Trusted Platform Module (TPM) Quick Reference Guide
|
|
|
- Walter Hopkins
- 9 years ago
- Views:
Transcription
1 Trusted Platform Module (TPM) Quick Reference Guide System builders/integrators should pass this Guide on to the system owner to assist them in enabling and activating the TPM. Warning of Potential Data Loss... 3 Trusted Platform Module (TPM)... 4 System Requirements... 4 Security Precautions... 4 Password Procedures...5 Emergency Recovery File Back Up Procedures...5 Hard Drive Image Backup Procedures...6 Clear Text Backup (Optional)...6 Trusted Platform Module Ownership... 6 Enabling the Trusted Platform Module... 6 Assuming Trusted Platform Module Ownership... 7 Recovery Procedures... 8 How to recover from a hard drive failure...8 How to recover from a desktop board or TPM failure...8 Clearing Trusted Platform Module Ownership...10 Support Links...10 C
2 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. Intel products are not intended for use in medical, life saving, life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a trademark or registered trademark of Intel Corporation or its subsidiaries in the United States and other countries. *Other names and brands may be claimed as the property of others. Copyright 2004 Intel Corporation 2 Trusted Platform Module Quick Reference
3 Warning of Potential Data Loss IMPORTANT USER INFORMATION. READ AND FOLLOW THESE INSTRUCTIONS PRIOR TO TRUSTED PLATFORM MODULE INITIALIZATION. System integrators, owners, and end users must take precautions to mitigate the chance of data loss. Data encrypted by any program utilizing the Trusted Platform Module (TPM) may become inaccessible or unrecoverable if any of the following occurs: Lost Password: Loss of any of the passwords associated with the TPM will render encrypted data inaccessible. No password recovery is available. Read the Security Precautions for Password Procedures. Hard Drive Failure: In the event of a failure of a hard disk (or other storage media) that contains encrypted data, an image of the hard disk (or other storage media) must be restored from backup before access to encrypted data may become available. The owner/user should backup the system hard disk on a regular basis. Read the Security Precautions below for Hard Drive Backup Procedures. Platform Failure: In the event of a platform failure and/or replacement of the motherboard, recovery procedures may allow migratable keys to be recovered and may restore access to encrypted data. All non-migratable keys and their associated data will be lost. Both the Infineon* Security Platform software and Wave Systems* EMBASSY* Trust Suite utilize migratable keys. Please check any other software that accesses the TPM for migratability. Read the Security Precautions for Emergency Recovery File Back Up Procedures. Loss of Trusted Platform Module Ownership: Trusted Platform Module Ownership/contents may be cleared (via a BIOS switch) to allow for the transfer of a system to a new owner. If TPM ownership is cleared, either intentionally or in error, recovery procedures may allow the migratable keys to be recovered and may restore access to encrypted data. Read the Security Precautions for Emergency Recovery File Back Up Procedures. Trusted Platform Module Quick Reference 3
4 Trusted Platform Module (TPM) The Trusted Platform Module is a component on the desktop board that is specifically designed to enhance platform security above-and-beyond the capabilities of today s software by providing a protected space for key operations and other security critical tasks. Using both hardware and software, the TPM protects encryption and signature keys at their most vulnerable stages operations when the keys are being used unencrypted in plain-text form. The TPM is specifically designed to shield unencrypted keys and platform authentication information from software-based attacks. System Requirements Boxed Intel Desktop Board D915GMH with Gigabit Ethernet solution Microsoft Windows* 2000 Professional (SP4) or Microsoft Windows XP Professional (SP1) NTFS file system required Microsoft Internet Explorer* 5.5 or later Adobe* Acrobat* 5.0 or later (included on Intel Express Installer CD) Security Precautions Security, like any other aspect of computer maintenance requires planning. What is unique about security has to do with understanding who "friends" and adversaries are. The TPM provides mechanisms to enable the owner/user to protect their information from adversaries. To provide this protection the TPM effectively puts "locks" around the data. Just like physical locks, if keys or combinations are lost, the assets (i.e., data) may be inaccessible not only to adversaries, but also to asset owner/user. The TPM provides two classes of keys: migratable and non-migratable. Migratable keys are designed to protect data that can be used (i.e., unencrypted) on more than one platform. This has the advantage of allowing the key data to be replicated (backed-up and restored) to another platform. This may be because of user convenience (someone uses more than one platform, or the data needs to be available to more than one person operating on different platforms). This type of key also has the advantage in that it can be backed-up and restored from a defective platform onto a new platform. However, migratable keys may not be the appropriate level of protection (e.g., the user wants the data restricted to a single platform) needed for the application. This requires a non-migratable key. Non-migratable keys carry with them a usage deficit in that while the key may be backed-up and restored (i.e., protected from hard disk failure) they are not protected against system or TPM failure. The very nature of a non- 4 Trusted Platform Module Quick Reference
5 migratable key is that they can be used on one and only one TPM. In the event of a system or TPM failure, all non-migratable keys and the data associated with them will be inaccessible and unrecoverable. The following precautions and procedures may assist in recovering from any of the previously listed situations. Failure to implement these security precautions and procedures may result in unrecoverable data loss. Password Procedures The Infineon Security Platform software allows users to configure passwords from 6 to 255 characters. A good password should consist of: At least one upper case letter (A to Z) At least one numerical character (0 to 9) At least one symbol character &, etc.) Example Passwords: I wear a Brown hat 2 least once-a-month or ujgfak&%)adf35a9m NOTE Avoid using names or dates that can be easily guessed: birthdays, anniversaries, family member names, pet names, etc. All passwords associated with the Infineon Security Platform software (Owner, Emergency Recovery Token, and User passwords) and the Wave Systems EMBASSY Trust Suite are NOT RECOVERABLE and cannot be reset without the original text. The system owner should document all passwords, store them in a secured location (vault, safe deposit box, off-site storage, etc.), and have them available for future use. These documents should be updated after any password changes. Emergency Recovery File Back Up Procedures The Emergency Recovery Token (SPEmRecToken.xml) must be saved or moved to a removable media (floppy, USB drive, CDR, flash media, etc). Once this is done, the removable media should be stored in a secure location. DO NOT LEAVE ANY COPIES of the Emergency Recovery Token on the hard drive or within any hard drive image backups. If a copy of the Emergency Recovery Token remains on the system, it could be used to compromise the Trusted Platform Module and platform. After completing the Infineon Security Platform User Initialization Wizard, a copy of the Emergency Recovery Archive (SPEmRecArchive.xml) should be copied to a removable media and stored in a secure location. This procedure should be repeated after any password changes or the addition of a new user. Trusted Platform Module Quick Reference 5
6 Hard Drive Image Backup Procedures To allow for emergency recovery from a hard drive failure, frequent images of the hard drive should be created and stored in a secure location. In the event of a hard drive failure, the latest image can be restored to a new hard drive and access to the encrypted data may be re-established. NOTE All encrypted and unencrypted data that was added after the last image was created will be lost. Clear Text Backup (Optional) It is recommended that system owners follow the Hard Drive Image Backup Procedures. To backup select files without creating a drive image, files can be moved from secured programs or drive letters to an unencrypted directory. The unencrypted (clear text) files may then be backed up to a removable media and stored in a secure location. The advantage of the clear text backup is that no TPM key is required to restore the data. This option is not recommended because the data is exposed during backup and restore. Trusted Platform Module Ownership The Trusted Platform Module is disabled by default when shipped and the owner/end customer of the system assumes ownership of the TPM. This permits the owner of the system to control initialization of the TPM and create all the passwords associated with the TPM that is used to protect their keys and data. System builders/integrators may install both the Infineon Security Platform software and the Wave System EMBASSY Trust Suite, but SHOULD NOT attempt to use or activate the TPM or either software package. Enabling the Trusted Platform Module The Trusted Platform Module is disabled by default when shipped to insure that the owner/end customer of the system initializes the TPM and configures all security passwords. The owner/end customer should use the following steps to enable the TPM. 1. While the PC is displaying the splash screen (or POST screen), press the <F2> key to enter BIOS. 2. Use the arrow keys to go to the Advanced Menu, select Peripheral Configuration, and then press the <Enter> key. 3. Select the Trusted Platform Module, press <Enter>, and select Enabled and press <Enter> again (display should show: Trusted Platform Module [Enabled]). 4. Press the <F10> key, select Ok and press <Enter>. 5. System should reboot and start Microsoft Windows. 6 Trusted Platform Module Quick Reference
7 Assuming Trusted Platform Module Ownership Once the TPM has been enabled, ownership must be assumed by using the Infineon Security Platform Software. The owner/end user should follow the steps listed below to take ownership of the TPM: 1. Start the system. 2. Launch the Infineon Security Platform Initialization Wizard. 3. Create Owner password (before creating any password, review the Password Recommendations made earlier in this document). 4. Create a new Recovery Archive (note the file name and location). 5. Specify a Security Platform Emergency Recovery Token password and location. (this password should not match the Owner password or any other password). 6. Define where to save the Emergency Recovery Token (note the file location and name). 7. The software will then create recovery archive files and finalize ownership of the TPM. 8. After completing the Infineon Security Platform Initialization Wizard, the Emergency Recovery Token (SPEmRecToken.xml) must be moved to a removable media (floppy, CDR, flash media, etc) if the file was not saved to a removable media during installation. Once this is done, the removable media should be stored in a secure location. No copies of this Emergency Recovery Token file should remain on the system. If a copy remains on the system, it could be used to compromise the security of the platform. 9. Launch the Infineon Security Platform User Initialization Wizard. 10. Create a Basic User password (this password is the most frequently used and should not match any other password). 11. Select and configure Security Platform features for this user. 12. After completing the Infineon Security Platform User Initialization Wizard, a copy of the Emergency Recovery Archive (SPEmRecArchive.xml) should be copied to a removable media and stored in a secure location. This procedure should be repeated after any password changes or the addition of new users. 13. Restart the system. 14. To backup the keys for the EMBASSY Trust Suite, the Key Transfer Manager software must be configured. Launch the Key Transfer Manager from the program menu. 15. Follow the instructions and create and document the locations for both the archive and restoration key files. The key archive should be located on a removable media and stored in a secure location when not in use. Trusted Platform Module Quick Reference 7
8 16. Create and document the password to protect the key archive. 17. Provide the TPM Owner password to allow the Key Transfer Manager to create the archive and restoration key files. 18. Upon completing the configuration of the Key Transfer Manager, it will place an icon in the task bar and automatically back up all new and updated keys associated with the EMBASSY Trust Suite. If the removable media that contains the archive file is not present when a new key is generated, then keys will have to be manually backed up using the Key Transfer Manager when the removable media is available. 19. All passwords associated with the Infineon Security Platform Software (Owner, Emergency Recovery Token, and User passwords) and Wave Systems EMBASSY Trust Suite and Key Transfer Manager are not recoverable and cannot be reset without the original text. These passwords should be documented and stored in a secured location (vault, safe deposit box, off-site storage, etc.) in case they are needed in the future. These documents and files should be updated after any password changes. Recovery Procedures How to recover from a hard drive failure Restore the latest hard drive image from backup to the new hard drive no TPM specific recovery is necessary. How to recover from a desktop board or TPM failure This procedure may restore the migratable keys from the Emergency Recovery Archive, and does not restore any previous keys or content to the TPM. This recovery procedure may restore access to the Infineon Security Platform software and Wave Systems EMBASSY Trust Suite that are secured with migratable keys. Requirements Emergency Recovery Archive (created with the Infineon Security Platform Initiation Wizard) Emergency Recovery Token (created with the Infineon Security Platform Initiation Wizard) Emergency Recovery Token Security Password (created with the Infineon Security Platform Initiation Wizard) Working original operating system (OS) installation, or a restored image of the hard drive Wave Systems Key Transfer Manager archive password TPM Ownership password 8 Trusted Platform Module Quick Reference
9 This recovery procedure only restores the migratable keys from the previously created Recovery Archives. 1. Replace the desktop board with the same model as the failed board. 2. Start the original operating system or restore the original hard drive image. 3. Start the Infineon Security Platform Initialization Wizard and check the I want to restore the existing Security Platform box. 4. Follow the instructions during the Security Platform Initialization, and append the Emergency Recovery Archive to the existing archive. 5. Provide all the necessary passwords, files, and file locations as requested. It may take up to 20 minutes for Security Platform Initialization Wizard to restore the security platform settings. 6. Start User Initialization Wizard. Select Recover your Basic User Key when prompted. Specify the original Basic User Key password and proceed with the wizard. 7. When re-configuring the Personal Secure Drive, select I want to change my Personal Secure Drive setting, confirm the drive letter and name are correct, and then proceed through the rest of the wizard. 8. Restart the system when requested. 9. To restore access to the EMBASSY Trust Suite, right mouse click on the Key Transfer Manager icon located in the taskbar in the lower right corner of the screen, and select Restore TPM Keys. 10. Provide all the necessary passwords, files, and file locations as requested by the Key Transfer Manager. Upon successful completion of all steps, you should be able to access previously encrypted files. Trusted Platform Module Quick Reference 9
10 Clearing Trusted Platform Module Ownership WARNING Disconnect the desktop board's power supply from its AC power source before you connect or disconnect cables, or install or remove any board components. Failure to do this can result in personal injury or equipment damage. Some circuitry on the desktop board can continue to operate even though the front panel power switch is off. CAUTION DATA ENCRYPTED BY ANY PROGRAM UTILIZING THE TPM WILL BECOME INACCESSIBLE IF TPM OWNERSHIP IS CLEARED. Recovery procedures may allow the migratable keys to be recovered and might restore access to encrypted data. (Review the Recovery Procedures for detailed instructions). The TPM may be cleared to transfer ownership of the platform to a new owner. 1. Observe precautions in the above WARNING then open the system case. 2. Move the configuration jumper on the board to pins Restore power to the PC and power on. 4. System should automatically enter BIOS setup. 5. Use the arrow keys to select Clear Trusted Platform Module, press <Enter>. 6. If you agree to the warning message select Ok and press <Enter>. 7. Press the <F10> key to save and exit, select Ok and press <Enter>. 8. Power off the system. 9. Review precautions in the WARNING above. 10. Restore the configuration jumper on the board to pins 1-2. When cleared, the TPM module is disabled by default. Support Links For assistance with the Infineon Security Platform Software visit: For assistance with the Wave System EMBASSY Trust Suite visit: For additional information about TPM and enhancing PC security, visit: 10 Trusted Platform Module Quick Reference
Trusted Platform Module (TPM) Quick Reference Guide
Trusted Platform Module (TPM) Quick Reference Guide System builders/integrators should give this Guide to the system owners to assist them in enabling and activating the Trusted Platform Module. Warning
Intel Active Management Technology with System Defense Feature Quick Start Guide
Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine
Recovery BIOS Update Instructions for Intel Desktop Boards
Recovery BIOS Update Instructions for Intel Desktop Boards All BIOS update files for Intel Desktop Boards are available on Intel's Download Center at http://downloadcenter.intel.com/. Important Notes:
This guide explains how to install an Intel Solid-State Drive (Intel SSD) in a SATA-based desktop or notebook computer.
Installation Guide This guide explains how to install an (Intel SSD) in a SATA-based desktop or notebook computer. The instructions include migrating your data from your current storage device (such as
Intel Data Migration Software
User Guide Software Version 2.0 Document Number: 324324-002US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY
TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista
TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...
TPM. (Trusted Platform Module) Installation Guide V2.1
TPM (Trusted Platform Module) Installation Guide V2.1 Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM... 6 2.2 Installing
System Image Recovery* Training Foils
Intel-powered Classmate PC System Image Recovery* Training Foils Version 1.0 1 *Other names and brands may be claimed as the property of others. Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED
Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2
Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.
Intel Rapid Storage Technology
Intel Rapid Storage Technology User Guide August 2011 Revision 1.0 1 Document Number: XXXXXX INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
Intel Compute Stick STCK1A32WFC User Guide. Intel Compute Stick STCK1A32WFC
Intel Compute Stick STCK1A32WFC User Guide 1 Revision History Revision Revisions History Date 01 First release of the Intel Compute Stick STCK1A32WFC User Guide April 2015 Disclaimer INFORMATION IN THIS
HP ProtectTools User Guide
HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark
Intel Server Raid Controller. RAID Configuration Utility (RCU)
Intel Server Raid Controller RAID Configuration Utility (RCU) Revision 1.1 July 2000 Revision History Date Rev Modifications 02/13/00 1.0 Initial Release 07/20/00 1.1 Update to include general instructions
Intel Matrix Storage Console
Intel Matrix Storage Console Reference Content January 2010 Revision 1.0 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,
Motion Computing Tablet PC
Motion Computing Tablet PC TRUSTED PLATFORM MODULE (TPM) ACTIVATION User Guide Trusted Platform Module Activation With the Infineon Security Platform Tools and the built-in Trusted Computing Group compliant
User Guide Software Version 2.1.0
Intel Solid State Drive Firmware Update Tool User Guide Software Version 2.1.0 Order Number: 322570-007US Intel disclaims all express and implied warranties, including without limitation, the implied warranties
Intel Matrix Storage Manager 8.x
Intel Matrix Storage Manager 8.x User's Manual January 2009 Revision 1.0 Document Number: XXXXXX INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
How to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
Intel Entry Storage System SS4000-E
Intel Entry Storage System SS4000-E Software Release Notes March, 2006 Storage Systems Technical Marketing Revision History Intel Entry Storage System SS4000-E Revision History Revision Date Number 3 Mar
Instructions for Recovery BIOS Update
Instructions for Recovery BIOS Update In the unlikely event that a BIOS update is interrupted, it is possible the BIOS may be left in an unusable state. The recovery process requires the chassis to be
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
NetBak Replicator 4.0 User Manual Version 1.0
NetBak Replicator 4.0 User Manual Version 1.0 Copyright 2012. QNAP Systems, Inc. All Rights Reserved. 1 NetBak Replicator 1. Notice... 3 2. Install NetBak Replicator Software... 4 2.1 System Requirements...
Intel RAID Volume Recovery Procedures
Intel RAID Volume Recovery Procedures Revision 1.0 12/20/01 Revision History Date Revision Number 12/20/01 1.0 Release Modifications Disclaimers Information in this document is provided in connection with
Intel RAID Software v6.x (and newer) Upgrade/Installation Procedures
Intel RAID Software v6.x (and newer) Upgrade/Installation Procedures For Intel Server RAID Controller U3-1 and Intel Server RAID Controller U3-1L Revision 1.1 12/21/01 Date Rev Modifications 12/21/01 1.1
HP ProtectTools for Small Business Security Software, Version 5.10. User Guide
HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Intel Storage System SSR212CC Enclosure Management Software Installation Guide For Red Hat* Enterprise Linux
Intel Storage System SSR212CC Enclosure Management Software Installation Guide For Red Hat* Enterprise Linux Order Number: D58855-002 Disclaimer Information in this document is provided in connection with
Intel RAID Controller Troubleshooting Guide
Intel RAID Controller Troubleshooting Guide A Guide for Technically Qualified Assemblers of Intel Identified Subassemblies/Products Intel order number C18781-001 September 2, 2002 Revision History Troubleshooting
Intel Server Board Platform Confidence Test Installation and Operating Instructions
Intel Server Board Platform Confidence Test Installation and Operating Instructions i Intel Corporation 2002-2009 Information in this document is provided in connection with Intel products. No license,
Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R
Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not
with PKI Use Case Guide
Intel Identity Protection Technology (Intel IPT) with PKI Use Case Guide Version 1.0 Document Release Date: February 29, 2012 Intel IPT with PKI Use Case Guide i Legal Notices and Disclaimers INFORMATION
Time Stamp. Instruction Booklet
Time Stamp Instruction Booklet Time Stamp Introductions Time stamp is a useful solution for backing up and restoring system, it backs up the entire computer system to the Backup Zone. Time Stamp is used
Samsung Auto Backup User Manual
Samsung Auto Backup User Manual [Rev. 06 06/05/2009 Samsung Auto Backup User Manual First edition October 2008 This revision - 05] Copyright 2008 Clarus, Inc. All Rights Reserved. No part of this document
Intel Data Migration Software
User Guide April 2016 Software Version 3.0 Document Number: 324324-003US Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence
Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide
Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup
Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual
Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual Contents For AP v2.10.0.0 Release For Windows 98/ME/2000/XP Version 1.1B (08/27/2004) Contents...1 Introduction...1 Features & Specifications...2
Table of Contents. Rebit 5 Help
Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...
Intel Unite Solution. Standalone User Guide
Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel
Windows BitLocker Drive Encryption Step-by-Step Guide
Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft
4 Backing Up and Restoring System Software
4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring
Resetting USB drive using Windows Diskpart command
Resetting USB drive using Windows Diskpart command Simon Huang Technical Product Manager [email protected] Super Talent Technology October, 2013 Release 1.00 1 Legal Disclaimer INFORMATION IN
In order to enable BitLocker, your hard drive must be partitioned in a particular manner.
ENABLE BITLOCKER ON WINDOWS VISTA - WITHOUT A TPM Requirements: You must be running Vista Enterprise or Vista Ultimate to enable BitLocker. Any other version of Vista is not compatible. It is recommended
Instrument Software Update Instructions. Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Upgrading an older version to A.12.
Instrument Software Update Instructions Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Purpose Upgrading an older version to A.12.09 and above The purpose of this document is to outline the instrument
Samsung Drive Manager User Manual
Samsung Drive Manager User Manual The contents of this manual are subject to change without notice. Companies, names and data used in examples are not actual companies, names or data unless otherwise noted.
DriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
BIOS Update Release Notes
BIOS Update Release Notes PRODUCTS: DG31PR, DG31PRBR (Standard BIOS) BIOS Version 0059 October 24, 2008 PRG3110H.86A.0059.2008.1024.1834 Added Fixed Disk Boot Sector option under Maintenance Mode. Fixed
Intel ICH5R Serial ATA RAID. Quick User s Guide
Intel ICH5R Serial ATA RAID Quick User s Guide Quick User s Guide Version 1.0 G52-M6728X9-K01 1 Edition April 2003 Copyright 2003 MICRO-STAR INT L CO., LTD. The material in this document is the intellectual
Microsoft Windows 7 Ultimate 64 Bit SP1 Operating System Recovery Media for 300 GB Solid State Drives Instructions
xx ZZZ Microsoft Windows 7 Ultimate 64 Bit SP1 Operating System Recovery Media for 300 GB Solid State Drives Instructions *P071303400* 071-3034-00 Copyright Tektronix. All rights reserved. Licensed software
HP Compaq notebook common image white paper
HP Compaq notebook common image white paper Introduction... 2 System requirements and prerequisites... 2 Common image preparation using factory preinstalled Windows Vista images... 4 Configuring the Windows
HP RDX Continuous Data Protection Software Quickstart Guide
HP RDX Continuous Data Protection Software Quickstart Guide *5697-3351* HP Part Number: 5697-3351 Published: May 2014 Edition: Fourth Copyright 2008 2014 Hewlett-Packard Development Company, L.P. Microsoft,
SATA150 TX2PLUS, TX4 QUICK START GUIDE. Version 1.2
SATA150 TX2PLUS, TX4 QUICK START GUIDE Version 1.2 SATA150 TX2plus, TX4 Copyright 2002 Promise Technology, Inc. Copyright by Promise Technology, Inc. (Promise Technology). No part of this manual may be
SSD Firmware Update Utility Guide
SSD Firmware Update Utility Guide Crucial m4 2.5 SSD Firmware Revision 070H Firmware Update Guide for Windows 8 (Update from Rev 0001, 0002, 0009, 0309, 000F, 010G, 040H to Rev 070H) Introduction This
Intel Unite. User Guide
Intel Unite User Guide Intel Unite Users Guide September 2015 Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain
VIVA 4G LTE Mini Router. Quick Start Guide
VIVA 4G LTE Mini Router Quick Start Guide Thank you for choosing the VIVA 4G LTE Mini Router (hereinafter referred to as the E57) The supported functions and actual appearance are subject to the product
WD Sentinel DX4000. Small Office Storage Server Administrator s Quick Install Guide
0 WD Sentinel DX4000 Small Office Storage Server Administrator s Quick Install Guide 1 Introduction This quick install guide steps the Administrator through the procedures for setting up the WD Sentinel
User Guide for Windows 10
User Guide for Windows 10 System requirements E10684 First Edition July 2015 To facilitate a smoother transition from your previous operating system, read the system requirements below before upgrading
RouteFinder SOHO. Quick Start Guide. SOHO Security Appliance. EDGE Models RF825-E, RF825-E-AP CDMA Models RF825-C-Nx, RF825-C-Nx-AP
RouteFinder SOHO SOHO Security Appliance EDGE Models RF825-E, RF825-E-AP CDMA Models RF825-C-Nx, RF825-C-Nx-AP Quick Start Guide RouteFinder RF825 Series Quick Start Guide RouteFinder SOHO Security Appliance
Encrypting with BitLocker for disk volumes under Windows 7
Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1
HP ProtectTools Security Manager Guide
HP ProtectTools Security Manager Guide HP Compaq Business Desktops Copyright 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft
MaxAttach NAS 4000 Series OS 2.2 Hard Disk Drive Replacement
MaxAttach NAS 4000 Series MaxAttach NAS 4000 Series OS 2.2 Hard Disk Drive Replacement DOCUMENT OVERVIEW Who Should Use This Instruction Set This MaxAttach NAS 4000 Series by Maxtor HDD Replacement Instruction
HP External Hard Disk Drive Backup Solution by Seagate User Guide. November 2004 (First Edition) Part Number 373652-001
HP External Hard Disk Drive Backup Solution by Seagate User Guide November 2004 (First Edition) Part Number 373652-001 Copyright 2004 Hewlett-Packard Development Company, L.P. The information contained
Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish.
Backup. If your computer refuses to boot or load Windows or if you are trying to restore an image to a partition the Reflect cannot lock (See here), and then you will have to start your PC using a rescue
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without
User Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
Classroom Management, part of Intel Education User Manual
Classroom Management, part of Intel Education User Manual Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE
System Event Log (SEL) Viewer User Guide
System Event Log (SEL) Viewer User Guide For Extensible Firmware Interface (EFI) and Microsoft Preinstallation Environment Part Number: E12461-001 Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN
USB FLASH DRIVE. User s Manual. USB 2.0 Compliant. Version A10. - 1 - Version A10
USB FLASH DRIVE User s Manual USB 2.0 Compliant Version A10-1 - Version A10 Introduction Thank you for purchasing the USB FLASH DRIVE device. The manual explains how to use the USB FLASH DRIVE software
How to upgrade your TOSHIBA Windows PC or Tablet to Windows 10
How to upgrade your TOSHIBA Windows PC or Tablet to Windows 10 Dear Customer, The information in this document explains how to upgrade certain TOSHIBA Windows PC or Tablets pre-installed with Windows 7
Kaspersky Password Manager
Kaspersky Password Manager User Guide Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions that may arise.
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
CASPER SECURE DRIVE BACKUP
TM CASPER SECURE DRIVE BACKUP USER GUIDE V4.0 TM Copyright and Trademark Information Information in this document is subject to change without notice. Federal law prohibits unauthorized use, duplication,
GE Healthcare Life Sciences UNICORN 5.31. Administration and Technical Manual
GE Healthcare Life Sciences UNICORN 5.31 Administration and Technical Manual Table of Contents Table of Contents 1 Network setup... 1.1 Network terms and concepts... 1.2 Network environment... 1.3 UNICORN
AXIS Camera Station Quick Installation Guide
AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera
LSI MegaRAID User s Manual
LSI MegaRAID User s Manual Q2143 August 2005 Copyright Information No part of this manual, including the products and software described in it,may be reproduced, transmitted, transcribed, stored in a retrieval
Dialogic System Release 6.0 PCI for Windows
Dialogic System Release 6.0 PCI for Windows Software Installation Guide March 2009 05-1957-004 Copyright and Legal Notice Copyright 2003-2009,. All Rights Reserved. You may not reproduce this document
Human Resources Installation Guide
Human Resources Installation Guide Installing HR i Index Copyright 2001 Jenzabar, Inc. You may print any part or the whole of this documentation to support installations of Jenzabar software. Where the
HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7
HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7 September 15, 2009 Introduction HP is committed to supporting our customer s operating
Dell Recovery Manager for Active Directory 8.6. Quick Start Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Getting Started. rp5800, rp5700 and rp3000 Models
Getting Started rp5800, rp5700 and rp3000 Models Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft, Windows, and Windows
C6 Easy Imaging Total Computer Backup. User Guide
C6 Easy Imaging Total Computer Backup User Guide Clickfree and the Clickfree logo are trademarks or registered trademarks of Storage Appliance Corporation. Other product names used in this guide are recognized
Acronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
Dell ControlPoint Security Manager
Dell ControlPoint Security Manager www.dell.com support.dell.com Notes NOTE: A NOTE indicates important information that helps you make better use of your computer. Information in this document is subject
SSD Guru. Installation and User Guide. Software Version 1.4
SSD Guru Installation and User Guide Software Version 1.4 Contents Welcome!............................................................................. 1 Key features.........................................................................
SOFTWARE INSTALLATION INSTRUCTIONS
AUDITGARD LGA Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS Implementation Package The AuditGard Software implementation package includes: 707013 AuditGard Software Install CD 42145 Programming/Audit
Setting Up Monthly Reporter
Setting Up Monthly Reporter April 11, 2014 I. HOW IT WORKS A QUICK OVERVIEW A. AuditWare Development Company maintains a powerful, sophisticated server on which a portion of memory is assigned to each
Windows 7 Upgrade information
Windows 7 Upgrade information Notes on Upgrading to Windows 7 About Restrictions on your computer About Restrictions on the Sony software products About Restrictions on the third-party software products
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
Intel Small Business Advantage (Intel SBA) Release Notes for OEMs
Intel Small Business Advantage (Intel SBA) Release Notes for OEMs Document Release Date: October 16, 2015 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO
Chapter 1 Downloading Images to Your Computer (Windows)
Software User Guide For the safe use of your camera, be sure to read the Safety Precautions thoroughly before use. Types of software installed on your computer varies depending on the method of installation
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
Use QNAP NAS for Backup
Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information
BIOS Update Release Notes
BIOS Update Release Notes PRODUCTS: DG31PR, DG31PRBR (Standard BIOS) BIOS Version 0070 About This Release: February 8, 2010 Integrated Graphics Option ROM Revision: PXE LAN Option ROM Revision: Improved
OnDemand Version 1.7. Installation Manual and User s Guide. AST Technology. Sophienstrasse 4 32051 Herford Germany
OnDemand Version 1.7 Installation Manual and User s Guide AST Technology Sophienstrasse 4 32051 Herford Germany Contents Overview of OnDemand Software... 1 System and Software Requirements... 1 CVe Monitor
Data Lifeguard Tools. Software Manual
Data Lifeguard Tools Software Manual WD Data Lifeguard Tools User Manual Information furnished by WD is believed to be accurate and reliable; however, no responsibility is assumed by WD for its use nor
Smart Control Center. User Guide. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10685-01 v1.0
Smart Control Center User Guide 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10685-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced, transmitted,
