Office of Information Technologies (OIT)
|
|
- Ariel Mathews
- 8 years ago
- Views:
Transcription
1 Office of Information Technologies (OIT) Encrypting File System (EFS) November 14th, 2007
2 Contents Introduction... 1 Benefits... 1 How it works... 1 Enabling EFS... 2 Step 1: Obtain an EFS key pair... 2 OPTION 1: Auto Enrollment... 2 OPTION 2: Web Enrollment (not supported on Vista)... 2 OPTION 3: Local Key Pair... 2 Step 2: Verification of Key Pair... 2 Step 3: Encrypting Files/Folders... 3 Sharing Encrypted Files... 4 Sharing Encrypted Files on the Same Computer... 4 Sharing Encrypted Files over the Network... 4 Copying EFS Keys to another Computer... 5 Step 1: Export the Existing EFS Key Pair... 5 Step 2: Import the EFS key pair on the destination computer... 6 Recovering Encrypted Files... 7 OPTION 1: Key Recovery... 7 OPTION 2: Data Recovery Agent (DRA)... 7
3 Introduction This document is meant to aid campus IT administrators in understanding the Encrypting File System (EFS) on Microsoft Windows and how it is implemented at PSU. All of the procedures necessary to get started with EFS are provided in the sections that follow. Benefits EFS is a great way to help protect sensitive information stored on your Windows based desktop or laptop computer. It is especially useful in the event of lost or stolen equipment. Without EFS, if a computer s hard drive is removed from the original system, the data can be easily extracted using another machine. If EFS is properly configured then the data will be much more difficult to obtain. How it works In Windows XP Service Pack 1 (SP1) and later, EFS utilizes the Advanced Encryption Standard (AES) algorithm with a 256-bit key to encrypt data. When a file is designated for encryption, EFS uses what s referred to as the file encryption key (FEK) to encrypt the data. The FEK is then encrypted using at least two RSA key pairs. One of these RSA key pairs is used by the user for normal encryption/decryption of the data. The other RSA key pair is used by the data recovery agent (DRA). The DRA key pair is used by administrators to recover encrypted information when the user s key pair has been lost or damaged. There can be several user and DRA key pairs associated with a single file. Note: The DRA is only available as a recovery option for PSU domain attached workstations. For more information on EFS see the following article: Encrypting File System Page 1
4 Enabling EFS Follow the steps outlined below to use EFS on a PSU domain attached workstation. Step 1: Obtain an EFS key pair There are several ways a user s EFS key pair can be created for workstations joined to the PSU domain. The first two options described below will generate EFS key pairs through PSU s public key infrastructure (PKI). These options are preferred and have several advantages. First, should your key pair become lost or damaged you can request a copy from OIT. This is the easiest way to recover encrypted files if the user s key pair is unavailable. Second, options one and two make it easier to share encrypted files with others. OPTION 1: Auto Enrollment This is the easiest way to get an EFS key pair and requires that the user be added to the OIT_EFSwithKeyArchive_AutoEnroll_LG Active Directory security group. The next time members of this group logon to their domain attached workstation (Windows 2000 and above) they will automatically receive an EFS key pair. NOTE: Be sure the user does not logon to another domain attached workstation before they ve received their EFS key pair or it may be installed on the wrong machine. Users can only auto-enroll for an EFS key pair once. OPTION 2: Web Enrollment (not supported on Vista) 1. Open Internet Explorer on Windows 2000 or XP (Vista is not currently supported) and go to 2. IMPORTANT: Be sure to logon as the end user who will be using EFS 3. Click the Request a certificate link 4. Click the Create and submit a request to this CA link 5. Choose the Certificate Template PSU EFS with Key Archive 6. Enter your full name in the Friendly Name field 7. Click submit 8. Click OK on the warning 9. Click on the link to Install this certificate 10. Click Yes to install the certificate OPTION 3: Local Key Pair To use a local key pair for EFS skip to Step 3 and it will be generated automatically the first time a file or folder is encrypted. NOTE: This option doesn t require as many steps, but offers fewer recovery options. If the key pair is lost or corrupted it cannot be recovered, and each encrypted file/folder must be located and then decrypted using the EFS data recovery agent (DRA). Additionally, sharing encrypted files with others is more difficult. Step 2: Verification of Key Pair 1. If you used OPTION 1 in Step 1 above to auto enroll a certificate then you will need to wait up to eight hours or logoff/logon the machine for auto enrollment to take place. You may need to wait a few minutes after the logoff/logon for auto enrollment to complete. 2. Open the certificate manager a. Click Start b. Click Run c. Type certmgr.msc d. Click OK 3. You should see your new certificate in two containers: a. Personal\Certificates b. Active Directory User Object\Certificates Encrypting File System Page 2
5 Step 3: Encrypting Files/Folders In this step you need to pick the files and folders to encrypt with EFS. Any important data that is stored locally on the desktop or laptop computer should be protected. Below is a list of common folders that may contain sensitive data: %userprofile%\my Documents %userprofile%\desktop Mail Client o %appdata%\microsoft\outlook o %appdata%\thunderbird See the following URL for more detailed information on what should and can be encrypted using EFS: Follow these steps to enable encryption on a file or folder: 1. Right click on the file/folder and choose Properties 2. Click on the Advanced button 3. Click on the check box for Encrypt contents to secure data 4. Click on OK NOTE: A file may not retain its encryption when moved out of a folder marked for encryption. Encrypting File System Page 3
6 Sharing Encrypted Files Files and folders encrypted using EFS can be shared amongst multiple users. If the EFS key pair was generated via the PSU PKI (auto-enrollment or web enrollment) then the public key will have been automatically published to Active Directory and the process is simplified. In the case of a self generated EFS key pair, the EFS public key may need to be manually exported / imported to another machine via the certmgr.msc tool. Sharing Encrypted Files on the Same Computer 1. Choose the encrypted file that will be shared. NOTE: you can t setup EFS sharing at the folder level; each individual file must be configured. 2. Right-click the encrypted file -> Properties -> Advanced -> Details 3. Click Add and choose the user to be granted access 4. Be sure to setup NTFS file permissions as well Sharing Encrypted Files over the Network There are several important caveats to sharing encrypted files over the network. First, encrypted files cannot be shared via a CIFS/SMB network file share at PSU. Unfortunately this includes the most common method of accessing shared files via the H: and I: drives (see Second, although encrypted files can be shared using WebDAV ( it may be difficult to setup because of differences and quirkiness in the Microsoft WebDAV client. Following the steps below may or may not work depending on the version of your WebDAV client and Windows OS: 1. Connect to and locate the file to be encrypted and shared 2. Right-click on the file and chose Properties -> Advanced -> Encrypt contents to secure data -> OK -> OK 3. Right-click the encrypted file and choose Properties -> Advanced -> Details 4. Click Add and choose the user to be granted access 5. Be sure to setup NTFS file permissions as well NOTE: If you encrypt a file through and attempt to open it via a regular CIFS/SMB network file share it will not be recognized as an encrypted file. Encrypting File System Page 4
7 Copying EFS Keys to another Computer Eventually you will find yourself needing to copy a user s EFS key pair from one computer to another. This will most likely be necessary under one of three scenarios: 1. A user s system needs to be rebuild from scratch 2. A user is being migrated to a new system 3. The user has EFS protected files/folders on a network file share and needs access to them from another computer Note: If you download another key pair from instead of copying it, the user s public EFS key stored in Active Directory will not be updated. Step 1: Export the Existing EFS Key Pair 1. Click on Start -> Run -> certmgr.msc -> OK 2. Expand Personal -> Certificates 3. Right-click on the EFS certificate you wish to export and choose All tasks -> Export 4. Use the Certificate Export Wizard to export your certificate a. Click Next at the Welcome screen b. Select Yes, export the private key -> Next c. Keep the defaults and click Next on the Export File Format page d. Choose a password that will protect the export file containing the public and private keys -> Next e. Click on Browse and specify a file name/location for the export file -> Save -> Next -> Finish Encrypting File System Page 5
8 Step 2: Import the EFS key pair on the destination computer 1. Copy the PFX file from Step 1: Export the Existing EFS Key Pair to destination computer a. Double-click on the PFX file b. Click Next on the welcome screen c. Click Next on the File to Import screen d. Enter the password you used in the export process and check the box for Mark this key as exportable -> Next e. Click Next on the Certificate Store screen -> Finish 2. Verify the new key was successfully imported a. Click on Start -> Run -> certmgr.msc -> OK b. Expand Personal -> Certificates Encrypting File System Page 6
9 Recovering Encrypted Files When a user s EFS key becomes lost or damaged, there are two ways to recover the encrypted data for PSU domain attached workstations. Non-domain workstations will NOT be able to recover files encrypted with EFS using the data recovery agent (option 2). If non-domain workstations did not use to get their EFS key pair then they will have no OIT supported recovery options. OPTION 1: Key Recovery If the user s EFS key was generated through PSU s PKI (auto-enrollment or web enrollment) then OIT can recover a copy. Once the recovered EFS key is imported into the user s profile all encrypted files will be immediately accessible. OPTION 2: Data Recovery Agent (DRA) For PSU domain attached workstations the DRA can be used to recover files encrypted with a lost or damaged EFS key. In this scenario each encrypted file/folder will need to be manually decrypted using the DRA. Once all files/folders have been decrypted by the DRA they can be re-encrypted with a new EFS key pair. NOTE: Campus administrators with their own organizational unit (OU) in Active Directory may request to have an OU specific DRA assigned to their OU. This allows sub-administrators to recover encrypted files/folders without involving OIT. Encrypting File System Page 7
Software Installation Requirements
Software Installation Guide PrintIQ TM Software Installation Requirements Please use the following guide to ensure that you're meeting all requirements prior to installing the PrintIQ TM Xerox Device Agent
More informationStep-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)
Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Manual installation of agents and importing the SCOM certificate to the servers to be monitored:
More informationLotus Notes 6.x Client Installation Guide for Windows. Information Technology Services. CSULB
The goal of this document This document was created by the Information Technology Services department to assist the Lotus Notes Coordinators in the successful installation of Lotus Notes release 6 (R6)
More informationDeploying EFS: Part 1
Security Watch Deploying EFS: Part 1 John Morello By now, everyone has heard reports about personal or sensitive data being lost because of laptop theft or misplacement. Laptops go missing on a regular
More informationChapter 2 Editor s Note:
[Editor s Note: The following content was excerpted from the free ebook The Tips and Tricks Guide to Securing Windows Server 2003 (Realtimepublishers.com) written by Roberta Bragg and available at http://www.netiq.com/offers/ebooks.]
More informationUsing TLS Encryption with Microsoft Outlook 2007
Using TLS Encryption with Microsoft Outlook 2007 This guide is meant to be used with Microsoft Outlook 2007. While the instructions are similar, the menu layouts and options have changed since the previous
More informationGlobal VPN Client Getting Started Guide
Global VPN Client Getting Started Guide PROTECTION AT THE SPEED OF BUSINESS Introduction The SonicWALL Global VPN Client creates a Virtual Private Network (VPN) connection between your computer and the
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationUsing Microsoft Windows Encrypted File System (EFS)
Using Microsoft Windows Encrypted File System (EFS) Agenda Protecting our Data Types of Data What is EFS How to use EFS Best Practices Protecting our Data Two types of disk encryption: Full Disk Encryption
More informationHosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
More informationComodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
More informationSafeWord Domain Login Agent Step-by-Step Guide
SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact johan@accessdenied.be Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...
More informationUsing etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More informationEntrust Managed Services PKI
Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.
More informationOffice of Information Technologies (OIT) Network File Shares
Office of Information Technologies (OIT) Network File Shares October 13, 2008 Contents 1 Introduction... 1 1.1 Quick Overview of Microsoft s Distributed File System (DFS)... 1 1.2 Web-based Distributed
More informationDisk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
More informationYubiKey PIV Deployment Guide
YubiKey PIV Deployment Guide Best Practices and Basic Setup YubiKey 4, YubiKey 4 Nano, YubiKey NEO, YubiKey NEO-n YubiKey PIV Deployment Guide 2016 Yubico. All rights reserved. Page 1 of 27 Copyright 2016
More informationBankLink Books Clients
BankLink Books Clients This document is for those practices installing BankLink Books. The BankLink Service Agreement permits licensed BankLink practices to install the software in as many locations as
More informationDIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
More informationSolution domain. Cloud PC Backup Startingkit for users. Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail
Solution domain Cloud PC Backup Startingkit for users Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail Table of contents Table of contents... 2 1. What is Cloud PC Backup?...
More informationSetting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
More informationSteps to Enroll for a PKI Digital Certificate on Windows-7 machine
Steps to Enroll for a PKI Digital Certificate on Windows-7 machine *HRA VPN ONLY users please skip to Step # 1 and complete all instructions. PKI Certificate Enrollment for Encryption users with legacy
More informationYale Software Library
Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for
More informationXerox Multifunction Devices. Verify Device Settings via the Configuration Report
Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP
More informationSage Peachtree Installation Instructions
Sage Peachtree Installation Instructions Quick Tips for Network Install Use the following tips to help you install Sage Peachtree on a network: Always install Sage Peachtree FIRST on the computer that
More informationInstalling the VPN Client for Microsoft Windows OS
Installing the VPN Client for Microsoft Windows OS 1. Go to the VPN Information Center web site and click on the Cisco VPN Client for Microsoft Windows OS link. 2. A File Download window will appear. Click
More informationDial-up Installation for CWOPA Users (Windows Operating System)
Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions
More informationBatch Eligibility Long Term Care claims
Hewlett Packard Enterprise Provider Electronic Solutions software lets Connecticut Medical Assistance Program providers verify patient s eligibility and submit and correct claims for services all electronically.
More informationErado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling
Erado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling This document covers the following Microsoft Exchange Server Editions Microsoft Exchange Enterprise Edition 2007 Microsoft Exchange
More informationTenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
More informationGoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
More informationDeployment of Keepit for Windows
Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome
More informationSystemTools Software Inc. NTFS and Share Permissions Reporting
SystemTools Software Inc. NTFS and Share Permissions Reporting SystemTools Software s Tech Support department receives numerous requests asking about permissions reporting, so we ve decided to create this
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationDMZ Server monitoring with
DMZ Server monitoring with System Center Operations Manager DMZ server monitoring scenario: The environment where we are implementing the DMZ server monitoring contains the following components: Stand
More informationAcronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
More informationDriveLock Quick Start Guide
Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
More informationOneStop Reporting 3.7 Installation Guide. Updated: 2013-01-31
OneStop Reporting 3.7 Installation Guide Updated: 2013-01-31 Copyright OneStop Reporting AS www.onestopreporting.com Table of Contents System Requirements... 1 Obtaining the Software... 2 Obtaining Your
More informationInstallation and Configuration Guide
Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
More informationSecure IIS Web Server with SSL
Secure IIS Web Server with SSL EventTracker v7.x Publication Date: Sep 30, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is to help
More informationBackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
More informationMigrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync)
Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync) This document is intended for those users moving from WVWC s Bobcat Mail system to the new Google Apps mail system
More informationPassword Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationBackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
More informationWECCNET MESSAGING SYSTEM CLIENT DOCUMENTATION
TABLE OF CONTENTS WECCNET Messaging System Client Documentation WECCNET MESSAGING SYSTEM CLIENT DOCUMENTATION March 3 rd, 2015 SUPPORT CONTACTS... 2 CLIENT REQUIREMENTS... 2 CLIENT PRECONFIGURATION...
More information2014 Electrical Server Installation Guide
2014 Electrical Server Installation Guide TITLE: 2014 Electrical Server Installation Guide DATE: September 2013 SUBJECT: ABSTRACT: Installation guide for SolidWorks Electrical 2014 on the server Guide
More informationInstallation Guide v3.0
Installation Guide v3.0 Shepherd TimeClock 4465 W. Gandy Blvd. Suite 800 Tampa, FL 33611 Phone: 813-882-8292 Fax: 813-839-7829 http://www.shepherdtimeclock.com The information contained in this document
More information2007 Microsoft Office System Document Encryption
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
More informationMcAfee Endpoint Encryption for PC 7.0
Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationPassword Manager Windows Desktop Client
Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard
More informationNetwork Setup Instructions
Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical
More informationUSER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------
USER MANUAL v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ 1 Contents At a Glance Troubleshoot 3 About SkyCrypt 23 FAQ 4 About this manual 23 Contact support
More informationEVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State
EVault for Data Protection Manager Course 301 Server Protection with DPM File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for
More informationJune 2012 FORESTSAFE 4 ENTARIAN LIMITED. ForestSafe Service Configuration Adrian Owen and Jani Järvinen
June 2012 ENTARIAN LIMITED FORESTSAFE 4 ForestSafe Adrian Owen and Jani Järvinen Table of Contents 1 INTRODUCTON...3 2 LOCAL ADMINISTRATOR GROUP...3 2.1 STEPS...3 2.2 VERIFICATION...3 3 WINDOWS DOMAIN
More informationSophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012
Sophos Disk Encryption License migration guide Product version: 5.61 Document date: June 2012 Contents 1 About this guide...3 2 Add encryption to an existing Sophos security solution...5 3 SDE/SGE 4.x
More informationUsing Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
More informationScanShell.Net Install Guide
ScanShell.Net Install Guide Please install the software first - DO NOT PLUG IN THE SCANNER The scanner has been carefully packaged to avoid damage during transportation. Before operating the scanner, please
More informationHow To Install And Set Up The Database For Quicdoc And Office Therapy (The Applications)
Server Database Installer for QuicDoc and Office Therapy Installation Guide What you need to know before you start This Guide was written to assist you in installing and setting up the Database system
More informationTrueEdit Remote Connection Brief
MicroPress Server Configuration Guide for Remote Applications Date Issued: February 3, 2009 Document Number: 45082597 TrueEdit Remote Connection Brief Background TrueEdit Remote (TER) is actually the same
More informationAbila MIP. Installation User's Guide
This is a publication of Abila, Inc. Version 2014.x Copyright 2013 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks
More informationMicrosoft Corporation. Project Server 2010 Installation Guide
Microsoft Corporation Project Server 2010 Installation Guide Office Asia Team 11/4/2010 Table of Contents 1. Prepare the Server... 2 1.1 Install KB979917 on Windows Server... 2 1.2 Creating users and groups
More informationGlobal VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
More informationInstalling Samsung SDS CellWe EMM cloud connectors and administrator consoles
Appendix 1 Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles This section explains how you use the Cloud Management Suite installation wizard for the following purposes: To
More informationYale Software Library. PGP 9.6 for Windows
PGP 9.6 for Windows How to Add keys to the All Keys key ring: 1. Run the PGP application from Start->All Programs->PGP. 2. In the PGP main application window, click on Search for keys. 3. In the Search
More informationAbila MIP. Installation Guide
This is a publication of Abila, Inc. Version 2015.x Copyright 2014 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks
More informationLAB 1: Installing Active Directory Federation Services
LAB 1: Installing Active Directory Federation Services Contents Lab: Installing and Configuring Active Directory Federation Services... 2 Exercise 1: installing and configuring Active Directory Federation
More informationUsing Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
More informationVerbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved
Verbatim Secure Data USB Drive User Guide User Guide Version 2.0 All rights reserved Table of Contents Table of Contents... 2 1. Introduction to Verbatim Secure Data USB Drive... 3 2. System Requirements...
More informationQuick Start - Generic NAS File Archiver
Page 1 of 19 Quick Start - Generic NAS File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2:
More informationDropSend Getting Started Guide
DropSend Getting Started Guide DropSend Ltd. 2012 Step 1: How to send a file without registration If you want to quickly send a large file, you can do it from the homepage in just a couple of clicks. Here
More informationArchive Attender Version 3.5
Archive Attender Version 3.5 Getting Started Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com Page 1 Under the copyright laws, neither the documentation nor the software can be copied, photocopied,
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More informationX.509 Certificate Generator User Manual
X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on
More informationIntroduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet
Introduction Before you begin Before you begin installing efax, please check the following: You have received confirmation that your application for the efax service has been processed. The confirmation
More informationI. Configuring Digital signature certificate in Microsoft Outlook 2003:
I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to
More informationBitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011
BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011 Purpose To provide a step-by-step procedure for encrypting installed laptop
More information5.6.3 Lab: Registry Backup and Recovery in Windows XP
5.6.3 Lab: Registry Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up a computer registry. You will also perform a recovery of a computer registry.
More informationUSING "ENCRYPTING FILE SYSTEM" TO PROTECT FILES AND FOLDERS IN "WINDOWS.."
USING "ENCRYPTING FILE SYSTEM" TO PROTECT FILES AND FOLDERS IN "WINDOWS.." 1 Web location for this presentation: http://aztcs.org Click on Meeting Notes 2 SUMMARY Many of the "editions" of "Windows 2000",
More informationEVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM
EVault for Data Protection Manager Course 321 Protecting Exchange 2010 with DPM Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers
More informationWavecrest Certificate
Wavecrest InstallationGuide Wavecrest Certificate www.wavecrest.net Copyright Copyright 1996-2015, Wavecrest Computing, Inc. All rights reserved. Use of this product and this manual is subject to license.
More informationLoad Bulletin ADP, Inc. Dealer Services 1950 Hassell Road Hoffman Estates, IL 60169-6308
Load Bulletin ADP, Inc. Dealer Services 1950 Hassell Road Hoffman Estates, IL 60169-6308 Make sure the media label contains this number: NP-ASP-AE1.0 ADP Network Phone ASP Assistant Enterprise Loading
More informationsafend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
More informationFor Active Directory Installation Guide
For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically
More informationVP-ASP Shopping Cart QUICK START GUIDE Version 7.00. 18 th Feb 2010 Rocksalt International Pty Ltd www.vpasp.com
VP-ASP Shopping Cart QUICK START GUIDE Version 7.00 18 th Feb 2010 Rocksalt International Pty Ltd www.vpasp.com 2 P a g e Table of Contents INTRODUCTION... 4 1 FEATURES... 5 2 WHAT DO I NEED TO RUN VP-ASP?...
More informationBuffalo Technology: Migrating your data to Windows Storage Server 2012 R2
Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2 1 Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2 Contents Chapter 1 Data migration method:... 3 Chapter
More informationGold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.
User Manual Follow these simple steps to install, configure, and use. Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10
More informationINSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY
INSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY 1) Install the UKSSOGateway application on the desktop: The UKSSOGateway application passes information from the myuk portal to launch the FESClient. The FESClient
More informationConfiguration for Professional Client Access
In a network environment, in order for the clients to access the data over the network, you will need to set up a network share to the data file. CREATING A NETWORK SHARE There may be slight differences
More informationNetWrix Password Manager. Quick Start Guide
NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...
More informationUnifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
More informationSetting Up Microsoft Outlook 2007 with GroupWise
Setting Up Microsoft Outlook 2007 with GroupWise This page is one of several you might come across on our website discussing how to setup Outlook with GroupWise. We provide several sets of instructions
More informationParallels Mac Management for Microsoft SCCM 2012
Parallels Mac Management for Microsoft SCCM 2012 Administrator's Guide v3.0 Copyright 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse
More informationSymantec File Share Encryption Quick Start Guide Version 10.3
Symantec File Share Encryption Quick Start Guide Version 10.3 What is Symantec File Share Encryption? Symantec File Share Encryption is a software tool that provides multiple ways to protect and share
More informationFoxit Reader Deployment and Configuration
Copyright 2004-2015 Foxit Software Incorporated. All Rights Reserved. No part of this document can be reproduced, transferred, distributed or stored in any format without the prior written permission of
More informationetoken Enterprise For: SSL SSL with etoken
etoken Enterprise For: SSL SSL with etoken System Requirements Windows 2000 Internet Explorer 5.0 and above Netscape 4.6 and above etoken R2 or Pro key Install etoken RTE Certificates from: (click on the
More informationHome and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows
Overview Home and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows Ithaca College provides network file sharing for all faculty members, all staff
More informationComputer Science and Engineering Windows Cisco VPN Client Installation and Setup Guide
Computer Science and Engineering Windows Cisco VPN Client Installation and Setup Guide This document will guide you through the installation of the Cisco VPN Client for Microsoft Windows XP and Vista.
More informationTIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015
TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015 2201 Thurston Circle Bellevue, NE 68005 www.tigerpawsoftware.com Contents Tigerpaw Exchange Integrator Setup Guide v3.6.0... 1 Contents...
More information