Symantec Endpoint Encryption Full Disk

Size: px
Start display at page:

Download "Symantec Endpoint Encryption Full Disk"

Transcription

1 Symantec Endpoint Encryption Full Disk User Guide Version 6.0

2 Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Symantec Corporation Symantec Corporation. All rights reserved. Authenti-Check is a registered trademark of GuardianEdge Technologies Inc. Microsoft, Active Directory, Windows, and Windows XP are either registered trademarks or trademarks of Microsoft Corporation. Any other trademarks used herein are the property of their respective owners and are hereby acknowledged. Other product and company names mentioned herein may be the trademarks of their respective owners. Printed in the United States of America.

3 Contents Contents 1. Introduction Overview Basic Concepts Registration Encryption Single Sign-On The Client Console Policy Administrators Client Administrators Best Practices Password/PIN Strength Password/PIN Secrecy Authenti-Check Questions and Answers Computer Shutdown Trusted Software Backups Registration & Re-Registration Overview Registration Prompts Grace Restarts Available Registration Mandate Multiple Users Registration Wizard Basics Registration Password Password Registration Token Registration Re-Registration Basics Re-Registration Notification Re-Registration Mandate Pre-Windows Authentication Overview Password-Based Authentication Getting Started Logging On Logon Delay Logon Assistance Token-Based Logon Basics Token Insertion at Startup Screen Logging On Token Error Messages and Logon Assistance Logon Assistance Overview Symantec Endpoint Encryption Full Disk iii

4 Contents Forgotten Password or Token Basics Authenti-Check One-Time Password (OTP) Forgotten PIN Basics One-Time Password (OTP) The Client Console Overview Logon Single Sign-On Enabled Single Sign-On Not Enabled Welcome Navigation Password Change Basics Instructions Authenti-Check Change Computer Check-In User Account Viewing Encrypting How To View Status Decrypting How To View Status About Appendix A. Supported Character Sets SEE Passwords Authenti-Check Questions and Answers Appendix B. Token Error Messages Overview Registration or Re-Registration Pre-Windows Logon Client Console Logon Glossary Index Symantec Endpoint Encryption Full Disk iv

5 Figures Figures Figure 2.1 Registration Prompt, Grace Restarts Available Figure 2.2 Registration Prompt, Mandate Figure 2.3 Registration Prompt, Multiple Users Figure 2.4 Registration, Registration Password Figure 2.5 Password Registration, SSO Enabled, Domain Account Figure 2.6 Password Registration, SSO Not Enabled Figure 2.7 Password Registration, Authenti-Check Figure 2.8 Password Registration, Account Is Active Figure 2.9 Token Registration, SSO Enabled Figure 2.10 Token Registration, SSO Not Enabled, Token Insertion Figure 2.11 Token Registration, PIN Entry Figure 2.12 Token Registration, Information Summary Figure 2.13 Select Certificate Figure 2.14 Token Registration, Account Is Active Figure 2.15 Re-Registration Notification Figure 2.16 Re-Registration Mandate Figure 3.1 Pre-Windows Startup, Default Figure 3.2 Pre-Windows Logon, Password Figure 3.3 Pre-Windows Logon, One-Minute Delay Figure 3.4 Pre-Windows Startup, Default Figure 3.5 Pre-Windows Logon, Token PIN Entry Figure 4.1 Pre-Windows Password Logon, Logon Assistance Figure 4.2 Pre-Windows Logon Assistance, No Methods Available Figure 4.3 Pre-Windows Logon Assistance, Default Message Figure 4.4 Pre-Windows Logon Assistance, Authenti-Check Figure 4.5 Pre-Windows Logon Assistance, Success Figure 4.6 Change Password, Windows Figure 4.7 Pre-Windows Logon Assistance, SEE Password Change Figure 4.8 SEE Password Change Success Figure 4.9 Pre-Windows Logon Assistance, Authenti-Check Incorrect, OTP Begins Figure 4.10 Pre-Windows Logon Assistance, OTP Figure 4.11 Change Password, Windows Figure 4.12 Password Change, SEE Figure 4.13 Pre-Windows Token Logon, Logon Assistance Figure 4.14 Pre-Windows Logon Assistance, Default Message Figure 4.15 Pre-Windows Logon Assistance, OTP Figure 5.1 Client Console Logon, Password Figure 5.2 Client Console Logon, Token Figure 5.3 Select Certificate Figure 5.4 Client Console Welcome Figure 5.5 Client Console User Interface Elements Figure 5.6 Client Console Password Figure 5.7 Client Console Authenti-Check Figure 5.8 Client Console Check-In, Check-In with No Enforcement Figure 5.9 Client Console Users Figure 5.10 Client Console Encryption Figure 5.11 Client Console Decryption Figure 5.12 Client Console About Symantec Endpoint Encryption Full Disk v

6 Introduction 1. Introduction Overview Symantec Endpoint Encryption Full Disk (SEE Full Disk) protects your data while it is at rest through pre-boot authentication and FIPS-validated encryption. As part of Symantec Endpoint Encryption (SEE), it accomplishes this from a central point of control. This Guide is written for the registered user and includes chapters on registering for an account, authenticating in pre- Windows with a password or a token, using the Client console, and accessing logon assistance methods for forgotten passwords, PINs, or tokens. This chapter provides you, the user, with an introduction to basic concepts such as registration, encryption, authentication, and the Client console. The roles of Policy Administrator and Client Administrator are also described. In addition, this chapter includes Best Practices, which provide direction on how to secure the computer work environment. The sections are as follows: Basic Concepts on page 1 Best Practices on page 2 Basic Concepts Registration SEE Full Disk protects the data stored on your hard disk by requiring you to authenticate before it allows Windows to load. This prevents unauthorized users from accessing your data. You must register for an account before you can authenticate. The first user will be forced to register once their grace restarts expire, if they have any. Additional users are allowed to defer registration but must also register to be able to boot to Windows. If your Policy Administrator has pushed out a policy to upgrade you from a password to a token user, you will have to re-register. During registration, you set your SEE password or identify your token and PIN. Encryption SEE Full Disk also protects the data stored on your hard disk by encrypting it so that unauthorized users cannot access it. Encryption is the process by which an algorithm renders data unreadable to anyone who does not have the proper credentials. Most likely the encryption was configured to happen immediately following the installation of SEE Full Disk. Encryption is transparent to you. You can continue to work normally during and after the encryption of your hard disk. Single Sign-On If Single Sign-On (SSO) is enabled, you will have to log on only once with your Windows user name and password or token. If SSO is not enabled, you will need to log on to SEE Full Disk and then to Windows. Though it requires an extra step, not having SSO enabled is the more secure configuration. The Client Console The Client console is available once Windows has loaded and allows you to: View the encryption status of your hard disk partitions. View the other registered users and the Client Administrator accounts on your computer. Symantec Endpoint Encryption Full Disk 1

7 Introduction View the last time your computer checked in with the Symantec Endpoint Encryption Server (SEE Server), if at all. View product version information. Encrypt hard disk partitions that are decrypted, if any. In addition, you might be able to: Change your SEE password. Change your Authenti-Check questions and answers. Decrypt hard disk partitions. These additional functions may or may not have been enabled by your administrator. Policy Administrators The Policy Administrator performs centralized administration activities that include pushing out policy updates. An organization s centralized point of control for SEE is one or more Policy Administrators. A Policy Administrator defines installation settings and policies that are pushed out to Client Computers through Active Directory. Client Administrators The Client Administrator is your primary SEE administrator contact. The administrator can help you if you get locked out of your computer, forget your password, or if your computer fails to boot. Best Practices Password/PIN Strength Define a password or PIN that you can remember, so that you don t have to write it down. Try to choose passwords and PINs that are closer to the maximum length allowed rather than to the minimum length allowed. Include a variety of characters, including upper and lowercase letters mixed with numbers and special characters, if allowed. When you create a password or PIN, think of one that is hard to guess; for example, don t use a commonly known fact, such as your spouse s name, or a fact that can be easily researched, such as your mother s maiden name. Password/PIN Secrecy You are responsible for your password or PIN s security. Change your password or request a new PIN if you feel that your password or PIN may have become compromised. Some situations to be mindful of are: You wrote your password or PIN on a piece of paper but now you can t find that paper. Someone looked over your shoulder and watched you type your password or PIN. Authenti-Check Questions and Answers If you have Authenti-Check available as a password-recovery method, you define up to three question-answer pairs during registration. Then if you forget your SEE password, you can authenticate to SEE Full Disk by correctly answering the questions. These questions and answers, therefore, are just as important as your password. Follow similar guidelines for your questions and answers that you would for your password. That is, create pairs that do not contain commonly known information, that are longer rather than shorter, and that you can remember. Also, do not let others watch you enter them. Unlike passwords, the question-answer pairs are not displayed as asterisks or dots on your screen; they display in plain text. Therefore, be especially mindful of anyone looking over your shoulder. Also, even if only one question-answer pair is required, define all three. The more information that is required to authenticate you to SEE Full Disk, the more secure your access is. Computer Shutdown Once you have authenticated to SEE Full Disk and Windows has loaded, SEE Full Disk cannot protect your data anymore. For this reason, it s best not to leave your computer unattended, particularly in an insecure location, such as Symantec Endpoint Encryption Full Disk 2

8 Introduction a cafe. If you must step away, you should invoke the Windows screensaver that requires Windows credentials before it allows you to get back into Windows. To achieve the peace of mind that comes with SEE Full Disk protection, shut down your computer all the way. Trusted Software Be familiar with the software that is authorized to run on your computer. Be careful if you download software from the Internet. This software could contain spyware, viruses, malware, Trojan horses, or worms. Also use caution when opening attachments. Backups If your organization does not perform automated backups, you should do so yourself on a regular basis. This will allow you to recover from theft or hard disk failure. Store your backups in a physically secure location, such as a locked cabinet. Symantec Endpoint Encryption Full Disk 3

9 Registration & Re-Registration 2. Registration & Re-Registration Overview The registration of the first user greatly improves the ability of SEE Full Disk to protect your computer. Therefore, you should register as soon as you are prompted, even if you have the option to wait. During registration your password or PIN is set. In addition, you may need to set your Authenti-Check question-answer pairs. If your Policy Administrator has pushed out a policy to upgrade you from a password to a token user, you will have to re-register. Both registration and re-registration are accomplished by the same Registration wizard. Registration Prompts After SEE Full Disk is installed and your computer reboots, SEE Full Disk will prompt you to register for your SEE account. Grace Restarts Available Grace restarts are the number of times you can reboot without having to register. The following figure shows a sample of a message you may receive if your administrator has given you grace restarts. Figure 2.1 Registration Prompt, Grace Restarts Available The prompt informs you that you can restart a set number of times without having to register. While you can click Cancel and continue working normally, it s best to click Register Now and begin the registration process. Registration Mandate Once your grace restarts expire, or if your administrator did not give you any grace restarts, you will be forced to register. The following figure shows a sample of a message you will receive if your administrator has not given you grace restarts. Figure 2.2 Registration Prompt, Mandate Symantec Endpoint Encryption Full Disk 4

10 Registration & Re-Registration Registration takes only a few moments. Click Register to begin the registration process. If you can t complete registration now, click Log Off Windows. The next time you boot up, you will receive the same registration mandate. Multiple Users Your administrator may have set up your computer to allow more than one user to register to SEE. You can check to see if this is allowed by using the Client console (see Chapter 5 User Account Viewing on page 42). As the first user, you will need to power the machine up from an off state and authenticate to SEE Full Disk before additional users can register. If you have Single Sign-On, log off Windows and have the additional user log on to Windows. If you do not have Single Sign-On, have the additional user log on at the Windows prompt. Once Windows boots, a prompt similar to the following is shown: Figure 2.3 Registration Prompt, Multiple Users The additional user should click Register Now to begin the registration process. The additional user will also have the option to click Ask Me Later or Don t Ask me Again. If the user chooses not to register, then that user will be unable to authenticate in pre-windows. This could be appropriate if the new user only needs to use the computer this one time or will never need to boot it up from a powered-off state. Registration Wizard Basics The Registration wizard guides you through the registration process. This wizard is the same for both registration and re-registration. The steps in this process will vary according to how your computer has been configured. Registration Password You may need a password to begin the registration process. If you don t see the following window (Figure 2.4), you don t need to enter a registration password. Skip to the section on Password Registration on page 6 or on Token Registration on page 11, as appropriate. Symantec Endpoint Encryption Full Disk 5

11 Registration & Re-Registration Figure 2.4 Registration, Registration Password A registration password is a way for your administrator to identify ahead of time which users are intended to use SEE. The registration password is not your SEE password; the registration password admits you to the registration process. You should have received this password ahead of time. If the Registration password screen appears but you do not have the password, call your help desk or click Cancel. Enter the password and click Next. If the password is accepted, the next window in the registration process appears. If the password is not accepted, a message appears and you will need to correct the password then click Next to resubmit it, or click Cancel. The Back button is not enabled; you can only click Next or Cancel. If you click Cancel, your SEE account will not be created. You will be prompted to confirm that you really want to cancel. Password Registration Single Sign-On Enabled If Single Sign-On is enabled and you are using a domain account, you will see a window similar to the following. If you don t see this window, skip to the next section Single Sign-On Not Enabled on page 7. Symantec Endpoint Encryption Full Disk 6

12 Registration & Re-Registration Figure 2.5 Password Registration, SSO Enabled, Domain Account Your Windows name, domain, and password will be used for your SEE account. Click Next to continue. If you click Cancel, your SEE account will not be created. You will be prompted to confirm that you really want to cancel. Single Sign-On Not Enabled If Single Sign-On is not enabled, the registration window displays your Windows user name, and domain or computer name (Figure 2.6) and prompts you to enter and confirm an SEE password. Symantec Endpoint Encryption Full Disk 7

13 Registration & Re-Registration Figure 2.6 Password Registration, SSO Not Enabled Define a password that you can remember, so that you don t have to write it down. Try to choose passwords that are closer to the maximum length allowed rather than to the minimum length allowed. Include a variety of characters, including upper and lowercase letters mixed with numbers and special characters, if allowed. When you create a password, think of one that is hard to guess; for example, don t use a commonly known fact, such as your spouse s name, or a fact that can be easily researched, such as your mother s maiden name. Be sure to follow any guidelines shown below the Confirm password field. The password must be within the Password length specified. The Symbols allowed parameter identifies which of the symbols on your keyboard may be included in the password. The Include at least field identifies the number of required symbols, uppercase letters, lowercase letters, and/or digits that your password must contain, if any. Refer to Appendix A Supported Character Sets on page 46 for the characters that these Include at least fields include, because not all of the supported characters are shown on the screen. Uppercase and lowercase accented characters, for example, are not shown. Tab to or click on the Confirm password field and type your password again. Click Next. If the password does not meet the requirements, the requirement that the password does not meet such as the number of digits is displayed in red. If the Password field and Confirm password field do not match exactly, the password fields turn red. Authenti-Check Authenti-Check is a self-help recovery method that allows you to get into your computer if you forget your password. The method is not available to token users. If you have Authenti-Check enabled, then you will see a window similar to the following (Figure 2.7). If you don t see this window skip to the next section Completion on page 10. Symantec Endpoint Encryption Full Disk 8

14 Registration & Re-Registration Figure 2.7 Password Registration, Authenti-Check One Authenti-Check question is always required. Up to three questions may be required, depending on how your system is configured. Questions identified as required, must be entered and answered. If a question is identified as optional, you are encouraged to enter a question and an answer. The more questionanswer pairs you have, the more secure your SEE Full Disk access is. For maximum security, enter three questions and three answers. Sometimes your administrator predefines questions for you. These questions you cannot change and you must provide answers for. Try to choose answers that other people cannot guess easily, but that you can remember without writing down. See Table 2.1 for examples of secure and less secure questions. Table 2.1 Authenti-Check Sample Questions Secure Who was your favorite teacher? Who was your childhood hero? What is the street name where your favorite relative lived? Less Secure What is your social security number? Where were you born? What is your mother s maiden name? See Appendix A Supported Character Sets on page 46 to see the characters that are allowed in your Authenti- Check questions and answers. When you have entered all questions and answers, click the Next button to submit your information. If your questions and answers fall within established guidelines, your information will be accepted; otherwise, fields that contain errors will be highlighted in red. Correct any highlighted information then click Next. Symantec Endpoint Encryption Full Disk 9

15 Registration & Re-Registration If you click Cancel, your SEE account will not be created. You will be prompted to confirm that you really want to cancel. Completion Once you complete the Registration wizard, the final window notifies you that your SEE user account is active (Figure 2.8). Figure 2.8 Password Registration, Account Is Active The Launch the SEE Client when I click Finish check box is selected by default to provide an easy means for you to access the primary control point for your SEE Full Disk protection. You should launch the Client console to view status and ensure that the encryption of your hard disk has begun or completed. Click Finish to complete the wizard and dismiss the window. If you leave the check box selected, when you click Finish: If you have Single Sign-On enabled, the Client console launches with the Welcome panel; you are already authenticated. If you do not have Single Sign-On enabled, the Client console launches with the Logon panel. Log on using the password that you just created for your account. See Chapter 5 The Client Console on page 33 for information about using the console. Symantec Endpoint Encryption Full Disk 10

16 Registration & Re-Registration Token Registration Token and Reader General Usage When the Registration wizard instructs you to insert your token: If you are using an RSA token, connect the USB-connector end of your token to a USB port or into a USB extension cable attached to your computer. Wait until you see the RSA icon in your system tray change to include a plus sign. If you are using a smart card, hold the card so that the side containing the gold chip is on top and the card end containing the chip is closest to the reader. If your token has a light or the reader has a light, it blinks when information from your token is being read. If you are using an Axalto smart card, the icon s computer screen changes from black to blue while the icon s golden token blinks, then returns to black when the blinking stops. Wait until the blinking stops before taking the next action, such as clicking Next. If you encounter token, certificate, or PIN errors during registration, refer to Appendix B Token Error Messages and check the section Registration or Re-Registration on page 48 for possible causes and resolution. Single Sign-On Enabled If Single Sign-On (SSO) is enabled, a window similar to the following will be shown. If you don t see this window, skip to the next section Single Sign-On Not Enabled on page 12. If your token is not yet inserted, your registration screen prompts you to insert your token (Figure 2.9). If you have already inserted your token, the window does not prompt you to insert it. Figure 2.9 Token Registration, SSO Enabled Symantec Endpoint Encryption Full Disk 11

17 Registration & Re-Registration To register your token for your SEE account, insert the token that you use to log on to Windows. The Next button becomes enabled. The token or reader light should blink as the card is read. When the token or reader light stops blinking, click Next. You continue to the next window in the Registration wizard. See PIN Entry on page 12. If you click Cancel, your SEE account will not be created. You will be prompted to confirm that you really want to cancel. Single Sign-On Not Enabled If Single Sign-On is not enabled, you will see the following window: Figure 2.10 Token Registration, SSO Not Enabled, Token Insertion When you insert your token, the token or reader light should blink as the card is read. When the light stops blinking or if you have no light but several seconds have passed click Next. You proceed to the next window in the Registration wizard. If you click Cancel, your SEE account will not be created. You will be prompted to confirm that you really want to cancel. PIN Entry A window similar to Figure 2.11 prompts you for your PIN. If you don t see this window, either SSO is not enabled or the Registration wizard has accessed your PIN from your token; skip to the next section Confirmation on page 13. Symantec Endpoint Encryption Full Disk 12

18 Registration & Re-Registration Figure 2.11 Token Registration, PIN Entry The User name and Domain fields are filled from the information stored on your token. If you are a local user, your computer name appears in the Domain field. Type your PIN in the PIN field, then click Next. If you click Cancel, your SEE account will not be created. You will be prompted to confirm that you really want to cancel. If you click Back, you return to the previous window (Figure 2.10) in the Registration wizard. Confirmation The next registration window confirms the token information that SEE Full Disk will use to authenticate you. Figure 2.12 shows an example. Symantec Endpoint Encryption Full Disk 13

19 Registration & Re-Registration Figure 2.12 Token Registration, Information Summary Verify the information and click Next. Certificate Selection If the Select Certificate screen (Figure 2.13) does not appear, skip to the next section Completion on page 15. Figure 2.13 Select Certificate Your administrator probably set up your SEE certificate with the values listed immediately below. These are the values that the SEE software uses to identify your certificate automatically for authentication. For RSA SID800: DATA_ENCIPHERMENT and KEY_ENCIPHERMENT (Key Usage) _PROTECTION (Enhanced Key Usage) Symantec Endpoint Encryption Full Disk 14

20 Registration & Re-Registration For Smart Card: DATA_ENCIPHERMENT and KEY_ENCIPHERMENT (Key Usage) _PROTECTION (Enhanced Key Usage) For Common Access Card (CAC): KEY_ENCIPHERMENT (Key Usage) However, if more than one certificate or no certificate exists with these values, the Select Certificate window (Figure 2.13) opens and you must manually identify your SEE certificate. Select your SEE certificate by clicking on the appropriate row, then clicking OK. In the Figure 2.13 example, the administrator created two certificates with the expected Key Usage settings, so this user identifies their certificate based on Expiration Date. If you don t know which certificate to choose, contact your administrator. If you select a certificate that is not valid, you will receive an error message. Refer to Appendix B Token Error Messages and check the section Registration or Re-Registration on page 48 for possible resolution. Completion The final Registration window (Figure 2.14) notifies you that your SEE user account is active. Figure 2.14 Token Registration, Account Is Active The Launch the SEE Client when I click Finish check box is selected by default to provide an easy means for you to access the primary control point for your SEE Full Disk protection. You should launch the Client console to view status and ensure that the encryption of your hard disk has begun or completed. Click Finish to complete the wizard and dismiss the window. Symantec Endpoint Encryption Full Disk 15

21 Registration & Re-Registration If you leave the check box selected, when you click Finish: If you have Single Sign-On enabled, the Client console launches with the Welcome panel; you are already authenticated. If you do not have Single Sign-On enabled, the Client console launches with the Logon panel. Log on using the token and PIN that you just identified for your account. See Chapter 5 The Client Console on page 33 for information about using the Client console. Re-Registration Basics Your Policy Administrator may issue a policy requiring you to convert your SEE account authentication method, either from a password to a token, or from a token to a password. Should this occur, you will be prompted to reregister. This prompting can also happen if this authentication-conversion setting is in place following an upgrade of SEE Full Disk. Re-Registration Notification If your Policy Administrator requires that you convert your account, you will be notified. Your re-registration prompt message contains a date by which you must re-register. Figure 2.15 shows a sample notification prompt for users moving from password-based to token-based authentication. Figure 2.15 Re-Registration Notification You are encouraged to click Re-register Now to begin the re-registration process. If your prompt states, You need to re-register for a token-based account, follow the instructions under Token Registration on page 11. If you are converting to a token-based account, be sure you have been issued your token. You will need it for the re-registration process. If Single Sign-On is enabled, use the token that you use to log on to Windows. If your prompt states, You need to re-register for a password-based account, follow the instructions under Password Registration on page 6. Click Cancel to re-register later, but you must re-register prior to the date shown in the message or you will be locked out of Windows until you do re-register. If you cancel for now and the enforcement date arrives, you will still be able to authenticate in pre-windows with your current account; then when you authenticate to Windows, you will again be prompted to re-register. As long as the date has not yet arrived, you can delay re-registration and work normally. Re-Registration Mandate Once the enforcement date arrives, you will be forced to re-register. The following figure shows the sample prompt for re-registering for a token authentication method. Symantec Endpoint Encryption Full Disk 16

22 Registration & Re-Registration Figure 2.16 Re-Registration Mandate Click Re-register to launch the Registration wizard. If you need to re-register for a password-based account, follow the instructions under Password Registration on page 6. If you need to re-register for a token-based account and you have been issued your token, follow the instructions under Token Registration on page 11. If you can t complete re-registration, click Log Off Windows. This could occur if you receive the prompt before you receive your token. The next time you boot up, you can authenticate in pre-windows with your existing SEE account, but when you try to log on to Windows, you will receive the same re-registration mandate. Symantec Endpoint Encryption Full Disk 17

23 Pre-Windows Authentication 3. Pre-Windows Authentication Overview Pre-Windows authentication ensures that only authorized users can access the encrypted disk. If you have Single Sign-On (SSO), you will only have to log on once with your Windows user name and password or token. If you do not have SSO, you will need to log on to SEE Full Disk and then to Windows. Though it requires an extra step, not having SSO enabled is the more secure configuration. Authentication is accomplished with either a token or a password, according to how your administrator configured your account. The Symantec Startup screen and the pre-windows logon screen may not be displayed if the Policy Administrator is running Autologon. Autologon allows the Administrator to install software without having users authenticate. If Autologon is running, you will skip the SEE Full Disk logon and log on to Windows only. If you are a password-based user, proceed to read the next section. Token users skip to Token-Based Logon on page 20. Password-Based Authentication Getting Started Once you have registered, each time you turn on your computer, you will be greeted by the Symantec Startup screen. The figure below shows the default Startup screen distributed with Symantec Endpoint Encryption. Figure 3.1 Pre-Windows Startup, Default Symantec Endpoint Encryption Full Disk 18

24 Pre-Windows Authentication Your organization may have created a different screen altogether or they may have chosen to customize the text. At a minimum, the Startup screen should provide you with instructions on how to log on. As a password user, press CTRL+ALT+DEL. Logging On Figure 3.2 shows an example of the pre-windows Logon screen. Figure 3.2 Pre-Windows Logon, Password SEE Full Disk shows the active keyboard layout in a bar displayed in the lower right-hand corner of your computer screen, similar to this:. If your administrator defined multiple keyboards and you need a keyboard layout different than the one identified in the bar, you can press Left ALT+SHIFT or CTRL+SHIFT the key sequence depends on which sequence was defined to Windows to toggle to another keyboard. To log on to SEE Full Disk, type your user name or UPN into the User name field. The UPN syntax is username@domain.topleveldomain; for example, jjones@your-org.com. Select your domain from the Domain drop-down menu. If you used UPN syntax, no domain selection is necessary. Type your password into the Password field. Click OK. Logon Delay If you provide incorrect logon information, you may be forced to wait 60 seconds before trying again. Figure 3.3 shows an example of the message you see on the Logon screen, if logon delay is active. Symantec Endpoint Encryption Full Disk 19

25 Pre-Windows Authentication Figure 3.3 Pre-Windows Logon, One-Minute Delay This forced delay prevents unauthorized users from breaking in to your system with automated guessing tools. Logon Assistance If you continue to have trouble logging on and you need help, provide your user name and domain, then click Logon Assistance. See Chapter 4 Logon Assistance on page 23 for more information. Token-Based Logon Basics If you are using an RSA token, connect the USB-connector end of your token to a USB port or into a USB extension cable attached to your computer. When you insert your token, hold the card so that the side containing the gold chip is on top and the card end containing the chip is closest to the reader. If your token has a light or the reader has a light, it blinks when information from your token is being read. Wait until the blinking stops before taking the next action, such as clicking OK from the Logon screen. This wait time allows the system to recognize your token. Token Insertion at Startup Screen Once you have registered, each time you turn on your computer, you will be greeted by the Startup screen, if your token is not yet inserted. If your token is already inserted, the Startup screen will not appear or will appear only briefly. If you do not see this screen (Figure 3.4), skip to the next section Logging On on page 21. Symantec Endpoint Encryption Full Disk 20

26 Pre-Windows Authentication Figure 3.4 Pre-Windows Startup, Default The figure shows the default Startup screen distributed with Symantec Endpoint Encryption. Your administrator may have created a different screen altogether or may have chosen to customize the text. At a minimum, the Startup screen should provide you with instructions on how to log on. If you have not inserted your token yet, insert it now. The pre-windows Logon screen appears. If you encounter token errors, refer to Appendix B Token Error Messages and check the section Pre-Windows Logon on page 51 for possible causes and resolution. Logging On Figure 3.5 shows an example of the pre-windows token Logon screen. Figure 3.5 Pre-Windows Logon, Token PIN Entry Symantec Endpoint Encryption Full Disk 21

27 Pre-Windows Authentication SEE Full Disk defaults to the keyboard defined to Windows when the computer was set up. The active keyboard is identified on a bar in the lower right-hand corner of your screen, similar to this:. If your administrator defined multiple keyboards and you need a keyboard layout different than the one identified in the bar, you can press Left ALT+SHIFT or CTRL+SHIFT the key sequence depends on which sequence was defined to Windows to toggle to another keyboard. To authenticate, type your PIN into the PIN field then click OK. Do not remove your token until processing completes. The first time this pre-windows Logon screen appears, it may display only the PIN field. Enter your PIN and click OK. Once you log on the first time, the next time you reboot, this Logon screen displays your User name and Domain as well. Token Error Messages and Logon Assistance If you encounter token, certificate, or PIN errors while trying to log on, refer to Appendix B Token Error Messages and check the section Pre-Windows Logon on page 51 for possible causes and resolution. If you have forgotten your PIN and you need help authenticating, click Logon Assistance, then refer to Chapter 4 Logon Assistance on page 23. Symantec Endpoint Encryption Full Disk 22

28 Logon Assistance 4. Logon Assistance Overview SEE Full Disk offers two automated methods of logon assistance for users who have forgotten their password or PIN. These methods may or may not have been enabled for you. If you are a token user, you will not have the Authenti- Check method available. Both methods are available in pre-windows and require either a token or a valid user and domain/computer name. If you successfully complete one of the methods and Single Sign-On is enabled, you are authenticated to Windows and prompted to change your password. If Single Sign-On is not enabled, you are prompted to change your SEE password, then you are prompted to enter your Windows credentials. If you are a token-based user, you will have to contact the appropriate administrator to change your PIN. If you do not have either method available, ask your Client Administrator to assist you. If you are a token user with your token, go to Forgotten PIN on page 31. If you are a password user or a token user who has forgotten their token, proceed to the next section. Forgotten Password or Token Basics Recover from a forgotten password or a forgotten token by invoking logon assistance from the pre-windows Logon screen. If you are not already on that screen, press CTRL+ALT+DEL from the Symantec Startup screen; the Logon screen appears (Figure 4.1). Figure 4.1 Pre-Windows Password Logon, Logon Assistance SEE Full Disk shows the active keyboard layout in a bar displayed in the lower right-hand corner of your computer screen, similar to this:. If your administrator defined multiple keyboards and you need a keyboard layout different than the one identified in the bar, you can press Left ALT+SHIFT or CTRL+SHIFT the key sequence depends on which sequence was defined to Windows to toggle to another keyboard. Symantec Endpoint Encryption Full Disk 23

29 Logon Assistance To log on to SEE Full Disk, type your user name or UPN into the User name field. The UPN syntax is for example, Select your domain from the Domain drop-down menu. If you used UPN syntax, no domain selection is necessary. Type your password into the Password field. Click Logon Assistance. If you have no automated logon assistance methods available, contact your administrator or follow any customized directions on the screen. Figure 4.2 shows the default message. You can skip the rest of this chapter. Figure 4.2 Pre-Windows Logon Assistance, No Methods Available Otherwise, you do have one or more authentication assistance methods available and the Logon Assistance wizard begins. Figure 4.3 shows the default message, but your organization may have customized the message with a contact name and phone number. Write down the information before clicking Next. You may need this information later. Figure 4.3 Pre-Windows Logon Assistance, Default Message Symantec Endpoint Encryption Full Disk 24

30 Logon Assistance Click Next. Authenti-Check If you have Authenti-Check, you will see a screen similar to the screen in Figure 4.4. If you don t see this screen, skip to the next section One-Time Password (OTP) on page 28. Figure 4.4 Pre-Windows Logon Assistance, Authenti-Check The Authenti-Check method involves up to three question-answer pairs, established during registration. If you forget your password, the questions are displayed and you are prompted to enter the answers. Correct answers authenticate you. You are then prompted to change your SEE password. In each box that appears below a question, type the correct answer. Make sure that you enter the answer exactly as you entered it when you defined it. Note that punctuation matters. Spaces matter if they precede or end the question. The answers are not case-sensitive. If an Authenti-Check answer is long (up to 99 characters may be allowed by policy), the characters that you type at the beginning of the answer may move out of view as you continue to type. You can press the arrow keys or HOME and END keys to scroll through your answer, or you can use SHIFT in combination with arrow keys to select text. If you need to delete some or all of the text of a long answer, use one of the methods below to ensure that the nonvisible characters are deleted: To delete the entire answer, press END, then SHIFT+HOME. All text becomes highlighted. Press DELETE. To delete part of the answer, use an arrow key to move to the right of the characters in question, then press BACKSPACE until all of the characters that you intended to delete are removed. You could also move to the left of the characters, then press DELETE. Replace any deleted text with correct information, as appropriate. Once you have entered your answers, click Next. Success, SSO Enabled If your Authenti-Check process ends successfully and SSO is enabled, Windows proceeds to load. A success message appears with instructions about changing your password (Figure 4.5). Symantec Endpoint Encryption Full Disk 25

Symantec Endpoint Encryption Removable Storage

Symantec Endpoint Encryption Removable Storage Symantec Endpoint Encryption Removable Storage Client Administrator Guide Version 8.2.1 Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered

More information

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption

More information

Symantec Endpoint Encryption Full Disk

Symantec Endpoint Encryption Full Disk Symantec Endpoint Encryption Full Disk Policy Administrator Guide Version 7.0 Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted

More information

Symantec Endpoint Encryption Full Disk

Symantec Endpoint Encryption Full Disk Symantec Endpoint Encryption Full Disk Autologon Utility & Reboot Utility Guide Version 6.1 Information in this document is subject to change without notice. No part of this document may be reproduced

More information

HP ProtectTools for Small Business Security Software, Version 5.10. User Guide

HP ProtectTools for Small Business Security Software, Version 5.10. User Guide HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

PUBLIC Password Manager for SAP Single Sign-On Implementation Guide

PUBLIC Password Manager for SAP Single Sign-On Implementation Guide SAP Single Sign-On 2.0 SP1 Document Version: 1.0 2015-10-02 PUBLIC Password Manager for SAP Single Sign-On Implementation Guide Content 1 Password Manager....4 2 Password Manager Installation Guide....5

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation

More information

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05

More information

AKO Email Shutdown Quick Reference Guide

AKO Email Shutdown Quick Reference Guide AKO Email Shutdown Quick Reference Guide NETWORK ENTERPRISE CENTER This guide explains how the Army is shutting down AKO Email and outlines steps you must take to ensure a smooth transition to full DoD

More information

HP MediaSmart Server Software Upgrade from v.2 to v.3

HP MediaSmart Server Software Upgrade from v.2 to v.3 HP MediaSmart Server Software Upgrade from v.2 to v.3 Table of Contents Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New 3 Features That Will

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

McAfee Endpoint Encryption (SafeBoot) User Documentation

McAfee Endpoint Encryption (SafeBoot) User Documentation TABLE OF CONTENTS Press the CTRL key while clicking on topic to go straight to the topic in this document. I. Introduction... 1 II. Installation Process Overview... 1 III. Checking for a Valid Current

More information

Symantec Endpoint Encryption Removable Storage

Symantec Endpoint Encryption Removable Storage Symantec Endpoint Encryption Removable Storage Policy Administrator Guide Version 7.0 Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted

More information

HP ProtectTools User Guide

HP ProtectTools User Guide HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark

More information

Symantec Endpoint Encryption Full Disk Release Notes

Symantec Endpoint Encryption Full Disk Release Notes Symantec Endpoint Encryption Full Disk Release Notes Symantec Endpoint Encryption Full Disk 7.0.3 Symantec Endpoint Encryption Framework 7.0.3 www.symantec.com About SEE Full Disk SEE Full Disk protects

More information

SecureDoc for Mac v6.1. User Manual

SecureDoc for Mac v6.1. User Manual SecureDoc for Mac v6.1 User Manual Copyright 1997-2012 by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada and

More information

Full Disk Encryption Agent Reference

Full Disk Encryption Agent Reference www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

Time Stamp. Instruction Booklet

Time Stamp. Instruction Booklet Time Stamp Instruction Booklet Time Stamp Introductions Time stamp is a useful solution for backing up and restoring system, it backs up the entire computer system to the Backup Zone. Time Stamp is used

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

Full Disk Encryption Pre-Boot Authentication Reference

Full Disk Encryption Pre-Boot Authentication Reference www.novell.com/documentation Full Disk Encryption Pre-Boot Authentication Reference ZENworks 11 Support Pack 4 Beta April 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect

More information

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

SafeGuard Enterprise User help. Product version: 6 Document date: February 2012

SafeGuard Enterprise User help. Product version: 6 Document date: February 2012 SafeGuard Enterprise User help Product version: 6 Document date: February 2012 Contents 1 SafeGuard Enterprise on endpoint computers...3 2 Security best practices...5 3 Power-on Authentication...7 4 Power-on

More information

PowerSchool Parent Portal User Guide. PowerSchool 7.x Student Information System

PowerSchool Parent Portal User Guide. PowerSchool 7.x Student Information System PowerSchool 7.x Student Information System Released December 2011 Document Owner: Documentation Services This edition applies to Release 7.1 of the [product name] software and to all subsequent releases

More information

Symantec Endpoint Encryption Full Disk

Symantec Endpoint Encryption Full Disk Symantec Endpoint Encryption Full Disk Policy Administrator Guide Version 8.0.1 Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks

More information

Symantec Endpoint Encryption Full Disk

Symantec Endpoint Encryption Full Disk Symantec Endpoint Encryption Full Disk Policy Administrator Guide Version 6.0 Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted

More information

HP ProtectTools. Getting Started

HP ProtectTools. Getting Started HP ProtectTools Getting Started Copyright 2012 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Intel is a trademark

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

HP MediaSmart Server Software Upgrade from v.1 to v.3

HP MediaSmart Server Software Upgrade from v.1 to v.3 HP MediaSmart Server Software Upgrade from v.1 to v.3 Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New... 3 Features That Will Change... 4 Prepare

More information

NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0

NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0 NetIQ Advanced Authentication Framework - Client User's Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 4 About This Document 4 NetIQ Advanced Authentication Framework Overview

More information

McAfee Endpoint Encryption 7.0 Users Guide and FAQ

McAfee Endpoint Encryption 7.0 Users Guide and FAQ McAfee Endpoint Encryption 7.0 Users Guide and FAQ Table of Contents Introduction... 1 Installation... 1 Boot-Up/Login... 1 Encryption Status... 3 Notes for Encryption... 4 Changing Your Password... 4

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

SafeGuard Enterprise User help. Product version: 6.1

SafeGuard Enterprise User help. Product version: 6.1 SafeGuard Enterprise User help Product version: 6.1 Document date: January 2014 Contents 1 About SafeGuard Enterprise 6.1...3 2 SafeGuard Enterprise on Windows endpoints...5 3 Security best practices...7

More information

Symantec Endpoint Encryption (SEE Client) Installation Instructions. Version 8.2

Symantec Endpoint Encryption (SEE Client) Installation Instructions. Version 8.2 Symantec Endpoint Encryption (SEE Client) Installation Instructions Version 8.2 Warning: This software is labor intensive, therefore it is important to validate that the hard drive is healthy by first

More information

HP ProtectTools User Guide

HP ProtectTools User Guide HP ProtectTools User Guide Copyright 2009 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Java is a US trademark

More information

SafeGuard Enterprise User help. Product version: 7

SafeGuard Enterprise User help. Product version: 7 SafeGuard Enterprise User help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Enterprise 7.0...5 2 SafeGuard Enterprise on Windows endpoints...7 3 Security best practices...9

More information

BounceBack User Guide

BounceBack User Guide Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Motion Computing Tablet PC

Motion Computing Tablet PC Motion Computing Tablet PC TRUSTED PLATFORM MODULE (TPM) ACTIVATION User Guide Trusted Platform Module Activation With the Infineon Security Platform Tools and the built-in Trusted Computing Group compliant

More information

Spector 360 Deployment Guide. Version 7

Spector 360 Deployment Guide. Version 7 Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...

More information

Windows BitLocker Drive Encryption Step-by-Step Guide

Windows BitLocker Drive Encryption Step-by-Step Guide Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft

More information

Symantec Endpoint Encryption Full Disk Release Notes

Symantec Endpoint Encryption Full Disk Release Notes Symantec Endpoint Encryption Full Disk Release Notes Symantec Endpoint Encryption Full Disk 7.0.6 Symantec Endpoint Encryption Framework 7.0.6 www.symantec.com About SEE Full Disk SEE Full Disk protects

More information

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files

More information

Encrypting with BitLocker for disk volumes under Windows 7

Encrypting with BitLocker for disk volumes under Windows 7 Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1

More information

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install

More information

Sophos SafeGuard Disk Encryption, Sophos SafeGuard Easy Demo guide

Sophos SafeGuard Disk Encryption, Sophos SafeGuard Easy Demo guide Sophos SafeGuard Disk Encryption, Sophos SafeGuard Easy Demo guide Product version: 5.60 Document date: April 2011 Contents 1 Introduction...3 2 Requirements...5 3 The demo configuration package...6 4

More information

How Endpoint Encryption Works

How Endpoint Encryption Works WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint

More information

account multiple solutions

account multiple solutions Quick Start Guide 1 Our easy to use guide will get you up and running in no time! The guide will assist you with: Generating your Sage Pay login Navigation Creating contacts Creating system users Setting

More information

Cyber Security: Software Security and Hard Drive Encryption

Cyber Security: Software Security and Hard Drive Encryption Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright

More information

Administrators Help Manual

Administrators Help Manual Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service

More information

Digital Signatures on iqmis User Access Request Form

Digital Signatures on iqmis User Access Request Form Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

BillQuick Agent 2010 Getting Started Guide

BillQuick Agent 2010 Getting Started Guide Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Agent 2010 Getting Started Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)

More information

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012.

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Copyright 1995-2012 Lenel Systems International, Inc. Information

More information

DPMS2 McAfee Endpoint Encryption New Installation

DPMS2 McAfee Endpoint Encryption New Installation DPMS2 McAfee Endpoint Encryption New Installation Contents DPMS2 McAfee Endpoint Encryption New Installation... 1 1. Registering for the Application... 2 2. Downloading the Application... 6 3. Important

More information

Endpoint Security Client for Mac

Endpoint Security Client for Mac Endpoint Security Client for Mac E80.60 User Guide 23 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are

More information

WD Sentinel DX4000. Small Office Storage Server Administrator s Quick Install Guide

WD Sentinel DX4000. Small Office Storage Server Administrator s Quick Install Guide 0 WD Sentinel DX4000 Small Office Storage Server Administrator s Quick Install Guide 1 Introduction This quick install guide steps the Administrator through the procedures for setting up the WD Sentinel

More information

Getting Started with Vision 6

Getting Started with Vision 6 Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2 Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.

More information

Yale Software Library

Yale Software Library e/ Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 432-9000 or helpdesk@yale.edu Installation PGP Desktop for Windows Operating Systems Preparing your computer:

More information

How Drive Encryption Works

How Drive Encryption Works WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

Welcome Guide for MP-1 Token for Microsoft Windows

Welcome Guide for MP-1 Token for Microsoft Windows Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

What is e-services? Registered User Portal RUP

What is e-services? Registered User Portal RUP IRS e-services Registration Process What is e-services? Suite of products designed for tax professionals and taxpayers to do business with IRS electronically Includes: Registration e-file Application Preparer

More information

CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE

CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE INTRODUCTION You can access your email account from any workstation at your school using Outlook Web Access (OWA),

More information

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29 Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Inpatient Rehabilitation Assessment Validation and Entry Systems (jirven) Installation Guide. In support of Software Version 1.2.

Inpatient Rehabilitation Assessment Validation and Entry Systems (jirven) Installation Guide. In support of Software Version 1.2. Inpatient Rehabilitation Assessment Validation and Entry Systems (jirven) Installation Guide In support of Software Version 1.2.0 October 01, 2015 Page 2 of 28 Table of Content QUICK ACCESS TIP: To navigate

More information

Kaspersky Password Manager

Kaspersky Password Manager Kaspersky Password Manager User Guide Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions that may arise.

More information

Citrix Password Manager Using the Account Self-Service Feature. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition

Citrix Password Manager Using the Account Self-Service Feature. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition Citrix Password Manager Using the Account Self-Service Feature Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition 2 Citrix Password Manager - Account Self-Service Copyright

More information

How to enable Disk Encryption on a laptop

How to enable Disk Encryption on a laptop How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data

More information

for Windows 7 Laplink Software, Inc. Quick Start Guide h t t p : / / w w w. l a p l i n k. c o m / h e l p MN-LLG-EN-15 (REV.

for Windows 7 Laplink Software, Inc. Quick Start Guide h t t p : / / w w w. l a p l i n k. c o m / h e l p MN-LLG-EN-15 (REV. 1 for Windows 7 Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/help E-mail: CustomerService@laplink.com Laplink Software, Inc. 14335 NE 24th Street, Suite 201 Bellevue,

More information

PROPHIX Reporting What is PROPHIX?

PROPHIX Reporting What is PROPHIX? ALA Financial System PROPHIX Reporting What is PROPHIX? ALA s Financial System upgrade is comprised of three new software solutions: 1. Bill Payment Process (BPP), a Microsoft SharePoint web-based platform

More information

CONSOLEWORKS WINDOWS EVENT FORWARDER START-UP GUIDE

CONSOLEWORKS WINDOWS EVENT FORWARDER START-UP GUIDE CONSOLEWORKS WINDOWS EVENT FORWARDER START-UP GUIDE BEFORE YOU BEGIN This document assumes some things: You are using ConsoleWorks 4.6 or later (required), it s currently running, and a browser displaying

More information

Team Foundation Server 2013 Installation Guide

Team Foundation Server 2013 Installation Guide Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide

More information

WD Sentinel DX4000. Small Office Storage Server. Administrator s Quick Install Guide

WD Sentinel DX4000. Small Office Storage Server. Administrator s Quick Install Guide WD Sentinel DX4000 Small Office Storage Server Administrator s Quick Install Guide Kit Contents WD Sentinel DX4000 Ethernet cable AC adapter About Your WD Product Kit Contents WD Sentinel DX4000 Small

More information

Verizon Remote Access User Guide

Verizon Remote Access User Guide Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks

More information

1. System Requirements

1. System Requirements BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data

More information

Comodo Disk Encryption

Comodo Disk Encryption Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3

More information

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Basic Setup Guide Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading

More information

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE WHAT IS VIRTUAL DESKTOP? Virtual Desktop is an online environment that allows you to access NSF applications and a virtual desktop that mimics a Windows 7 environment. You can use Virtual Desktop to use

More information

Single Sign On and Launch Pad User Guide

Single Sign On and Launch Pad User Guide Single Sign On and Launch Pad User Guide 7001 Weston Parkway, Suite 200 Cary, North Carolina 27513 2014 Railinc Corp. All Rights Reserved. Last Updated: March 2014 SSO/Launch Pad User Guide SSO/Launch

More information

User Guide. IntraLinks Courier Plug-in for Microsoft Outlook

User Guide. IntraLinks Courier Plug-in for Microsoft Outlook IntraLinks Courier Plug-in for Microsoft Outlook User Guide Copyright 2012 IntraLinks, Inc. Version 3.2 September 2012 IntraLinks 24/7/365 support US: 212 543 7800 UK: +44 (0) 20 7623 8500 See IntraLinks

More information

White Paper: Whole Disk Encryption

White Paper: Whole Disk Encryption How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com

More information

Connecting to UNOSECURE using Windows 7

Connecting to UNOSECURE using Windows 7 Connecting to UNOSECURE using Windows 7 1. Click the Wireless status icon on the task bar. 2. Select the unosecure connection and click connect. 3. Enter your UNO username and password. Click OK. UCC Help

More information

VPN Client User s Guide. 9235966 Issue 2

VPN Client User s Guide. 9235966 Issue 2 VPN Client User s Guide 9235966 Issue 2 Copyright 2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the

More information

SELF SERVICE RESET PASSWORD MANAGEMENT ADMINISTRATOR'S GUIDE

SELF SERVICE RESET PASSWORD MANAGEMENT ADMINISTRATOR'S GUIDE SELF SERVICE RESET PASSWORD MANAGEMENT ADMINISTRATOR'S GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information