Mobile Device Security and Encryption Standard and Guidelines
|
|
|
- Jason Johns
- 9 years ago
- Views:
Transcription
1 Mobile Device Security and Encryption Standard and Guidelines University Mobile Computing and Device best practices are currently defined as follows: 1) The use of any sensitive or private data on mobile computing devices must be avoided unless absolutely necessary - The recommended mechanism for using such data is to keep the data on a secured system at the University and use the laptop for secure remote access to that system. (For example, ssh or remote desktop to a system on campus used to access and manipulate the data) 2) For situations where 1) is not possible, or if there is any doubt about the nature of the data on mobile devices, then the device must be secured to the following minimal baseline: A. Laptops and mobile devices must run a current, fully patched, and modern Operating System at all times B. Users must store documents on laptops in a single specific area only (such as a home folder or directory) C. The contents of the disk storage area specified in B. must be securely encrypted D. Laptops and mobile devices must be configured to ask for a password after any period of inactivity, including after resume from suspend/standby/sleep/hibernate and on OS start up 3) Additional laptop and mobile computing security measures include: A. PDA devices must have the ability to conduct a remote kill (the ability to remotely and on-command reset the device to factory configurations thereby overwriting any stored or cached data) B. Data Wiping: Laptops and mobile computing devices must follow electronic media disposition and secure wipe (overwriting any stored or residual data even items previously deleted that may be recoverable on the hard drive) in accordance to the electronic media disposition guidelines C. Physical protection controls must be used, such as laptop cable locks and securely storing mobile devices in transit and in locked areas/compartments when not in use D. Wireless security best practices must be followed when connecting to information technology resources through WiFi E. Strong Authentication should be considered if there is an approved and justified business need to access University of Alberta sensitive information using a laptop or mobile device
2 Laptop Encryption Deployment Guidance For System Administrators 4) The current best practice mechanisms for secure, software-based, disk encryption as described in practice 2C are the following: Microsoft Windows: Configure BitLocker to encrypt all fixed disk drives 1 Apple Mac OS X: Configure FileVault to encrypt all users home folders Different mechanisms may be acceptable to use on other operating systems. This document is intended as a guideline to use for the most common circumstance. If a platform not listed here is not capable of encrypting the stored documents area, it must not be used to store sensitive information (It may be used for secure remote access to a system as in section 1) 5) A deployment plan for disk encryption must be defined and approved in a unit prior to encrypting user systems or data. Minimally, this plan should cover: Identification of affected assets; Definition of established data backup processes Definition of encrypted data recovery management process Definition of encryption deployment process Testing of encryption deployment Reporting on encryption process status Basic Data Recovery Management Process Prototype Each of the tools we recommend for disk encryption has mechanisms to recover data in the event that a user s password becomes unavailable, the simplest mechanism available for data recovery when deploying to individual systems is a recovery password. With BitLocker this password is a unique 48 character numeric code, that the user is given the option of printing during the encryption process, and for FileVault it is the Master Password, set by the user in the System Preferences before actually enabling FileVault. Our minimal recommended process for managing these passwords is to require users to place a paper record of the recovery password in a sealed envelope which they will supply to their Chair, or similar authority, for safe keeping in a physically secured location. Secured in this instance meaning a locked container inside a room with very limited access, such as a departmental safe or a filing cabinet with a strong lock in the Chair s office. 1 Note that BitLocker is only available for the Ultimate and Enterprise editions of Windows 7 and Vista - it is highly recommended that Windows XP not be used on laptops requiring data encryption.
3 BitLocker for Windows 7 Enterprise/Ultimate Capabilities BitLocker is a security mechanism that provides two primary functions: boot-time operating system integrity verification and full drive data encryption. Once a BitLocker enabled system has bootstrapped itself into the operating system, the file system on the protected drive(s) is unlocked and the drive encryption effectively becomes transparent to any running applications. The security of this mechanism is based on the secrecy of a cryptographic key: the Master Volume Key (MVK). This key material is not related to user authentication and no user passwords are involved in its creation. Configuration Regardless of the deployment method chosen, The University advises that BitLocker must be configured to use the TPM + PIN authentication method. 2 Default setting for other options are acceptable as long as this authentication method is used. Prerequisites Enabling BitLocker requires that the target laptop have hardware for storing the MVK and related integrity data. Microsoft allows this data to be stored in either a Trusted Platform Module (TPM) or on a USB drive. The University advises that BitLocker be enabled only on hardware with a functional TPM, our experiences is that USB drives are too easy to lose or damage when used in this context. Beyond a TPM, deploying BitLocker has a second major technical requirement: the target laptop must have a very specific drive layout, at a minimum the primary system disk must have two NTFS formatted partitions, corresponding to a system drive and a data/os drive respectively. Microsoft documentation provides clear definition of these requirements, we are repeating them here to further emphasize their importance. Backup Considerations The encryption provided by BitLocker is transparent to applications on the running operating system and existing backup schemes should not require technical accommodations in order to be effective as long as the backup is server-based. Backing up a BitLocker protected system to unencrypted removable media, such as a USB drive, is strongly discouraged as it leaves the data mobile while simultaneously removing any benefit of protection provided by the encryption. 2
4 Data Recovery Microsoft provides a number of data recovery methods, their availability depends on the deployment scheme chosen. In the basic one-to-one scheme, where BitLocker is configured on each individual system, these recovery mechanisms are either a binary key or a long numeric passphrase. Both of these items are unique to a particular BitLocker protected device, so in the prototype recovery management process, defined in sections above, we ve highlighted the use of the passphrase because it is a more manageable artifact for non-technical users. Significant automation of data recovery management is available when deploying BitLocker via Active Directory DS group policy. This policy is available in Server 2008 by default and in Server 2003 R2 via a schema extension. Due to variations in individual AD environments the University is not providing any specific instructions for this deployment mechanism at this time. FileVault for Apple OS X 10.6 (Snow Leopard) Capabilities FileVault encrypts data is a user s home directory using disk image containers and does not encrypt the whole system disk. This means that any user account that has administrator capability can write data to anywhere on the system they care to, a location than will not be encrypted. For this reason users must keep their data in their home folders and not intermix sensitive data storage with locations used by the Operating System or that are accessible to other users by default. 3 Configuration Options The encryption mechanism provided by FileVault is uncomplicated and at this time the University makes no recommendations beyond the practices described at the beginning of this document and the use of default settings. Prerequisites FileVault does not have any explicit hardware requirements but it is not recommended to deploy it onto older single processor laptops before testing any impact it will have on the usability of the device. For example, enabling FileVault on a late generation PowerPC-based Powerbook running OS X 10.5 creates an unacceptably slow user experience. Backup Considerations 3 Such as the folder /Users/Shared.
5 FileVault stores a user s home directory inside of an encrypted sparse-bundle disk image container on the system drive, the data is only decrypted when the individual files are accessed and read from the disk into memory by applications during a user s login session. Backup mechanisms reading data off the disk will only have access to the encrypted disk image containers, not their contents. This design means that special accommodations may need to be made for the backup mechanism you employ, so it would also be highly recommended to confirm the effectiveness and operational behaviour of backups prior to encrypting real user systems. Data Recovery The most important system administration consideration for data recovery with FileVault is the management and use of the FileVault Master Identity. In the one-to-one deployment we are recommending as a baseline, this Master Identity is stored in a system Keychain file and is protected by the Master Password as set by the user when FileVault is enabled. This identity is the sole mechanism available for recovery of encrypted data in the event that the user password becomes unavailable. As the majority of Apple laptops in use at the University are currently individually administered, we strongly recommend using the uncomplicated Basic Data Recovery Management Process defined in this document as a basis for addressing recovery requirements. Sophisticated schemes for automated FileVault deployment and recovery management certainly do exist but they all require a central administration mechanism 4 and will not be addressed in this document. References: 1. Best Practices for Using FileVault: Managed encrypted container technology built into Mac OS X, Apple, December 2009, 2. TechNet - BitLocker Drive Encryption, Microsoft, May 2010, 3. TechNet - BitLocker Drive Encryption Overview, Microsoft, May 2010, 4. Data Encryption Toolkit for Mobile PCs, Microsoft, May 2007, 4 Such as Open Directory.
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
Disk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
How to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
Using BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
Encrypting with BitLocker for disk volumes under Windows 7
Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
ICT Professional Optional Programmes
ICT Professional Optional Programmes Skills Team are a Microsoft Academy with new training rooms and IT labs in our purpose built training centre in Ealing, West London. We offer a range of year-long qualifications
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
DriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Encrypted File Systems. Don Porter CSE 506
Encrypted File Systems Don Porter CSE 506 Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue
Course 50322B: Configuring and Administering Windows 7
Course 50322B: Configuring and Administering Windows 7 Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day instructor-led course provides students with the knowledge
Manual for Android 1.5
Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor
Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
Configuring and Administering Windows 7
Configuring and Administering Windows 7 Length: 5 days Overview This five-day instructor-led course provides students with the knowledge and skills to configure and administer Microsoft Windows 7 as a
OS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN
OS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN MANAGING KEYCHAINS Mac OS X features a sophisticated system that automatically protects all your authentication assets in encrypted
Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...
Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4
Using Mac OS X 10.7 Filevault with Centrify DirectControl
Using Mac OS X 10.7 Filevault with Centrify DirectControl August 2011, Revision 2 OS X 10.7's Filevault has the ability to encrypt the entire disk. Full Disk Encryption is compatible with Centrify Active
10 steps to better secure your Mac laptop from physical data theft
10 steps to better secure your Mac laptop from physical data theft Executive summary: This paper describes changes Mac users can make to improve the physical security of their laptops, discussing the context
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?
Product Insight Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media? Author Version Document Information Utimaco Product Management Device Security 4.30.00
How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
Chapter 4. Operating Systems and File Management
Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
Windows Phone 8.1 Mobile Device Management Overview
Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are
Home and Shared Folders on Mac OS X Accessing Home and Shared Folders on Active Directory File Servers Using Mac OS X
Overview Home and Shared Folders on Mac OS X Accessing Home and Shared Folders on Active Directory File Servers Using Mac OS X Ithaca College provides network file sharing for all faculty members, all
Windows BitLocker TM Drive Encryption Design Guide
Windows BitLocker TM Drive Encryption Design Guide Microsoft Corporation Published: August 2007 Abstract This document describes the various aspects of planning for deploying Windows BitLocker Drive Encryption
Encryption Made Simple for Lawyers
Encryption Made Simple for Lawyers By David G. Ries, Esq. and John W. Simek Encryption is a topic that most attorneys don t want to touch with a 10-foot pole, but it is becoming a more and more important
Trusted Platform Module (TPM) Quick Reference Guide
Trusted Platform Module (TPM) Quick Reference Guide System builders/integrators should give this Guide to the system owners to assist them in enabling and activating the Trusted Platform Module. Warning
www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon
Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation
BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker
BitLocker Encryption for non-tpm laptops
BitLocker Encryption for non-tpm laptops Contents 1.0 Introduction... 2 2.0 What is a TPM?... 2 3.0 Users of non-tpm University laptops... 2 3.1 Existing Windows 7 laptop users... 2 3.2 Existing Windows
Deploying EFS: Part 2
Deploying EFS: Part 2 John Morello You can think of any Encrypting File System (EFS) deployment as having essentially two parts: the back-end design portion focusing on certificate management and recovery
CribMaster Database and Client Requirements
FREQUENTLY ASKED QUESTIONS CribMaster Database and Client Requirements GENERAL 1. WHAT TYPE OF APPLICATION IS CRIBMASTER? ARE THERE ANY SPECIAL APPLICATION SERVER OR USER INTERFACE REQUIREMENTS? CribMaster
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
FAQ. How does the new Big Bend Backup (powered by Keepit) work?
FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control
Installing and Configuring Windows 10 20697-1; 5 Days; Instructor-led
Installing and Configuring Windows 10 20697-1; 5 Days; Instructor-led Course Description This course is designed to provide students with the knowledge and skills required to install and configure Windows
SafeGuard Enterprise User help. Product version: 6.1
SafeGuard Enterprise User help Product version: 6.1 Document date: January 2014 Contents 1 About SafeGuard Enterprise 6.1...3 2 SafeGuard Enterprise on Windows endpoints...5 3 Security best practices...7
CipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
MS 20687 Configuring Windows 8.1
P a g e 1 of 12 MS 20687 Configuring Windows 8.1 About this Course Get expert instruction and hands-on practice administering and configuring Windows 8.1 in this 5-day Microsoft Official Course. This course
Introduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
How Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
Installing and Configuring Windows 10 20697-1B; 5 Days, Instructor-led
Installing and Configuring Windows 10 20697-1B; 5 Days, Instructor-led Course Description This course is designed to provide students with the knowledge and skills required to install and configure Windows
Encrypting stored data. Tuomas Aura T-110.4206 Information security technology
Encrypting stored data Tuomas Aura T-110.4206 Information security technology Outline 1. Scenarios 2. File encryption 3. Encrypting file system 4. Full disk encryption 5. Data recovery Simple applications
Managing BitLocker With SafeGuard Enterprise
Managing BitLocker With SafeGuard Enterprise How Sophos provides one unified solution to manage device encryption, compliance and Microsoft BitLocker By Robert Zeh, Product Manager Full-disk encryption
Online Backup Frequently Asked Questions
Online Backup Frequently Asked Questions 1 INSTALLATION 1.1 Who installs the Redstor Online Backup service? 1.2 How does the installed client connect to Redstor s Cloud Platform? 1.3 On which machines
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Hiva-network.com. Microsoft_70-680_v2011-06-22_Kat. Exam A
Exam A Microsoft_70-680_v2011-06-22_Kat QUESTION 1 You have a computer that runs Windows 7. The computer has a single volume. You install 15 applications and customize the environment. You complete the
Managing Applications, Services, Folders, and Libraries
Lesson 4 Managing Applications, Services, Folders, and Libraries Learning Objectives Students will learn to: Understand Local versus Network Applications Remove or Uninstall an Application Understand Group
Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012
Administering FileVault 2 on OS X Lion with the Casper Suite Technical Paper July 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that
Online Backup Plus Frequently Asked Questions
Online Backup Plus Frequently Asked Questions 1 INSTALLATION 1.1 Who installs the Redstor Online Backup Plus service? 1.2 How does the installed client connect to Redstor s Cloud Platform? 1.3 On which
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data
NETWRIX IDENTITY MANAGEMENT SUITE
NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
Installing and Configuring Windows 10 MOC 20967-1
Installing and Configuring Windows 10 MOC 20967-1 Course Length: 5 Days Course Delivery: Traditional Classroom Online Live On Demand Overview This course is designed to provide students with the knowledge
MCSA Windows 8 (Exam 70-687)
MCSA Windows 8 (Exam 70-687) Configuring Windows 8 Length: 5 Days Location: 182, Broadway, Newmarket, Auckland Vendor: Microsoft Audience(s): IT Professionals Level: 200 Technology: Windows 8 Type: Corporate
Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Microsoft Windows Server 2008: Data Protection
Chapter 5 Microsoft Windows Server 2008: Data Protection Solutions in this chapter: BitLocker Active Directory Rights Management Services Authorization Summary Solutions Fast Track Frequently Asked Questions
Managing and Maintaining a Windows Server 2003 Network Environment
Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011
BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011 Purpose To provide a step-by-step procedure for encrypting installed laptop
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
Samsung Drive Manager FAQ
Samsung Drive Manager FAQ Installation Q: My Samsung External Hard Drive is connected but nothing is happening. A: Check the USB cable connection. If your Samsung External Hard Drive is connected properly,
Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
FileVault 2 Decoded. Rich Trouton Howard Hughes Medical Institute, Janelia Farm Research Campus
FileVault 2 Decoded Rich Trouton Howard Hughes Medical Institute, Janelia Farm Research Campus Before we get started, there s two things I d like to mention. The first is that, all of the sides, speakers
BitLocker To Go User Guide
BitLocker To Go User Guide 1. Introduction BitLocker To Go a new feature of Windows 7 is a full-disk encryption protection technology for removable storage devices that are connected to one of the USB
PGP Whole Disk Encryption Training
PGP Whole Disk Encryption Training Agenda WDE Overview Licensing Universal Server & Client Basics Installation Password Recovery OS Maintenance Support Questions 2 Whole Disk Encryption Protects against:
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE
Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution
SimplySecure TM Architecture & Security
Technical Whitepaper SimplySecure TM Architecture & Security Specifications, compliance and certification considerations for the IT Professional Rob Weber November 2014 Foreward First-in-class web-managed
Setup and Configuration Setup Assistant Migration Assistant System Preferences Configuration Profiles System Information
Yosemite 101+201: Apple Certified Technical Coordinator v10.10 Bootcamp (5 Days) Install OS X Yosemite About OS X Yosemite Installation Choices Before Upgrading a Previous System Preparing the System Disk
Xopero Centrally managed backup solution. User Manual
Centrally managed backup solution User Manual Contents Desktop application...2 Requirements...2 The installation process...3 Logging in to the application...6 First logging in to the application...7 First
Course 20688A: Managing and Maintaining Windows 8
Course 20688A: Managing and Maintaining Windows 8 Length: 5 Days Audience(s): IT Professionals Level: 200 Delivery Method: Instructor-led (classroom) About this Course In this course, students learn how
Joining my MAC laptop to the domain
Joining my MAC laptop to the domain Follow these steps to join your Apple Mac laptop to the University domain. An account must exist on the domain before the laptop can join it. Contact the Service Desk
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
Maintaining a Microsoft Windows Server 2003 Environment
Maintaining a Microsoft Windows Server 2003 Environment Course number: 2275C Course lenght: 3 days Course Outline Module 1: Preparing to Administer a Server This module explains how to administer a server.
In order to enable BitLocker, your hard drive must be partitioned in a particular manner.
ENABLE BITLOCKER ON WINDOWS VISTA - WITHOUT A TPM Requirements: You must be running Vista Enterprise or Vista Ultimate to enable BitLocker. Any other version of Vista is not compatible. It is recommended
Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day
TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista
TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...
DATA SECURITY ADVICE FOR RESEARCHERS & THE McMASTER RESEARCH ETHICS BOARD. Table of Contents
DATA SECURITY ADVICE FOR RESEARCHERS & THE McMASTER RESEARCH ETHICS BOARD Revised - January 2012. Table of Contents A. SOME GENERAL POINTS TO CONSIDER ABOUT DATA SECURITY B. TIPS FOR PROTECTING DATA IN
White Paper: Whole Disk Encryption
How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................
Guidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
Symantec File Share Encryption Quick Start Guide Version 10.3
Symantec File Share Encryption Quick Start Guide Version 10.3 What is Symantec File Share Encryption? Symantec File Share Encryption is a software tool that provides multiple ways to protect and share
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft
Installing and Upgrading to Windows 7
Installing and Upgrading to Windows 7 Before you can install Windows 7 or upgrade to it, you first need to decide which version of 7 you will use. Then, you should check the computer s hardware to make
Course 6292A: Installing and Configuring Windows 7 Client. About this Course. Audience Profile
Course 6292A: Installing and Configuring Windows 7 Client Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Windows 7 Type: Course Delivery Method: Instructor-led
Eduroam wireless network Windows Vista
Eduroam wireless network Windows Vista university for the creative arts How to configure laptop computers to connect to the eduroam wireless network Contents Contents Introduction Prerequisites Instructions
How Endpoint Encryption Works
WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint
