vary depending on the Full Disk Encryption and platform, which was chosen Recovery Options Win 7 Pro Win 7 Enterprise Windows 8 Windows 8.1 WinPE Yes No No No Slaving of encrypted drive Yes Yes Yes Yes Challenge/Response Yes Yes Yes Yes BitLocker recovery that requires BitLocker recovery key No Yes Yes Yes SafeGuard Enterprise offers different ways of accessing and recovering data depending on the situation: A. Recovering Data by slaving Hard Drives Due to the fact that SafeGuard Enterprise has flexible key management, it is possible to assign the key that was used to encrypt the drive to a different user and attach the hard drive with an external USB connector to a machine that should have access to the data e.g. the Administrator PC. Slaving a drive that is encrypted is done like this: 1. Take the drive that should be accessed out of the affected system and plug it into an USB hard drive converter. 2. Attach the USB converter to a machine that has SafeGuard Enterprise installed. 3. Under My Computer the drive will be displayed with a red key icon which indicates that the drive is encrypted but the key is not available. 4. In order to check which key was used right click on the drive and select Properties. Open the Encryption tab. Within this tab the Unique Key ID will be displayed. 5

6 5. Should the key not be displayed, perform steps a- d below; otherwise, proceed with step 6: a. Browse to Tools folder in the installation source of SafeGuard Enterprise b. Copy the complete folder KeyRecovery and Restore to the local machine that should gain access to the drive c. Open the folder and start RecoverKeys.exe d. All connected drives will show up. The key ID of the attached drive is displayed and can now be searched in the Management Center 8. A HEAT ticket should be created and include the following information: Name of the department IT staff member requesting the recovery Username of the account Name of the computer Assignment to category 2 specified as Security Call typed specified as Full Disk Encryption Specific details regarding the issue 6

7 9. Logon to Windows with the user to whom the key was assigned. It might require an additional reboot until access to the drive is possible. 10. Attach the USB connector to the machine. The drive will be recognized as an external media. Access is now available just as to a normal hard drive. B. Recovering/Restoring a Client with broken MBR (Master Boot Record) using WinPE Problems with the MBR can be resolved using the SafeGuard Enterprise recovery tool BE_RESTORE.exe. This tool is a Win32 application and must run under Windows - not under DOS. A faulty MBR loader will mean an unbootable system and can have effects like shown in the following pictures: The MRB can be restore in two ways using the pre available WinPE disk with integrated SafeGuard Enterprise drivers. Restoring MBR with an existing MBR Repairing the MBR without 7

8 Creating a bootable device for a WinPE image In order to restore the MBR it is required to boot the system using the correct WinPE ISO with the correct driver version of SafeGuard. Go to <<directory path here>> to get the ISO image, when the image is available there are different ways to boot it up: Burn the ISO file to a CD Use a third- party software to create a bootable USB with the ISO Restoring MBR with an existing MBR Backup A HEAT ticket should be created and include the following information: Name of the department IT staff member requesting the recovery Username of the account Name of the computer Assignment to category 2 specified as Security Call typed specified as Full Disk Encryption Specific details regarding the issue When the security staff receives the ticket, they will export the backup on to a USB stick. After receiving the USB boot up a WinPE image with the USB attach. As soon as the image is loaded select Be_restore in the AC43 file browser. Now select the option to repair the MBR and load the backup file from the USB stick. As soon as the process is completed, restart the machine and check if booting is possible now. Repairing the MBR without Backup Even when there is no MBR backup file available locally, BE_Restore.exe can repair a damaged MBR loader. The BE_Restore.exe repair option locates the SafeGuard Enterprise kernel on the hard disk, uses its address, and re- creates the MBR loader. This is highly advantageous, especially as there is no need for a computer specific MBR backup file locally. However, this will take longer because BE_Restore.exe has to carry out a time consuming search for the SafeGuard Enterprise kernel on the hard disk. To use the repair function in Be_Restore, follow the Restoring the MBR using WinPE process described above, but this time select Repair MBR instead of Restore MBR. Be_Restore will then search the SGN kernel on the hard disk. 8

9 If more than one kernel is found when using the BE_Restore.exe repair option MBR with the most recent time stamp is restored. 9

10 C. Retrieving data using Virtual Client SafeGuard products offer the possibility to recover data in case a machine is unbootable. This means that the POA does not start any more or access to the system is not possible for some reason. In such a case, it is possible to recover data using an external boot media such as a WinPE CD. Since the drive is encrypted, it is required to use a WinPE CD with the correct driver version of SafeGuard Enterprise. In order to complete, the next sections please create a WinPE CD based on the SafeGuard product version in use. A HEAT ticket should be created and include the following information: Name of the department IT staff member requesting the recovery Username of the account Name of the computer Assignment to category 2 specified as Security Call typed specified as Full Disk Encryption Specific details regarding the issue When a security staff sees the ticket, they will create a virtual client and export a file call recoverytoken.tok to a removable media. Booting the system using the WinPE disk Make sure that the boot sequence in the BIOS- settings allows booting from a CD or USB flash drive. After that put the CD or USB flash drive in to the computer and start the system. The bootable WinPE disk will load without any user interaction and an integrated file manager comes up once the load is completed. At a glance, you can see the mounted volumes and CD/DVD drives. In this example when selecting the encrypted Volume D: no files and folders are displayed. 10

11 UR Sophos SGN for Windows Support Guide In the virtual environment, ensure that the USB flash drive with the recoverytoken.tok file stored on it has been mounted correctly during startup. In this example, the USB flash drive was mounted to the drive F: University of Rochester 11

12 Browse to the Removable Media and select the recoverytoken.tok file. Next step is to copy this file to the SGN- Tools folder on the WinPE which shows up as volume X:\ (Boot). Using the implemented file manager, there are several ways to copy the recoverytoken.tok file from the USB flash drive to the drive X: into the folder X:\Tools\SGN- Tools, where the RecoverKeys.exe is located. You can copy the file recoverytoken.tok e.g. by drag and drop (see the picture above) copy and paste using the menu option Edit - Copy to Folder. Once the file is copied, open the KeyRecovery Tool with a single click on the KeyRecovery symbol. You can find this at the bottom of the File Manager in the section Quick Launch. 12

13 The KeyRecovery tool starts and displays the Key ID of each encrypted Drive This Key ID will be utilized later. Therefore, write down the first five characters of the ID. Select Import By C/R This will generate a challenge code. 13

14 Provide the challenge code to the University IT Security & Policy staff member. After the University IT Security & Policy staff member provides the response code, enter the code into the KeyRecovery tool. 14

15 Once the process has been completed successfully select the read enabled volume (in this case D:\) in the file manager window. Once the C/R is done all files and folders of drive D:\ are visible in the file manager. Drive D: is read enabled now and access to the data stored on this partition is reconstituted. 15

16 4.0 Windows 8/8.1 MBR recovery For any machine running BitLocker as its encryption, WinPE will not be able to recover the MBR. In order to recover the data Windows recovery is required. Follow these steps in order to recover MBR and be able to boot up: 1. Disable secure boot in BIOS (If enabled) 2. Request recovery key from Security and Policy 3. Boot using Windows 8/8.1 install medium 4. Use recovery key to unlock the drive 5. Try to use automatic repair, if that doesn t work use the advanced options with command prompt. Basically here we are renaming the BCD and then rebuilding it. diskpart list disk select disk 1 list volume select volume 4 (This is our FAT32 partition) assign letter b: exit cd /d b:\efi\microsoft\boot bootrec /fixboot ren BCD BCD.bak bootrec /fixmbr bootrec /fixboot bootrec /rebuildbcd If this fails, run: bcdboot c:\windows\system32 /s b: /l en- us /f ALL 6. Once fixed reboot machine this time try to boot the OS. Note: If your machine doesn t have a pre- boot pin you should be all set, if you do continue with the following: 7. Your current pin will not work and you will be forced to use the recovery key to get to the OS. 8. Once the OS is booted, log in. 9. Wait for Sophos to synchronize with the server, you should then see a popup from Sophos Safeguard asking for you to change you Pin, make sure the Windows installation media has been removed from the machine. 10. Once Pin has been changed, reboot the machine. 11. Verify new Pin works. 12. Log into Windows. 13. If secure boot was enabled previously reboot the machine and enable the setting again. 16

17 5.0 Reinstall UR Sophos SGN for Windows Support Guide In the event that a problem persists on the machine, a complete reinstall may be required to fix the issue. If a reinstall is required, follow these steps below in order to have a fresh install. 1. A HEAT ticket should be created and include the following information: Name of the department IT staff member requesting the reinstall Username of the account Name of the computer Assignment to category 2 specified as Security Call typed specified as Full Disk Encryption Specific details regarding the issue 2. After a Security staff contacts you and adds your machine to the Decrypt and Uninstall policy, log on to the client with an administrative account, synchronized the machine using the Sophos icon the bottom right corner. 3. Go to Control Panel > Bitlocker drive encryption and Turn off BitLocker 4. Once bitlocker had finished decrypting, go to programs and features and from there you should see three Sophos programs install. 5. Uninstall Sophos SafeGuard Preinstall first, then Sophos SafeGuard Client Configuration, and then Sophos SafeGuard Client in order to completely uninstall Sophos. 6. Reboot and then run checkdisk to do this, open Windows Explorer, right- click on the C: drive and select Properties. Click the Tools tab and then click Check Now under the Error checking area. Click on the Start button. 7. Have the security staff remove your machine from the decrypt and uninstall policy 8. On the client, go to Start > All Programs > Accessories > Run 17

18 9. Type tpm.msc, and then press Enter 10. A TPM console should appear, Click on Clear TPM 11. Install Sophos (Link to the Sophos install guide) 12. Make sure the device Synchronizes, it may reboot, and start encrypting. 18

Sophos Disk Encryption Tools guide. Product version: 5.61 Document date: June 2012

Sophos Disk Encryption Tools guide. Product version: 5.61 Document date: June 2012 Sophos Disk Encryption Tools guide Product version: 5.61 Document date: June 2012 Contents 1 About this guide...3 2 Download the encryption tools...4 3 Displaying the system status with SGNState...5 4

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

SafeGuard Enterprise Tools guide

SafeGuard Enterprise Tools guide SafeGuard Enterprise Tools guide Product version: 5.60 Document date: April 2011 Contents 1 About this guide...3 2 Displaying the system status with SGNState...3 3 Reverting an unsuccessful installation

More information

SafeGuard Enterprise Tools guide. Product version: 6.1

SafeGuard Enterprise Tools guide. Product version: 6.1 SafeGuard Enterprise Tools guide Product version: 6.1 Document date: February 2014 Contents 1 About this guide...3 2 Displaying the system status with SGNState...4 3 Reverting an unsuccessful installation

More information

How to enable Disk Encryption on a laptop

How to enable Disk Encryption on a laptop How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data

More information

SafeGuard Easy startup guide. Product version: 7

SafeGuard Easy startup guide. Product version: 7 SafeGuard Easy startup guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 About Sophos SafeGuard (SafeGuard Easy)...4 2.1 About Sophos SafeGuard (SafeGuard Easy) 7.0...6

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

Install Sophos SafeGuard Native Device Encryption on Mac OS X 10.8-10.10

Install Sophos SafeGuard Native Device Encryption on Mac OS X 10.8-10.10 Sophos SafeGuard Native Device Encryption is a management tool that is used to manage the recovery key and report on the status of Apple s FileVault 2 encryption. As the underlying technology is FileVault

More information

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3

More information

Understanding Backup and Recovery Methods. Lesson 8

Understanding Backup and Recovery Methods. Lesson 8 Understanding Backup and Recovery Methods Lesson 8 Objectives Objective Domain Matrix Technology Skill Objective Domain Description Objective Domain Number Understanding Local, Online, and Automated Understanding

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012 Sophos Disk Encryption License migration guide Product version: 5.61 Document date: June 2012 Contents 1 About this guide...3 2 Add encryption to an existing Sophos security solution...5 3 SDE/SGE 4.x

More information

HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7

HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7 HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7 September 15, 2009 Introduction HP is committed to supporting our customer s operating

More information

DriveClone Server. Users Manual

DriveClone Server. Users Manual DriveClone Server Users Manual Contents Chapter 1: Introduction... 3 Chapter 2: Install and uninstall DriveClone Server... 3 2.1 System Requirement... 3 2.2 Installing DriveClone Server... 4 2.3 Uninstalling

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

The safer, easier way to help you pass any IT exams. Exam : 70-688. Managing and Maintaining Windows 8. Title : 1 / 19

The safer, easier way to help you pass any IT exams. Exam : 70-688. Managing and Maintaining Windows 8. Title : 1 / 19 Exam : 70-688 Title : Managing and Maintaining Windows 8 Version : Demo 1 / 19 1.DRAG DROP Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and do not

More information

Passport installation Windows 8 + Firefox

Passport installation Windows 8 + Firefox Passport installation Windows 8 + Firefox OS Version Windows 8 System Type 32-bit and 64-bit Browser name & version Firefox 23 Before you begin Check you have Anti Virus software installed on your computer

More information

SafeGuard Enterprise upgrade guide. Product version: 7

SafeGuard Enterprise upgrade guide. Product version: 7 SafeGuard Enterprise upgrade guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6 4.1

More information

Below are the instructions for downloading the Dartfish Software Files from the website:

Below are the instructions for downloading the Dartfish Software Files from the website: Below are the instructions for downloading the Dartfish Software Files from the website: 1. TO ACCESS THE FILES TO DOWNLOAD - Using the computer that you wish to install the Dartfish software on, connect

More information

NTLDR is missing. Below are the full error messages that may be seen when the computer is booting.

NTLDR is missing. Below are the full error messages that may be seen when the computer is booting. NTLDR is missing Issue NTLDR is Missing. Related errors Below are the full error messages that may be seen when the computer is booting. NTLDR is Missing Press any key to restart Boot: Couldn't find NTLDR

More information

Windows BitLocker Drive Encryption Step-by-Step Guide

Windows BitLocker Drive Encryption Step-by-Step Guide Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft

More information

In order to enable BitLocker, your hard drive must be partitioned in a particular manner.

In order to enable BitLocker, your hard drive must be partitioned in a particular manner. ENABLE BITLOCKER ON WINDOWS VISTA - WITHOUT A TPM Requirements: You must be running Vista Enterprise or Vista Ultimate to enable BitLocker. Any other version of Vista is not compatible. It is recommended

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do

More information

UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0

UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0 UltraBac Documentation UBDR Gold Bare Metal Disaster Recovery Administrator Guide UBDR Gold v8.0 UBDR Administrator Guide UBDR Gold v8.0 The software described in this guide is furnished under a license

More information

KON-BOOT For Windows Guide http://thelead82.com http://www.kon-boot.com

KON-BOOT For Windows Guide http://thelead82.com http://www.kon-boot.com KON-BOOT For Windows Guide http://thelead82.com http://www.kon-boot.com General notes PLEASE KEEP YOUR ANTIVIRUS DISABLED WHILE EXTRACTING / BURNING / INSTALLING KON-BOOT Table of contents General notes...

More information

Encrypting with BitLocker for disk volumes under Windows 7

Encrypting with BitLocker for disk volumes under Windows 7 Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1

More information

Full Disk Encryption Pre-Boot Authentication Reference

Full Disk Encryption Pre-Boot Authentication Reference www.novell.com/documentation Full Disk Encryption Pre-Boot Authentication Reference ZENworks 11 Support Pack 4 Beta April 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect

More information

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process. Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they

More information

Sophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac quick startup guide Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 2 Working with SafeGuard

More information

Type Message Description Probable Cause Suggested Action. Fan in the system is not functioning or room temperature

Type Message Description Probable Cause Suggested Action. Fan in the system is not functioning or room temperature Table of Content Error Messages List... 2 Troubleshooting the Storage System... 3 I can t access the Manager... 3 I forgot the password for logging in to the Manager... 3 The users can t access the shared

More information

Human Resources Installation Guide

Human Resources Installation Guide Human Resources Installation Guide Installing HR i Index Copyright 2001 Jenzabar, Inc. You may print any part or the whole of this documentation to support installations of Jenzabar software. Where the

More information

HP RDX Continuous Data Protection Software Quickstart Guide

HP RDX Continuous Data Protection Software Quickstart Guide HP RDX Continuous Data Protection Software Quickstart Guide *5697-3351* HP Part Number: 5697-3351 Published: May 2014 Edition: Fourth Copyright 2008 2014 Hewlett-Packard Development Company, L.P. Microsoft,

More information

How to Make a USB Bootable

How to Make a USB Bootable /0/0 Ways to Make a USB Bootable - wiki How to Make a USB Bootable Five Methods: Ad Making a USB Drive to Install Any PC Operating System Making a Windows Vista or 7 Install Drive Creating a USB PC Repair

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 / 2012 R2 Hyper-V support...

More information

Using BitLocker to encrypt a Windows 8 device

Using BitLocker to encrypt a Windows 8 device Using BitLocker to encrypt a Windows 8 device 1. Before BitLocker can be used to encrypt the portable device, the Trusted Platform Module must be turned on via the BIOS. Boot the device and press F2, F10,

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12 USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...

More information

McAfee Endpoint Encryption for PC 6.2

McAfee Endpoint Encryption for PC 6.2 EETech User Guide McAfee Endpoint Encryption for PC 6.2 For use with epolicy Orchestrator 4.5, 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Motion Computing Tablet PC

Motion Computing Tablet PC Motion Computing Tablet PC TRUSTED PLATFORM MODULE (TPM) ACTIVATION User Guide Trusted Platform Module Activation With the Infineon Security Platform Tools and the built-in Trusted Computing Group compliant

More information

Full Disk Encryption Agent Reference

Full Disk Encryption Agent Reference www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Passport Installation. Windows XP + Internet Explorer 8

Passport Installation. Windows XP + Internet Explorer 8 Passport Installation Windows XP + Internet Explorer 8 OS Version Windows XP System Type 32bit or 64bit Browser & version Internet Explorer 8 Before you begin.. Make sure you have Anti Virus software installed

More information

SecureDoc for Mac v6.1. User Manual

SecureDoc for Mac v6.1. User Manual SecureDoc for Mac v6.1 User Manual Copyright 1997-2012 by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada and

More information

McAfee Endpoint Encryption 7.0 Users Guide and FAQ

McAfee Endpoint Encryption 7.0 Users Guide and FAQ McAfee Endpoint Encryption 7.0 Users Guide and FAQ Table of Contents Introduction... 1 Installation... 1 Boot-Up/Login... 1 Encryption Status... 3 Notes for Encryption... 4 Changing Your Password... 4

More information

Quick Start Guide. Version R91. English

Quick Start Guide. Version R91. English Using StorageCraft Recovery Environment Quick Start Guide Version R91 English May 20, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s

More information

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption

More information

SafeGuard Easy upgrade guide. Product version: 7

SafeGuard Easy upgrade guide. Product version: 7 SafeGuard Easy upgrade guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6 4.1 Upgrade

More information

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved. Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before

More information

Activation Key usage and Windows 7 Professional installation guide

Activation Key usage and Windows 7 Professional installation guide Activation Key usage and Windows 7 Professional installation guide Please start from page 8 when you already have an unactivated Windows 7 Professional. Otherwise please start from the beginning of the

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note Recovering Encrypted Disks Using Windows Preinstallation Environment Technical Note Preface Documentation version Documentation version: 11.0, Release Date: Legal Notice Copyright Symantec Corporation.

More information

Scan to PC Desktop: Image Retriever 5.2 for Xerox WorkCentre C2424

Scan to PC Desktop: Image Retriever 5.2 for Xerox WorkCentre C2424 Scan to PC Desktop: Image Retriever 5.2 for Xerox WorkCentre C2424 Scan to PC Desktop includes Image Retriever, which is designed to monitor a specified folder on a networked file server or local drive

More information

TOSHIBA GA-1310. Printing from Windows

TOSHIBA GA-1310. Printing from Windows TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS

More information

PC Angel. Recovery. Page 1

PC Angel. Recovery. Page 1 PC Angel Recovery Page 1 Table of Contents Introduction... 3 What is the purpose of PC Angel Recovery?... 3 What can you find in this manual?... 4 What should I do to get back my system?... 5 What should

More information

Microsoft Windows 7 Ultimate 64 Bit SP1 Operating System Recovery Media for 300 GB Solid State Drives Instructions

Microsoft Windows 7 Ultimate 64 Bit SP1 Operating System Recovery Media for 300 GB Solid State Drives Instructions xx ZZZ Microsoft Windows 7 Ultimate 64 Bit SP1 Operating System Recovery Media for 300 GB Solid State Drives Instructions *P071303400* 071-3034-00 Copyright Tektronix. All rights reserved. Licensed software

More information

Carry it Easy. User Guide

Carry it Easy. User Guide Carry it Easy User Guide User Manual Version 3.2 2004-2010 CoSoSys Ltd. Carry it Easy User Manual Table of Contents Table of Contents... I 1. Introduction... 1 2. System Requirements... 1 3. Installation...

More information

Windows 7. Tips and Tricks. Scott Sekinger

Windows 7. Tips and Tricks. Scott Sekinger Windows 7 Tips and Tricks By Scott Sekinger This article includes helpful Windows 7 tips and tricks. The topics discussed are: 1. Windows keyboard shortcuts 2. how to create a System Repair disk 3. how

More information

YubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015

YubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015 YubiKey OSX Login Via Yubico-PAM Challenge-Response Version 1.6 October 24, 2015 YubiKey OSX Login 2015 Yubico. All rights reserved. Page 1 of 18 About Yubico Disclaimer As the inventors of the YubiKey,

More information

Troubleshooting Guide

Troubleshooting Guide How to remove Windows XP Service Pack 2 from your computer Company web site: Support email: support@ Support telephone: +44 20 3287-7651 +1 646 233-1163 2 Some of the EMCO Products don't work properly

More information

SafeGuard Enterprise 5.50 Installation

SafeGuard Enterprise 5.50 Installation SafeGuard Enterprise 5.50 Installation Document date: November 2010 Contents 1 SafeGuard Enterprise Overview... 3 2 SafeGuard Enterprise components... 4 3 Preparing for installation... 6 4 Setting up SafeGuard

More information

Using the Xenium-OS V2.0

Using the Xenium-OS V2.0 Xenium-OS V2.0 Using the Xenium-OS V2.0 Navigating the Xenium-OS Xenium-OS Main Menu Xenium-OS Launch Menu Disk Tools EEprom Tools Xenium-OS Settings Menu Using a USB Pendrive Installers Menu Navigating

More information

Reborn Card NET. User s Manual

Reborn Card NET. User s Manual Reborn Card NET User s Manual Table of Contents Notice Before Installation:... 2 System Requirements... 3 1. First Installation... 4 2. Hardware Setup... 4 3. Express Installation... 6 4. How to setup

More information

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not

More information

Ocster Backup - Rescue System

Ocster Backup - Rescue System Overview Ocster Backup - Rescue System The software allows you to create a rescue CD, DVD or USB-Stick. This rescue system is intended for two kinds of situations: 1. To restore a backup to your main hard

More information

Maxtor OneTouch User's Guide

Maxtor OneTouch User's Guide EXTERNAL HARD DRIVE Maxtor OneTouch User's Guide TM II P/N:20259600 i Contents 1 Introduction................................................. 1 Maxtor OneTouch II Drive Components............................

More information

Driver Updater Manual

Driver Updater Manual Driver Updater Manual Keep your drivers up-to-date! Improve your system performance and stability by keeping your drivers updated. Automatically find, update and fix the drivers on your computer and turn

More information

Acronis Backup & Recovery 10 Advanced Server SBS Edition. Installation Guide

Acronis Backup & Recovery 10 Advanced Server SBS Edition. Installation Guide Acronis Backup & Recovery 10 Advanced Server SBS Edition Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1.

More information

Sophos SafeGuard Disk Encryption for Mac Startup guide

Sophos SafeGuard Disk Encryption for Mac Startup guide Startup guide Document date: January 2011 Content 1 Before you begin... 2 2 Protecting Mac OS X computers... 3 3 Technical support... 4 4 Copyright... 5 1 1 Before you begin 1.1 System requirements Hardware

More information

System Area Manager. Remote Management

System Area Manager. Remote Management System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for

More information

The Carbonite Appliance HT10 User Guide

The Carbonite Appliance HT10 User Guide The Carbonite Appliance HT10 User Guide Keep business moving with the Carbonite Appliance HT10. The hybrid data solution that s just right for your clients. For assistance, reach the Carbonite Support

More information

USB Bare Metal Restore: Getting Started

USB Bare Metal Restore: Getting Started USB Bare Metal Restore: Getting Started Prerequisites Requirements for the target hardware: Must be able to boot from USB Must be on the same network as the Datto device Must be 64 bit hardware Any OSs

More information

SSD Firmware Update Utility Guide

SSD Firmware Update Utility Guide SSD Firmware Update Utility Guide Crucial m4 2.5 SSD Firmware Revision 070H Firmware Update Guide for Windows 8 (Update from Rev 0001, 0002, 0009, 0309, 000F, 010G, 040H to Rev 070H) Introduction This

More information

User Guide Software Version 2.1.0

User Guide Software Version 2.1.0 Intel Solid State Drive Firmware Update Tool User Guide Software Version 2.1.0 Order Number: 322570-007US Intel disclaims all express and implied warranties, including without limitation, the implied warranties

More information

Table of Contents. Rebit 5 Help

Table of Contents. Rebit 5 Help Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...

More information

Intelligent disaster recovery. Dell DL backup to Disk Appliance powered by Symantec

Intelligent disaster recovery. Dell DL backup to Disk Appliance powered by Symantec Intelligent disaster recovery Dell DL backup to Disk Appliance powered by Symantec The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry s only fully integrated

More information

BounceBack User Guide

BounceBack User Guide Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:

More information

Acer erecovery Management

Acer erecovery Management 1 Acer erecovery Management Developed by Acer's software team, Acer erecovery Management is a tool that provides you with an easy, reliable and safe means of restoring your computer to its factory default

More information

NTI Backup Now EZ v2 User s Guide

NTI Backup Now EZ v2 User s Guide NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced

More information

Introduction 1-1 Installing FAS 500 Asset Accounting the First Time 2-1 Installing FAS 500 Asset Accounting: Upgrading from a Prior Version 3-1

Introduction 1-1 Installing FAS 500 Asset Accounting the First Time 2-1 Installing FAS 500 Asset Accounting: Upgrading from a Prior Version 3-1 Contents 1. Introduction 1-1 Supported Operating Environments................ 1-1 System Requirements............................. 1-2 Security Requirements........................ 1-3 Installing Server

More information

Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish.

Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish. Backup. If your computer refuses to boot or load Windows or if you are trying to restore an image to a partition the Reflect cannot lock (See here), and then you will have to start your PC using a rescue

More information

Software License Registration Guide

Software License Registration Guide Software License Registration Guide When you have purchased new software Chapter 2 Authenticating a License When you would like to use the software on a different PC Chapter 3 Transferring a License to

More information

Using the IPMI interface

Using the IPMI interface Using the IPMI interface The T800, T1600 and T3200 server models are equipped with an IPMI interface with KVM / IP functionality. This enables you to access the server console if it becomes inaccessible

More information

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012 Administering FileVault 2 on OS X Lion with the Casper Suite Technical Paper July 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that

More information

DriveClone 10. Users Manual

DriveClone 10. Users Manual DriveClone 10 Users Manual Contents Chapter 1: Introduction... 3 Chapter 2: Install and uninstall DriveClone... 3 2.1 System Requirement... 3 2.2 Installing DriveClone... 4 2.3 Uninstalling DriveClone...

More information

Changing Your Cameleon Server IP

Changing Your Cameleon Server IP 1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may

More information

Utimaco SafeGuard Easy Installation Instructions for Notre Dame installer v2.5

Utimaco SafeGuard Easy Installation Instructions for Notre Dame installer v2.5 Utimaco SafeGuard Easy Installation Instructions for Notre Dame installer v2.5 The information below explains how to install Utimaco SafeGuard Easy hard drive encryption on a Windows machine. IBM/Lenovo

More information

Image Backup and Recovery Procedures

Image Backup and Recovery Procedures Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you

More information

PigCHAMP Knowledge Software. Enterprise Edition Installation Guide

PigCHAMP Knowledge Software. Enterprise Edition Installation Guide PigCHAMP Knowledge Software Enterprise Edition Installation Guide Enterprise Edition Installation Guide MARCH 2012 EDITION PigCHAMP Knowledge Software 1531 Airport Rd Suite 101 Ames, IA 50010 Phone (515)

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

How to Install Microsoft Windows Server 2008 R2 in VMware ESXi

How to Install Microsoft Windows Server 2008 R2 in VMware ESXi How to Install Microsoft Windows Server 2008 R2 in VMware ESXi I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support

More information

Computer Backup Issues For Windows 8

Computer Backup Issues For Windows 8 Computer Backup Issues For Windows 8 Backup Basic information backup Copy your personal information from the hard drive to another media / location CD (700 MB) DVD (4.7 GB) Flash drive (16 GB ± $10) External

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide

Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide White Paper Descriptor This document provides administrators with information and steps-by-step technique for deploying Microsoft Diagnostics

More information

WINDOWS SERVER 2008 OFFLINE SYSTEM RECOVERY USING WINDOWS SERVER BACKUP WITH NETWORKER

WINDOWS SERVER 2008 OFFLINE SYSTEM RECOVERY USING WINDOWS SERVER BACKUP WITH NETWORKER TECHNICAL NOTES WINDOWS SERVER 2008 OFFLINE SYSTEM RECOVERY USING WINDOWS SERVER BACKUP WITH NETWORKER NETWORKER RELEASE 7.4 SERVICE PACK 2 AND LATER TECHNICAL NOTE P/N 300-010-339 REV A02 Table of Contents

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 EETech User Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal

More information

Dual-boot Windows 10 alongside Windows 8

Dual-boot Windows 10 alongside Windows 8 Most of the people are very much interested to install the newly launched Operating System Windows 10 on their devices. But, it is not recommended to directly use Windows 10 as the primary OS because it

More information