Securing the DB2 Database of your SAP System with Windows Encrypting File System
|
|
|
- Randolf Price
- 9 years ago
- Views:
Transcription
1 Securing the DB2 Database of your SAP System with Windows Encrypting File System Applies to: All SAP releases on IBM DB2 for Linux, UNIX, and Windows (in the following referred to as DB2 for LUW) on a Windows platform. Summary This document describes how to encrypt the database of your SAP system with Windows Encrypting File System (in the following referred to as EFS). You can use this document as a step-by-step guide to enable encryption on your existing SAP system that runs on DB2 for LUW. This document also provides performance data based on a test analysis that was done at the IBM SAP Integration and Support Centre. Authors: Lili Zhang, Sunny Sun Company: IBM, SAP (IBM SAP Integration and Support Centre, Toronto) Created on: November 21 Author Bio Lili Zhang is a member of the IBM SAP Integration and Support Centre at the IBM Toronto Lab. Her current activities include testing of SAP applications with DB2 for LUW and helping customers with problem analysis and troubleshooting. She is also a customer advocate, providing support for large customer accounts running SAP and DB2 for LUW. Sunny Sun is a member of the IBM SAP Integration and Support Centre at the IBM Beijing Lab. His current work is related to SAP on DB2 for LUW product certification, and in his role as a customer advocate, he also works in customer support on SAP DB2 products. 29 SAP AG 1
2 Table of Contents Overview... 3 Introduction to Encrypting File System (EFS)... 3 Configuring EFS for the Database of Your SAP System... 4 Prerequisites... 4 Obtaining the EFS certificate... 4 Planning your data recovery procedure... 4 Space requirements... 5 Encrypting Data Files... 6 Enabling Encryption for a Folder... 6 Enabling Encryption for a Single File... 8 Decrypting Files Other Useful Operations Exporting/Importing EFS certificate and keys Authorizing Additional Users for Access to Encrypted Files (Optional) Test Results Test overview Test 1: Standard SAP SD Benchmark Test 2: Zmerge Test 3: Client Copy/Client Delete/SGEN: Test Summary: Miscellaneous New functions with Windows File operations on encrypted files across the network Changing user passwords Backing up an encrypted file or folder Performing data recovery Expired certificates (private keys) Summary Related Content Disclaimer and Liability Notice SAP AG 2
3 Overview Data security is crucial in today s business as the computing environment is subject to malicious attacks and increasing regulatory pressures. The Encrypting File System (EFS) on Microsoft Windows provides NTFS file system encryption which enhances data security for your sensitive data. You can encrypt individual files or folders on NTFS drives. When the files are encrypted, the data is protected even if the attacker has physical access to the machine. Only authorized users and data recovery agents can decrypt the files. With EFS, you are able to encrypt your database backup image or tablespace container files to protect sensitive data in your database. This document guides you through the steps needed to encrypt the existing database of your SAP system with EFS. You can also use the performance result as a reference when considering encryption using Windows EFS on your system. Introduction to Encrypting File System (EFS) EFS was first introduced in version 3. of NTFS and supported as of Windows 2. It uses a combination of public-private key pair and a per-file encryption key to encrypt and decrypt data. To encrypt a file, EFS generates a random symmetric key, also known as file encryption key (FEK) to encrypt the data. The FEK is then encrypted with the user s public key from the encryption certificate and is added to the file as an EFS attribute named Data Decryption Field (DDF). To access an encrypted file, you must have the private key that corresponds to one of the public keys used to decrypt the FEK first. The decrypted FEK is then used to decrypt the data. To protect against accidental loss of your data, EFS provides a data recovery capability. The capability is defined by a recovery policy where you can configure one or more data recovery agents (DRAs). A recovery agent is a privileged user account (for example, Administrator) that can recover data from any encrypted file in the event of lost or corrupted keys for authorized users. If a recovery policy is in place, the FEK is additionally encrypted with the recovery agent s public keys and stored in the Data Recovery Field (DRF) of the file. The recovery agent uses its corresponding private keys to decrypt the FEK, and the encrypted files will be recovered. Figure 2-1 Structure of an Encrypted Data File In general, the encryption process involves the following steps: EFS starts by performing a number of verification checks. These checks include whether the file can be encrypted and whether there is enough disk space to encrypt the file. If the file is marked as a system file or resides in the %systemroot% directory, it cannot be encrypted. EFS then generates a file encryption key (FEK). By default, EFS uses the Advanced Encryption Standard (AES) algorithm with 256-bit keys for encrypting files on Windows 23 and Windows 28 platforms. 29 SAP AG 3
4 The FEK is encrypted with the current user's public key. If a recovery agent is defined, the FEK is also encrypted with the recovery agent s public keys. EFS metadata is created. EFS metadata contains the Data Decryption Field (DDF), which consists of the encrypted FEKs for all users that have been given access to the file. It also contains the Data Recovery Field (DRF), which contains the encrypted FEKs for all defined recovery agents. Other information, such as the EFS version and encryption algorithm, is also stored in the metadata. A temporary file is created in the current directory. The source file is copied to the temporary file for backup purposes. Each data stream in the original file is then truncated to a length of zero. Its length is then set back to its original size. This essentially deletes all the data in the stream. Next, EFS writes the metadata to the original file. At this point, EFS has the plaintext data in a temporary file and an empty source file that is marked encrypted because of the presence of the EFS metadata. EFS reads the data streams from the temporary file and writes them to the original file. The data is encrypted before it is written to disk. After all of the data has been written back to the original file, EFS verifies that the file is encrypted and then deletes the temporary file. If the conversion process fails for some reason, EFS restores the file to its original state. Since the encrypting and decrypting processes are fully integrated at NTFS file system level, they are totally transparent to the users and applications. From the user s point of view, encrypting a file is simply a matter of setting a file or a folder s attribute. Authorized users can work with the files as usual while non-authorized users receive an Access denied error message when trying to open the encrypted file. Configuring EFS for the Database of Your SAP System Prerequisites Obtaining the EFS certificate Because EFS relies on a public key to encrypt files, you need a public-private key pair and a public key certificate for encryption. If you do not currently have a public key infrastructure (PKI), EFS will generate a self-signed certificate to be used the first time you attempt to encrypt a file or folder. In a domain environment, it is recommended to deliver EFS certificates to users as part of your PKI. Using a certificate authority provides more flexibility for EFS certificate delivery and recovery management. For more information, see How to Implement Data Recovery Strategies with PKI and How to Implement Key Recovery with PKI. Self-signed certificates are valid for 1 years. Certificates issued by certification authorities(ca) are typically valid for a few years. EFS automatically renews a certificate if possible. If the certificate cannot be renewed, it will request a new one from CA or generate a self-assigned certificate. Planning your data recovery procedure Encrypting a file bears the risk that the file might become unreadable. Therefore, it is crucial to consider data recovery implementation before encrypting the files. The most effective way for users to ensure access to encrypted files is to export their EFS certificates and private keys. For more information about how to secure your EFS keys, see Exporting/Importing EFS certificate and keys later in this document. In addition, you can designate one or more data recovery agents (DRAs) by using the EFS recovery policy. Starting with Windows 23, DRAs are not mandatory for EFS. However, it is highly recommended to have a recovery policy set up before encryption. In case the original user account that encrypted the file is deleted or its password is lost, the encrypted file can still be recovered by the recovery agents. In a domain environment, the recovery policy is enabled by default and the domain administrator account is defined as the default recovery agent. When the domain administrator account logs on to the domain controller for the first time, an EFS recovery certificate is generated and stored in the local profile. This certificate is added to the recovery policy and distributed using group policy. This allows organizations to define and enforce a policy to access data stored on company systems. 29 SAP AG 4
5 On a stand-alone machine, no recovery policy is defined by default. Administrators on stand-alone machines have to create a recovery certificate and add it to the recovery policy. Otherwise, there is no way to recover the data if the private keys for authorized users are lost. For more information about how to add recovery agents for your system, see Recover files and folders. Once the recovery agents are defined, it is important to back up the keys for recovery agents as well. To do so, follow the instructions as described in How to back up the recovery agent Encrypting File System (EFS) private key in Windows Server 23. For more information and best practices on data recovery and data protection, see Encrypting File System on Windows XP and Windows 23. Space requirements During the encryption process, a temporary file is created in the same directory as the original file. This is to ensure data integrity in case the encryption process cannot be completed successfully. Before encryption, make sure the free space on the file system is at least as big as the file you are about to encrypt. 29 SAP AG 5
6 Encrypting Data Files You can encrypt files or folders by setting the encryption attribute in the object's Properties dialog box or by using the Ciper.exe command. To encrypt the database of an SAP system, you can choose to encrypt the entire database by encrypting the data path (folder), or perform encryption on a single data container file. Users with write permission on the files are able to perform encryption. Once the files are encrypted, only the encryptor or authorized users are able to access the encrypted files. On a Windows platform, DB2 processes are run by user db2<sid>. Therefore, you have to log in as user db2<sid> to encrypt the database files. Enabling Encryption for a Folder If the encryption attribute is set for a folder, the folder itself is not encrypted. Any files created in or added to the folder are automatically encrypted. All the existing files under this folder can also be encrypted. You can use this method to encrypt sapdata container folders for your existing database or prior to your SAP installation. In this way, the newly created database will automatically be encrypted during installation. Procedure: 1. Make sure all the DB2 processes are stopped. Encryption is not allowed when the file is being accessed. 2. Right-click the sapdata folder for your tablespace directory and choose Properties. 3. On the General tab page of the sapdata Properties dialog box, choose the Advanced pushbutton. 29 SAP AG 6
7 4. In the Advanced Attributes dialog box, select the Encrypt contents to secure data checkbox and choose the OK pushbutton. Note: Although the NTFS file system supports both compression and encryption, it does not support both at the same time. This means that you can only select one or the other. A file or folder cannot be both encrypted and compressed at the same time. 5. In the sapdata Properties dialog box, choose the OK pushbutton again to confirm your selection. 6. Choose the Apply pushbutton in the sapdata Properties dialog box. A new dialog box is displayed where you have to choose between the following options: Apply changes to this folder only. This option does not have any effect on existing files. Files created in or copied to this folder later will be encrypted. The encryption attribute for subfolders will not be changed. If you choose this option, the results are as follows: File description Already stored in the folder and its subfolders. Created in or copied to the folder by you later. Created in or copied to the folder by another user (if the folder is shared) later. Created in or copied to subfolders later. Moved to the folder or subfolders later. Encryption status Unchanged The files remain either encrypted or unencrypted. Protected with your private key. Protected with the other user's private key. Unchanged Unchanged Apply changes to this folder, subfolders and files. If you choose this option, the existing files in the current folder and subfolders are encrypted. Files created later will be encrypted as well. 29 SAP AG 7
8 The results are as follows: File description Already in the folder and its subfolders. Later created in or copied to the folder or subfolders by you. Later created in or copied to the folder or subfolders by another user. Later moved to the folder or subfolders. Encryption status Protected with your private key if you have Write Attributes permission; otherwise, files remain unchanged. Protected with your private key. Protected with the other user's private key. Unchanged 7. Select Apply changes to this folder, subfolders and files and choose the OK pushbutton. Note: If you choose this option, all the files in the current folder will be encrypted, including those that are owned by others if the folder is shared by multiple users. This will prevent others from accessing their own files. Enabling Encryption for a Single File If you want to encrypt a specific data file that contains sensitive data, perform the following steps: 1. Make sure all the DB2 processes are stopped. Encryption is not allowed if the file is being accessed. 2. Identify the tablespace container file that you want to encrypt. To obtain the container file name, you can use the db2 list tablespace containers command. Example C:\benchmark>db2 list tablespace containers for 3 Tablespace Containers for Tablespace 3 Container ID = Name = E:\db2\ACO\sapdata1\DB2ACO\NODE\ACO\T3\C.LRG Type = File 3. Right-click the container file in Windows Explorer and choose Properties. 29 SAP AG 8
9 4. On the General tab page, choose the Advanced pushbutton. 5. In the Advanced Attributes dialog box, select the Encrypt contents to secure data checkbox and choose the OK pushbutton. 6. In the Properties dialog box, choose the Apply pushbutton. 7. In the Encryption Warning dialog box, select Encrypt the file only and choose the OK pushbutton. 29 SAP AG 9
10 When the files or folders are encrypted, the value E is displayed in the Attributes column in Windows Explorer. To display the encryption details, you can right-click a file, open its Properties dialog box, and choose the Advanced pushbutton. In the Advanced Attributes dialog box, choose Details. 29 SAP AG 1
11 Decrypting Files For the decryption of files, the same procedure applies as for the encryption. This means that you open the Properties dialog box by right-clicking the relevant file and choose the Advanced pushbutton. In the Advanced Attributes dialog box, you disable the encryption attribute by deselecting the Encrypt contents to secure data checkbox and apply the changes. Only users who have write permission to the file and who have been granted access to the encrypted files are able to decrypt them. Other Useful Operations Exporting/Importing EFS certificate and keys Once a file or folder is encrypted with EFS, it can only be decrypted with the private keys of the authorized user account. If the private key is damaged or missing, even the user that encrypted the file cannot decrypt it. To ensure continued access to your own encrypted files, you can perform the following steps to export the EFS certificate and private key and store it in a safe place: 1. Open Certificate Manager by clicking Start -> Run, and execute certmgr.msc. 2. Expand the Personal folder and choose the Certificates folder. 3. Choose the certificate that lists Encrypting File System under Intended Purposes. (You might need to scroll to the right to see this.) 4. In the main menu bar, choose Action All Tasks Export. 5. In the Certificate Export Wizard, select Yes, export the private key and then choose Next. 29 SAP AG 11
12 6. Accept the preselected default settings by choosing Next. 7. Enter the password you want to use and confirm it. 8. Provide the location and the name of the file you want to save and choose the Next pushbutton to finish the process. Note: Make sure the exported file is copied to a floppy disk, CD, or other removable media and stored in a safe place as anyone who has access to the file can import the key to his profile and will be able to decrypt the files. To import a certificate, perform the following steps: 1. Open the Certificates snap-in and expand the Personal folder. 2. Right-click the Certificates folder and choose All Tasks Import. The Certificate Import Wizard starts. 3. Follow the steps of the import wizard and provide the password and location of the certificate you saved previously to import the certificate and private keys. 29 SAP AG 12
13 Authorizing Additional Users for Access to Encrypted Files (Optional) Users can share encrypted files with other local or domain users. Before a user is granted access to the encrypted file, EFS first validates if the user s certificate can be trusted. EFS then decrypts the FEK with the grantor s private key and uses the new user s public key to encrypt it. The encrypted FEK is then stored in a data decryption field (DDF) with the file. To share encrypted files with other users, perform the following steps: 1. Right click the file and open the Properties dialog box. 2. On the General tab page, choose the Advanced pushbutton. 3. In the Advanced Attributes dialog box, choose the Details pushbutton. 4. In the Encryption Details dialog box, choose the Add pushbutton. 5. In the Select User dialog box, any local users that hold EFS certificates are displayed. Select the user you want to grant access to, or choose the Find User pushbutton to add a domain user account. 29 SAP AG 13
14 Note: Use caution when sharing encrypted files. Any user who has been granted access to the files can authorize others to access them, too. As the DB2 service is started with user db2<sid>, the tablespace container files need to be accessible to user db2<sid>. You do not need to share the files with other users. Test Results In this section, we will compare the test results of an encrypted database and a non-encrypted database to identify the performance impact on the SAP system using windows EFS. Test overview Hardware: Operating System: Windows 23 server SAP release: SAP ECC 6. SR3 DB2 release: 9.7 FP2SAP Database Layout: database size is 8GB with 35 regular tablespaces. All tablespace containers are located in one subdirectory (sapdata1) on ESS storage, and they are all encrypted when the encryption test is conducted. We will concentrate on evaluating the encryption impact on the runtime and CPU usage. Windows performance monitor is used to collect performance data for analyzing. Test 1: Standard SAP SD Benchmark Our benchmark test uses 3 users and 1 loops. The benchmark driver is running on a separate server. Runtime: Runtime difference is.4% Nonencrypted Encrypted Difference Runtime(sec) % 29 SAP AG 14
15 s 195s 39s 585s 78s 975s 117s 1365s 156s 1755s 195s 2145s 234s 2535s 273s 2925s 312s 3315s 351s 375s 39s 495s 429s 4485s Kb/sec s 19s 38s 57s 76s 95s 114s 133s 152s 171s 19s 29s 228s 247s 266s 285s 34s 323s 342s 361s 38s 399s 418s 437s 456s % CPU Securing the DB2 Database of your SAP System with Windows Encrypting File System The physical CPU usage over runtime is displayed in the following figure: Benchmark Physical CPU usage Non-encrypted Encrypted At high load intervals, the average number of physical CPU used is 44.3% for the non-encrypted database and 45.% for the encrypted database. The following figure provides a system overview for CPU and disk throughput on the non-encrypted database: Benchmark Non-encrypted Read&Write KB/sec System_Time% User_Time% SAP AG 15
16 s 195s 39s 585s 78s 975s 117s 1365s 156s 1755s 195s 2145s 234s 2535s 273s 2925s 312s 3315s 351s 375s 39s 495s 429s 4485s Kb/sec s 255s 51s 765s 12s 1275s 153s 1785s 24s 2295s 255s 285s 36s 3315s 357s 3825s 48s 4335s 459s 4845s KB/sec Securing the DB2 Database of your SAP System with Windows Encrypting File System System overview for CPU and disk throughput on the encrypted database: Benchmark Encrypted Read+Write KB/sec System_Time% User_Time% Comparing the total read&write rate vs. runtime: Total Disk Read&Write KB/s Non-encrypted Encrypted At high load intervals, the average disk read&write rate is 6438 KB/sec for the non-encrypted database and 6323 KB/sec for the encrypted database. 29 SAP AG 16
17 s 18s 36s 54s 72s 9s 18s 126s 144s 162s 18s 198s 216s 234s 252s 27s 288s 36s 324s 342s 36s 378s 396s 414s 432s 45s s 18s 36s 54s 72s 9s 18s 126s 144s 162s 18s 198s 216s 234s 252s 27s 288s 36s 324s 342s 36s 378s 396s 414s 432s 45s Securing the DB2 Database of your SAP System with Windows Encrypting File System Comparing system CPU usage: System_Time% Non-encrypted Encrypted The figure above shows that the system CPU usage is a little bit higher for the encrypted database. Comparing user CPU usage: User_Time% Non-encrypted Encrypted All in all, the performance impact of encryption is very small in the benchmark test: The runtime degradation is close to zero. CPU usage under high workload is increased from 44.3% to 45.%. The increase comes from the system CPU usage. User CPU usage is about the same. 29 SAP AG 17
18 s 48s 96s 144s 192s 24s 288s 336s 384s 432s 48s 528s 576s 624s 672s 72s 768s 816s 864s 912s 96s %CPU Securing the DB2 Database of your SAP System with Windows Encrypting File System Test 2: Zmerge Zmerge test is an SAP internal test program consisting of several implementations of the BW compression (condense) process: Insert/Update Update via Temp Table Merge statement Insert/Merge combination Runtime: Runtime difference is 16.3% Nonencrypted Encrypted Difference Runtime(sec) % The increase in CPU and runtime is shown in the following figure: Physical CPU usage vs. runtime Non-encrypted Encrypted The average physical CPU used is 22.3% on the non-encrypted database and 25.3% for the encrypted database. At certain points, the CPU usage was 2% higher on the encrypted database. 29 SAP AG 18
19 s 48s 96s 144s 192s 24s 288s 336s 384s 432s 48s 528s 576s 624s 672s 72s 768s 816s 864s 912s 96s 18s 156s 114s 1152s KB/sec s 48s 96s 144s 192s 24s 288s 336s 384s 432s 48s 528s 576s 624s 672s 72s 768s 816s 864s 912s 96s KB/sec Securing the DB2 Database of your SAP System with Windows Encrypting File System Overview of CPU and disk throughput on the non-encrypted database: Zmerge-Non-encrypted Read+Write KB/sec System_Time% User_Time% Overview of CPU and disk throughput on the encrypted database: Zmerge-Encrypted User_Time% System_Time% Read+Write KB/sec SAP AG 19
20 s 48s 96s 144s 192s 24s 288s 336s 384s 432s 48s 528s 576s 624s 672s 72s 768s 816s 864s 912s 96s KB/sec s 48s 96s 144s 192s 24s 288s 336s 384s 432s 48s 528s 576s 624s 672s 72s 768s 816s 864s 912s 96s 18s 156s 114s 1152s Securing the DB2 Database of your SAP System with Windows Encrypting File System Comparing system CPU usage: System_Time% System_Time%-Non-encrypted System_Time%-Encrypted System CPU usage is increased. The system CPU usage increased by 2% at the spikes. On average, System_Time% is 2.23% for the non-encrypted database and 8.1% for the encrypted database. Comparing the disk throughput rate: Total Disk Read&Write KB/sec Non-encrypted Encrypted The average read & write rate for the non-encrypted database is KB/sec and KB/sec for the encrypted database. 29 SAP AG 2
21 All in all, there is a slight impact on runtime and CPU usage for the zmerge test. There is a 15.96% degradation in runtime. The average physical CPU usage is increased from 22.3% to 25.3%. System CPU usage is increased from 2.23% to 8.1%. Test 3: Client Copy/Client Delete/SGEN: Client Copy and Client Delete are standard SAP transactions to copy or delete client-specific data to or from SAP tables. SGEN is used for SAP code generation. Runtime difference between encrypted and non-encrypted database: Nonencrypted Encrypted Difference SGEN % Client Copy % Client Delete % Test Summary: There is a slight performance impact when using EFS for the database of your SAP system. The runtime difference depends on the amount of disk activities and the number of SAP processes running the job. Zmerge test uses only one SAP process, and the job involves heavy disk read and write activities. In this case, the runtime degradation could be as high as 16%. On the other hand, the runtime difference is negligible for benchmark, sgen, and client copy/client delete tests. The total CPU usage increased from 1% to 3% which is mainly caused by system CPU usage. At certain points, there was an increase of 2% in CPU usage for a short period of time. You can choose to encrypt only the tablespaces with sensitive data instead of encrypting the whole database. By doing so, you can save system resources and reduce the performance impact of encryption. 29 SAP AG 21
22 Miscellaneous New functions with Windows 28 With the release of Windows 28, EFS has been enhanced with the following new functions: Smart card key storage EFS encryption keys and certificates can be stored on smart cards. This increases the security of those keys because they cannot be attacked by another user or by someone who steals the computer. Per-user encryption of offline files If this option is enabled, each file in the offline cache is encrypted with a public key from the user who cached the file. In previous Windows releases, the encryption of cached offline files is done with system keys. Increased configurability of EFS through Group Policy A number of new Group Policy options have been added to help administrators define and implement organizational policies for EFS. These include the ability to require smart cards for EFS, enforce page file encryption, stipulate minimum key lengths for EFS, enforce encryption of the user s documents folder, and prohibit self-signed certificates. Encrypting File System Rekeying Wizard The Encrypting File System Rekeying Wizard allows you to choose a certificate for EFS and select and migrate existing files using the newly chosen certificate. This is more efficient than decrypting and reencrypting files. File operations on encrypted files across the network With EFS file sharing, you can access an encrypted file and perform other file operations across the network. Keep in mind that EFS is not designed to protect data while it is transferred from one system to another. All EFS operations occur on the computer on which the files are stored. If you open an encrypted file on the network drive, the file is decrypted on the computer on which the file is physically stored and then transmitted in plaintext over the network to your computer. Similarly, if the encrypted files are copied or moved to or from a network file share on a remote computer, the files are decrypted locally and re-encrypted on the target volume with a new FEK. You can reduce or eliminate the risk over network by using IP security with ESP and encryption to secure data as it is transmitted, or by storing encrypted files on Web folders. For more information, see Using Encrypting File System, section Remote EFS Operations on File Shares and Web Folders. Changing user passwords The private key that is used to decrypt the file encryption key is located in the user profile under RootDirectory\Documents and Settings\username\Application Data\Microsoft \Crypto\RSA. All files in the RSA folder are automatically encrypted using a random symmetric key called user s master key. The user s master key is 64 bytes in length and is generated by a strong random number generator. Before master keys are stored, they are 3DES-encrypted using a key derived from the user s password. Note: Do not rename or move the RSA folder as this is the only folder where EFS looks for private keys. If you change your logon password using the ALT+Ctrl+Del and Change Password option, master keys are automatically unencrypted and re-encrypted using the new password. If the password is changed using the Reset password option from the user's account in the Computer Management console either by the user himself or by the administrator, the stored master key cannot be accessed anymore. As a result, the encrypted file cannot be accessed anymore. You may need to import the keys from your previous backup to access the files again. For more information, see EFS, Credentials, and Private Keys from Certificates Are Unavailable After a Password Is Reset 29 SAP AG 22
23 To avoid unexpected access errors caused by a password change, use ALT+Ctrl+Del to change the password properly. Backing up an encrypted file or folder Backing up encrypted files is as easy as backing up any other regular file. Since the backup does not require the user s private key, the file remains encrypted, regardless of its destination. Keep in mind that you can only decrypt a file if the backup is restored to a domain or local computer where authorized user accounts or data recovery agents exist and the private keys for the users are available. Performing data recovery You can log in with the data recovery agent account to recover an EFS-encrypted file for a user whose private keys are lost. The recovery agent can open the files normally and save it in non-encrypted format or deselect the encryption attribute in the file s Properties dialog box. The most secure mechanism for data recovery is to use a central recovery workstation. You can do so by using a backup utility to perform a raw backup of the encrypted files and then restore those files on a central recovery machine where the private keys for DRAs are stored. You can add extra protection for your recovery procedures by restricting the recovery agent to log on only at this workstation and placing the workstation in a physically secured area. Expired certificates (private keys) EFS user certificates Self-assigned certificates are valid for 1 years. If the certificates are issued by certification authorities, they are typically valid for only a few years. If an EFS certificate expires, users can still access the encrypted files as the private keys are stored with the user profile. However, they cannot encrypt more files with the existing certificate. When the certificate is expired, EFS automatically renews the certificate if possible. If EFS cannot renew the certificate, it requests a new certificate from a trusted enterprise CA if one is known and available. Otherwise, EFS creates a new selfsigned certificate the next time the user encrypts a file. As the renewal process is fully automatic, you may not realize that different certificates are used for your encrypted files. It is important to back up every certificate (and the keys) to ensure the files can be recovered in the future. Data recovery agent certificate When the administrator logs on to the domain control for the first time, a default domain recovery agent certificate is created, and the private key is stored in the domain administrator s profile. The default domain recovery agent certificate is valid for three years only and cannot be renewed. When the DRA s certificate is expired, the DRA can still be used to decrypt existing files as the private keys are still valid. However, you receive the error message Recovery policy configured for this system contains invalid recover certificate when trying to encrypt new files using an expired recovery certificate. For more information about how to generate a new recovery certificate using the cipher /R command and how to update the Group Policy to reflect the new DRAs, see Error message when you try to renew the default recovery agent certificate in Windows Server SAP AG 23
24 Summary Encrypting your sensitive data with EFS adds another layer of security. It is especially useful on portable computers or on computers that are shared by several users. If files are encrypted, the data is protected even if an attacker has full access to the computer s data storage. Encrypting the file or folders is a simple process. However, it takes time to plan your recovery procedure and manage the certificate and keys that are used for encryption. If EFS is not used properly, you may not be able to access the encrypted file anymore, or the encrypted data can be easily decrypted by others. Our tests showed a slight performance hit in terms of CPU usage and runtime. All in alll, the performance impact is acceptable. 29 SAP AG 24
25 Related Content How to Use the Encrypting File System Best Practice for the Encrypting File Systems Overview of Encrypting filesystem from Microsoft Encrypting file systems on Wikipedia Encrypting file system for Windows Vista Microsoft Encrypting File System in Windows XP and Windows Server 23 Implementing EFS in a Windows Server 23 domain Changes in EFS windows 7 and windows 28 R2 Using Encrypting Filesystem 29 SAP AG 25
26 Disclaimer and Liability Notice This document may discuss sample coding or other information that does not include SAP official interfaces and therefore is not supported by SAP. Changes made based on this information are not supported and can be overwritten during an upgrade. SAP will not be held liable for any damages caused by using or misusing the information, code or methods suggested in this document, and anyone using these methods does so at his/her own risk. SAP offers no guarantees and assumes no responsibility or liability of any type with respect to the content of this technical article or code sample, including any liability resulting from incompatibility between the content within this document and the materials and services offered by SAP. You agree that you will not hold, or seek to hold, SAP responsible or liable with respect to the content of this document. 29 SAP AG 26
Guide to Securing Microsoft Windows 2000 Encrypting File System
Report Number: C4-006R-01 Guide to Securing Microsoft Windows 2000 Encrypting File System Systems and Network Attack Center (SNAC) Authors: Graham Bucholz Harley Parkes Updated: January 2001 Version 1.0
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Objectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
VMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Lenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
Arcserve Backup for Windows
Arcserve Backup for Windows Agent for Microsoft SharePoint Server Guide r16 Pre-release Document, only for reference This Documentation, which includes embedded help systems and electronically distributed
Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012
Sophos Disk Encryption License migration guide Product version: 5.61 Document date: June 2012 Contents 1 About this guide...3 2 Add encryption to an existing Sophos security solution...5 3 SDE/SGE 4.x
Backup Manager Configuration and Deployment Guide. Version 9.1
Backup Manager Configuration and Deployment Guide Version 9.1 Contents Backup Manager 3 Backup Manager Support 9 Backup Manager Configuration and Deployment 14 Defining a Backup Manager Profile 14 Configuring
NetWrix Password Manager. Quick Start Guide
NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
Using Microsoft Windows Encrypted File System (EFS)
Using Microsoft Windows Encrypted File System (EFS) Agenda Protecting our Data Types of Data What is EFS How to use EFS Best Practices Protecting our Data Two types of disk encryption: Full Disk Encryption
Symantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities White Paper: Enterprise Security Symantec Backup Exec 11d for Windows Servers Contents Executive
BackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
RecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Installation Guide. Capacity Planner 3.0 EN-000688-00
Capacity Planner 3.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Moving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
BackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
SAS 9.3 Foundation for Microsoft Windows
Software License Renewal Instructions SAS 9.3 Foundation for Microsoft Windows Note: In this document, references to Microsoft Windows or Windows include Microsoft Windows for x64. SAS software is licensed
Online Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
Online Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
PUBLIC Password Manager for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP1 Document Version: 1.0 2015-10-02 PUBLIC Password Manager for SAP Single Sign-On Implementation Guide Content 1 Password Manager....4 2 Password Manager Installation Guide....5
Using Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
Deploying EFS: Part 2
Deploying EFS: Part 2 John Morello You can think of any Encrypting File System (EFS) deployment as having essentially two parts: the back-end design portion focusing on certificate management and recovery
vsphere Replication for Disaster Recovery to Cloud
vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Reconfiguring VMware vsphere Update Manager
Reconfiguring VMware vsphere Update Manager vsphere Update Manager 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
EFS Table of Contents
Encrypting File System for Windows 2000 Abstract This document provides an executive summary and a technical overview of the encrypting file system (EFS) that will be included with the Microsoft Windows
Windows Offline Files
Windows Offline Files 1. Description: Windows Offline Files or Client Side Caching (CSC) allows files and folders stored on any Server Message Block (SMB) network share to be available offline. To further
Active Directory Software Deployment
APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This
SafeGuard Enterprise upgrade guide. Product version: 6.1
SafeGuard Enterprise upgrade guide Product version: 6.1 Document date: February 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6
Online Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
Deploying EFS: Part 1
Security Watch Deploying EFS: Part 1 John Morello By now, everyone has heard reports about personal or sensitive data being lost because of laptop theft or misplacement. Laptops go missing on a regular
SafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
IIS Deployment Procedures
A P P E N D I X A IIS Deployment Procedures In This Appendix Assign Additional IP Addresses to a Network Adapter... 313 Assign a Server Certificate to a Web Site... 313 Back Up and Restore Registry Entries...
Active Directory Adapter with 64-bit Support Installation and Configuration Guide
IBM Security Identity Manager Version 6.0 Active Directory Adapter with 64-bit Support Installation and Configuration Guide SC27-4384-02 IBM Security Identity Manager Version 6.0 Active Directory Adapter
Vector Asset Management User Manual
Vector Asset Management User Manual This manual describes how to set up Vector Asset Management 6.0. It describes how to use the: Vector AM Console Vector AM Client Hardware Inventory Software Inventory
Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
Lepide Exchange Recovery Manager
Configuration Guide Lepide Exchange Recovery Manager Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
YubiKey PIV Deployment Guide
YubiKey PIV Deployment Guide Best Practices and Basic Setup YubiKey 4, YubiKey 4 Nano, YubiKey NEO, YubiKey NEO-n YubiKey PIV Deployment Guide 2016 Yubico. All rights reserved. Page 1 of 27 Copyright 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
SEER Enterprise Shared Database Administrator s Guide
SEER Enterprise Shared Database Administrator s Guide SEER for Software Release 8.2 SEER for IT Release 2.2 SEER for Hardware Release 7.3 March 2016 Galorath Incorporated Proprietary 1. INTRODUCTION...
NexentaConnect for VMware Virtual SAN
NexentaConnect for VMware Virtual SAN User Guide 1.0.2 FP3 Date: April, 2016 Subject: NexentaConnect for VMware Virtual SAN User Guide Software: NexentaConnect for VMware Virtual SAN Software Version:
safend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
VMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
DOCUMENTATION MICROSOFT WINDOWS SYSTEM BACKUP AND RESTORE OPERATIONS
DOCUMENTATION MICROSOFT WINDOWS SYSTEM BACKUP AND RESTORE Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication
Disk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
Figure 1: Restore Tab
Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup
Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide
Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection
4 Backing Up and Restoring System Software
4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring
AD CS. http://technet.microsoft.com/en-us/library/cc731564.aspx
AD CS AD CS http://technet.microsoft.com/en-us/library/cc731564.aspx Active Directory Certificate Services (AD CS) is an Identity and Access Control security technology that provides customizable services
WhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
Sophos Enterprise Console server to server migration guide. Product version: 5.2
Sophos Enterprise Console server to server migration guide Product : 5.2 Document date: December 2014 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the
HP ProtectTools User Guide
HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark
Online Backup Client User Manual
For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.
Xcalibur Global Version 1.2 Installation Guide Document Version 3.0
Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.
Embarcadero Performance Center 2.7 Installation Guide
Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.
English ETERNUS CS800 S3. Backup Exec OST Guide
English ETERNUS CS800 S3 Backup Exec OST Guide Edition April 2012 Comments Suggestions Corrections The User Documentation Department would like to know your opinion on this manual. Your feedback helps
Backup and Disaster Recovery Restoration Guide
Backup and Disaster Recovery Restoration Guide Page 1 Table of Contents Table of Contents...2 Terms of Use...3 BDR...4 Creating Point-in-Time Restoration Volumes...4 Mounting a Restoration Volume...4 Dismounting
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in
VERITAS NetBackup 6.0 for Microsoft Exchange Server
VERITAS NetBackup 6.0 for Microsoft Exchange Server System Administrator s Guide for Windows N152688 September 2005 Disclaimer The information contained in this publication is subject to change without
VERITAS NetBackup 6.0 Encryption
VERITAS NetBackup 6.0 Encryption System Administrator s Guide for UNIX, Windows, and Linux N15274C September 2005 Disclaimer The information contained in this publication is subject to change without notice.
NovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
vcenter Configuration Manager Backup and Disaster Recovery Guide VCM 5.3
vcenter Configuration Manager Backup and Disaster Recovery Guide VCM 5.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
NovaBACKUP xsp Version 12.2 Upgrade Guide
NovaBACKUP xsp Version 12.2 Upgrade Guide NovaStor / August 2011 Rev 20110815 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications
Automation License Manager
s Contents Product Overview 1 Installation 2 Working with the Automation License Manager 3 Glossary Manual Index 12/2008 A5E02389428-01 Legal information Warning notice system This manual contains notices
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
SELF SERVICE RESET PASSWORD MANAGEMENT ADMINISTRATOR'S GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT ADMINISTRATOR'S GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any
Creating Transaction and Screen Variants
Creating Transaction and Screen Variants Applies to: Tested on SAP version ECC 6. Summary This article explain a way to create Transaction and Screen Variants to change screen layouts. And how to assign
Quick Start - NetApp File Archiver
Page 1 of 19 Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2: Install
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Browser-based Support Console
TECHNICAL PAPER Browser-based Support Console Mass deployment of certificate Netop develops and sells software solutions that enable swift, secure and seamless transfer of video, screens, sounds and data
SafeGuard Enterprise Web Helpdesk
SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk
DriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
SonicOS Enhanced 3.8.0.6 Release Notes TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007
SonicOS Enhanced 3.8.0.6 TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007 CONTENTS PLATFORM COMPATIBILITY SONICWALL RECOMMENDATIONS KNOWN ISSUES RESOLVED KNOWN ISSUES UPGRADING
Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue: 2.0.08
Zen Internet Online Data Backup Zen Vault Express for Windows Issue: 2.0.08 Contents 1 Introduction... 3 1.1 System Requirements... 3 2 Installation... 5 2.1 The Setup WIzard... 5 3 The Backup Service...
Kaseya 2. User Guide. Version 1.1
Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.
Exchange Brick-level Backup and Restore
WHITEPAPER BackupAssist Version 4 Exchange Mailbox Add-on www.backupassist.com 2 Contents 1. Introduction and Overview... 3 1.1 What does the Exchange Mailbox Add-on do?... 3 1.2 Who needs the Exchange
Online Backup Client User Manual Windows
Online Backup Client User Manual Windows 1. Product Information Product: Online Backup Client Version: 4.3.5 1.1 System Requirements Operating System Windows XP Windows Vista, Windows 7, Windows 8 Windows
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
