advantages and disadvantages of EFS and effective recovery of encrypted data
|
|
|
- Aron Jenkins
- 10 years ago
- Views:
Transcription
1 advantages and disadvantages of EFS and effective recovery of encrypted data whitepaper Copyright (c) 2007 ElcomSoft Co.Ltd.
2 Contents What is EFS? 3 EFS advantages and disadvantages 4 Data can be lost for good 5 How can one lose access to EFS-encrypted data? What is the EFS Recovery Agent? What to do in case of system failure? 7 Possible actions to take Data decryption scheme Advanced EFS Data Recovery 8 About ElcomSoft 10 whitepaper 2
3 What is EFS? One of the innovations in the Microsoft Windows 2000 and the NTFS 5.0 file system was the Encrypting File System (EFS) technology, which is designed to quickly encrypt files on the computer hard drive. NTFS by itself has built-in protection. However, as is frequently the case, it very quickly required additional security. The reason was the wide-spread use of NTFSDos-type utilities, which made it easy to circumvent the NTFS security system, gaining access to it through DOS, thus ignoring the set access rights. The EFS system uses both public and private key encryption and CryptoAPI architecture. EFS can use any symmetrical file encryption algorithm from the following list: Microsoft Windows 2000 used DESX, Windows XP used 3DES, and Windows XP SP1, 2003 and the new Windows Vista use AES. File encryption does not require the user to execute any preliminary operations. During the first encryption of the file, an encryption certificate and a private key are automatically issued for the user. One of the distinguishing convenient features of EFS is that the files remain encrypted when they are transferred to a different folder or to a different NTFS drive. If the transfer is to a different file system, the files are automatically decrypted. When the user adds new files to an encrypted folder, they are automatically encrypted. There is no need to decrypt a file before using, since EFS is embedded in the operating system and will execute this function automatically, while observing all security measures. The creators of EFS have also ensured against the loss of the private key by the user, for example as a result of OS reinstallation, or when new user accounts were created. Here, the speciallydesigned EFS Recovery Agent can be used to decrypt files. In Windows 2000 the Recovery Agent is represented by either local administrator (when working on a stand-alone computer) or domain administrator (if the computer operates within a domain). In Windows XP and above this had to be done manually. In this White Paper we will assess the advantages and disadvantages of EFS technology and also review the different options for restoring encrypted data using EFS, in the event of password loss or system failure. whitepaper 3
4 EFS advantages and disadvantages EFS technology makes it so that files encrypted by one user cannot be opened by another user if the latter does not possess appropriate permissions. After encryption is activated, the file remains encrypted in any storage location on the disk, regardless of where it is moved. Encryption is can be used on any files, including executables. The user with permission to decrypt a file is able to work with the file like with any other, without experiencing any restrictions or difficulties. Meanwhile, other users receive a restricted access notification when they attempt to access the EFS encrypted file. This approach is definitely very convenient. The user gets the opportunity to reliably and quickly (using standard means) limit access to confidential information for other household members or colleagues who also use the computer. EFS seems like an all-around winning tool, but this is not the case. Data encrypted using this technology can be entirely lost, for example during operating system reinstallation. We should remember that the files on disk are encrypted using the FEK (File Encryption Key), which is stored in their attributes. FEK is encrypted using the master key, which in turn is encrypted using the respective keys of the system users with access to the file. The user keys themselves are encrypted with the users password hashes, and the password hashes use the SYSKEY security feature. This chain of encryption, according to EFS developers, should reliably protect data, but in practice, as explained below, the protection can be ultimately reduced to the good old login-password combination. Thanks to this encryption chain, if the password is lost or reset, or if the operating system fails or is reinstalled, it becomes impossible to gain access to the EFS-encrypted files on the drive. In fact, access can be lost irreversibly. Regular users do not fully understand how EFS works and often pay for it when they lose their data. Microsoft has issued EFS documentation that explains how it works and the main issues that may be encountered when encrypting, but these are difficult for regular users to understand, and few read the documentation before starting to work. whitepaper 4
5 Data can be lost for good Let s figure out in what situations can EFS-encrypted data can be lost. How dangerous can a situation be? We ll take it from the top. How can one lose access to EFS-encrypted data? Almost all of us have encountered a situation where it was necessary to fully reinstall Windows. This may have been due to the operating system s functioning being disrupted by software failure, a virus attack, or a mistake made by an inexperienced user, the system password for a user account was lost or a user profile was deleted. In this case, all encrypted data in the old configuration would most likely be lost. Consider the following typical scenarios in detail: 1. The system is not booting due a component having been replaced or failed or due to operating system failure. For example, the motherboard is out of order, the boot sector is damaged, system files are corrupted, some half-baked updates or a different unstable piece of software was installed. In this case, the hard drive can be connected to a different computer and the data can be read off it, but if it is EFS encrypted, this would not work. 2. The system administrator at the company or the user has reset the user password. In this case, access to EFS-encrypted data would also be lost. 3. The user profile was deleted. In this case, the files (and the user keys) may still be on the disk, but the system cannot see them, even if the user is recreated with the same name, a different ID will be assigned to the account, which is used in the encryption process. In this situation, access to the data encrypted using EFS will also be lost. 4. The user is migrated to a different domain (is authenticated through a different server). If the user encryption keys were stored on the server at the times of the migration (usually this is the case), then an unprofessional migration can result in the loss of access to the EFSencrypted data. 5. System reinstallation. In this case, access to EFS-encrypted data would naturally be lost. If a backup copy of the entire system disk is made at the time, or at least of the user profile ( Documents and Settings ), then access could be restored with the use of special software, but only if the keys are not damaged. It is fairly common for the system itself to be stored on one disk, while encrypted files are stored on a different disk. When the administrator reinstalls the operating system, usually a backup of just the disk with the data is made and then the system is reinstalled. Obviously, in this case the keys are lost and with them goes the access to encrypted data. It should be said that there is a straightforward way to avoid this situation, if before using EFS the EFS Recovery Agent is set up, but this, just like the workings of EFS in general, are too complicated for the average user, as demonstrated below. whitepaper 5
6 What is the EFS Recovery Agent? The EFS Recovery Agent is a user with permission to decrypt data, encrypted by another user, if the latter lost the encryption certificate keys or if the user s account was deleted, but the encrypted data is needed. As a rule, the Recovery Agent is the Administrator, but it can also be a different user. There can be multiple Recovery Agents. In order to assign Recovery Agent permissions to a user, first Recovery Agent certificates need to be created using the command Cipher /R: filename, where filename is the path and name of the created certificates without the extension. After this, the user will be asked to enter a password to protect the private key and to confirm it (the password is not displayed in the console on entry). Then two files are created with the specified name: *.cer and *.pfx. These contain the public and private certificate keys, respectively. Now the certificate must be added to the user s personal storage, specified by the Recovery Agent (this step can be skipped, then the Recovery Agent can do it later, when the recovery functions need to be used) importing the file *.pfx (double-click on the file icon to launch the certificate import wizard). Here, the administrator had to open the Local Security Settings snap-in (Start - Run - secpol.msc), select Public Key Policy - EFS and in the menu Action select Add Data Recovery Agent. The Add Recovery Agent Wizard, will open, and on the second page one must click on View folders and select the *.cer file created earlier. In order to restore access to the encrypted files after system reinstallation or after a private key had been lost, the Recovery Agents private keys must be kept in a secure location or (if they are not assigned), the private keys of all users using EFS, by exporting them from the Private depository of the Certificates snap-in (certmgr.msc). In Windows Vista, there is finally a way to store the keys on a smart card, which is much more reliable in terms of security. It is clear that this kind of safety measure with the use of the EFS Recovery Agent contradicts its intended principle of simplicity and requires non-trivial, from the average user s point of view, though routine for an administrator, actions and manipulations. It is no surprise that few use it. It should be noted that if the administrator tried to reset the account password for a local user, the user will lose all private certificates and with them the access to EFS-encrypted files (a corresponding warning will appear when this action is attempted). The same will happen if the local administrator, using special means, tried to force a password change (i.e., without entering the old password). Consequently, the risk of losing the most important data, encrypted using EFS technology, when there is a system failure or due to an administrator/user error, is rather high and must always be taken into consideration. whitepaper 6
7 What to do in case of system failure? The typical situation in which access to EFS-encrypted data is lost takes place when the connection between the operating system and the keys physically located on the disk (cf. situations described in section How can one lose access to EFS-encrypted data? ) is lost. In this case do not give up, there is a solution. There is high probability that access to the data can be restored. But if the keys had been deleted from the disk and no backup copy of the user profile or the user s certificates had been made, then the data is indeed unrecoverable. Practice shows that even the export/import of the profile or the certificates proves to be effective: the keys do reappear in the system, but access to the encrypted data is not restored. If you find yourself in this situation and the EFS-encrypted data has become inaccessible despite the keys having been saved, then it is possible to use a specialized piece of software, which is highly likely to help restore access to the data. Possible actions to take Here we will try to describe the various possible actions that could be taken in this situation. You have a few options: 1. Boot using the working user account with administrator privileges, if it exists, and continue with the installation of the special decryption software. 2. Physically disconnect the hard drive and install it on a different workstation running decryption software. 3. Boot up using a different operating system, installed on the same machine, if it is installed, or install it specifically for this purpose. Most importantly, you need to gain direct access to the disk. If following the first route, this is possible only for users with administrator permissions. This is why when the backup/working user account is insufficient you can try to expand the account permissions. Data decryption scheme Once direct access to the disk has been obtained, it is possible to move on to the next step directly decrypting and restoring the data. This can be done according to the following plan: 1. Search for and try to decrypt all keys on the hard drive of the problem computer. 2. Search for encrypted files on the hard drive and try to decrypt them. One of the most effective tools, designed to decrypt EFS-protected data, is the Advanced EFS Data Recovery tool. It can be used to decrypt data on a problem computer, even in the case where some of the user key records are corrupted. The possibilities and features of Advanced EFS Data Recovery are presented in detail below. whitepaper 7
8 Advanced EFS Data Recovery EFS Data Recovery (AEFSDR) is a specialized software program for decrypting files, encrypted using EFS technology in Microsoft Windows 2000 and Windows XP, Windows 2003 Server and the new Windows Vista environments. This software tool can be used to decrypt files in record time, even when the system does not load or when some of the encryption key records are corrupted. Even if the system user database is protected using SYSKEY, Advanced EFS Data Recovery still makes it possible to decrypt the files. In Windows 2000 it is possible to decrypt all files, even if the administrator and user passwords are not known. Advanced EFS Data Recovery uses a two-step process: 1. The first step is to search for all EFS keys (private and master) and try to decrypt them. The first step involves decrypting at least one key, required for decryption the rest of the files. In Windows XP and above this may require that the user password be entered into AEFSDR, which was used to encrypt the files, or the Recovery Agent password. First the program tries to do this automatically, for example trying to extract the password from cache or system files, checking simple combinations (such as password=username) and then conducts an attack using a medium-sized built-in dictionary. Fig. 1. Tab showing the computer search and decryption of private EFS keys. whitepaper 8
9 2. At the second stage, the program runs a search using the EFS-encrypted files on a hard drive and also attempts to decrypt. If there are few encrypted files and their location is known, the user can manually select these files in the program File tree in the interest of saving time. It may turn out that the keys are stored on the network server, while the files encrypted using those keys are stored locally. In this case, use AEFSDR to first retrieve and decrypt the keys stored on the server and then use the Backup data option to save the results to a file and transfer them to the local machine. This way the results of the first stage of the process can be transferred to the machine with the encrypted data to start the second stage of the process. The file decryption process can take a significant amount of time, so one of the key advantages of Advanced EFS Data Recovery is the ability to manage the system load. The user can chose between three load levels: High, Normal and Low. Another notable feature is that Advanced EFS Data Recovery fully supports the newest Microsoft Windows Vista operating system as well as Windows Server In conclusion, it is important to talk about the effectiveness of the product in question, i.e., the likelihood of successful data decryption. According to the assessment of ElcomSoft experts, Advanced EFS Data Recovery can be used to successfully restore up to 99% of EFS-encrypted data, if the user keys are retrieved, which is a very high success rate. You can download a trial version of Advanced EFS Data Recovery here. Fig. 2. Tab showing search results and files decryption. whitepaper 9
10 About ElcomSoft Founded in 1990 in Moscow, Russia, ElcomSoft is a leader in the password/system recovery and forensics market. Thanks to one-of-a-kind technologies, ElcomSoft s products have garnered wide recognition both in Russia and abroad. ElcomSoft s clients include many well known international companies from the following sectors: High Tech: Microsoft, Adobe, IBM, Cisco Governmental: FBI, CIA, US Army, US Navy, Department of Defence Consulting: Andersen Consulting, Deloitte & Touche, Ernst and Young, KPMG, PricewaterhouseCoopers Finance: Bank of America, Citibank, Equifax, HSBC, Wells Fargo, J.P.Morgan, Credit Suisse Telecommunications: France Telecom, BT, AT&T Insurance: Allianz, Mitsui Sumitomo Retail: Wal-Mart, Best Buy, Woolworth Media&Entertainment: Sony Entertainment Manufacturing: Volkswagen, Siemens, Boeing Energy: Lukoil, Statoil Pharmaceuticals: Johnson&Johnson, Pfizer, GlaxoSmithKline, Novartis ElcomSoft is a Microsoft Gold Certified Partner, Intel Software Partner, as well as a member of the Russian Cryptology Association, the Computer Security Institute (CSI), and the Association of Shareware Professionals (ASP). ElcomSoft is an acknowledged expert in the password/system recovery and forensics market. The company s technological achievements and opinion leadership is quoted in many authoritative publications. For example: Microsoft Encyclopedia of Security, The art of deception (Kevin Mitnick), IT Auditing: Using Controls to Protect Information Assets (Chris Davis), Hacking exposed (Stuart McClure). Visit our website to find out more. Address: Elcomsoft Zvezdny bulvar 21, office Moscow, Russian Federation Fax: US (toll-free): +1 (866) United Kingdom: +44 (870) Germany: Websites: whitepaper 10
11 Copyright (c) 2007 ElcomSoft Co.Ltd. All right reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. Microsoft and Windows are registered trademarks of Microsoft Corporation. Intel and Intel logo are registered trademarks of Intel Corporation. Elcomsoft and Elcomsoft logo are trademarks or registered trademarks of ElcomSoft Co.Ltd. Other names may be trademarks of their respective owners.
An effective approach to restoring system access in Windows
An effective approach to restoring system access in Windows whitepaper Copyright (c) 2007 ElcomSoft Co.Ltd. Contents Introduction 3 Everyone loses passwords 4 What are the consequences of losing a system
Proactive is better than reactive
Proactive is better than reactive testing password safety a key to securing a corporate network Copyright (c) 2007 ElcomSoft Co.Ltd. Contents Introduction 3 Not all passwords are created equal 4 How to
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
Novell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
Symantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012
Sophos Disk Encryption License migration guide Product version: 5.61 Document date: June 2012 Contents 1 About this guide...3 2 Add encryption to an existing Sophos security solution...5 3 SDE/SGE 4.x
safend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista
TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...
Guide to Securing Microsoft Windows 2000 Encrypting File System
Report Number: C4-006R-01 Guide to Securing Microsoft Windows 2000 Encrypting File System Systems and Network Attack Center (SNAC) Authors: Graham Bucholz Harley Parkes Updated: January 2001 Version 1.0
An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
Full Disk Encryption Agent Reference
www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or
Dell Recovery Manager for Active Directory 8.6. Quick Start Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
Windows Domain Network Configuration Guide
Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication may
For Active Directory Installation Guide
For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically
Deploying EFS: Part 1
Security Watch Deploying EFS: Part 1 John Morello By now, everyone has heard reports about personal or sensitive data being lost because of laptop theft or misplacement. Laptops go missing on a regular
Symantec Backup Exec 2010 R2. Quick Installation Guide
Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Setup and Configuration Guide for Pathways Mobile Estimating
Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Update 0 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for
Trusted Platform Module (TPM) Quick Reference Guide
Trusted Platform Module (TPM) Quick Reference Guide System builders/integrators should give this Guide to the system owners to assist them in enabling and activating the Trusted Platform Module. Warning
White Paper A New RAID Configuration for Rimage Professional 5410N and Producer IV Systems November 2012
White Paper A New RAID Configuration for Rimage November 2012 Combining RAID 5 and RAID 0 to Reduce the Impact of Hard Drive Failures Rimage is changing the hard drive layout and RAID configurations for
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Hosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
An Oracle White Paper July 2013. Introducing the Oracle Home User in Oracle Database 12c for Microsoft Windows
An Oracle White Paper July 2013 Introducing the Oracle Home User Introduction Starting with Oracle Database 12c Release 1 (12.1), Oracle Database on Microsoft Windows supports the use of an Oracle Home
CA ARCserve Backup for Windows
CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for
Acronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
Xopero Centrally managed backup solution. User Manual
Centrally managed backup solution User Manual Contents Desktop application...2 Requirements...2 The installation process...3 Logging in to the application...6 First logging in to the application...7 First
Active Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not
NetBak Replicator 4.0 User Manual Version 1.0
NetBak Replicator 4.0 User Manual Version 1.0 Copyright 2012. QNAP Systems, Inc. All Rights Reserved. 1 NetBak Replicator 1. Notice... 3 2. Install NetBak Replicator Software... 4 2.1 System Requirements...
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
CLIENT CERTIFICATE (EAP-TLS USE)
PRIMEXIAQ & TEMP SERIES SENSORS CLIENT CERTIFICATE (EAP-TLS USE) SETUP GUIDE Doc Part No.: SNSDOC-055 01.26.15 Legal Notice Copyright 2015 Primex Wireless, Inc. All rights reserved. SNS is a trademark
TPM. (Trusted Platform Module) Installation Guide V2.1
TPM (Trusted Platform Module) Installation Guide V2.1 Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM... 6 2.2 Installing
Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide
Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright
VMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
2007 Microsoft Office System Document Encryption
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
Full Disk Encryption Pre-Boot Authentication Reference
www.novell.com/documentation Full Disk Encryption Pre-Boot Authentication Reference ZENworks 11 Support Pack 4 Beta April 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description June 2013 V1.0 Release of the first version i Software Developer s Agreement All Products of Feitian
.CRF. Electronic Data Capture and Workflow System for Clinical Trials
.CRF Electronic Data Capture and Workflow System for Clinical Trials Business challenge Most research takes place in different centers simultaneously. These are often located in different cities or even
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista
Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista [email protected] [email protected] November 2007 www.gemalto.com All information herein
ChangeAuditor. Migration Guide CA-MG-0808-470
ChangeAuditor Migration Guide CA-MG-0808-470 Copyright 2008 NetPro Computing, Inc. Disclaimer NetPro Computing, Inc. (NetPro) makes no representations or warranties, either expressed or implied, with
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
Use QNAP NAS for Backup
Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information
Parallels Virtuozzo Containers 4.6 for Windows
Parallels Parallels Virtuozzo Containers 4.6 for Windows Upgrade Guide Copyright 1999-2010 Parallels Holdings, Ltd. and its affiliates. All rights reserved. Parallels Holdings, Ltd. c/o Parallels International
NSS Volume Data Recovery
NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management
User Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
Windows Peer-to-Peer Network Configuration Guide
Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
ScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
LogMeIn Backup. Getting Started Guide
LogMeIn Backup Getting Started Guide Contents Getting Started with LogMeIn Backup...3 About LogMeIn Backup...3 How does LogMeIn Backup Work, at-a-glance?...3 About Security in LogMeIn Backup...3 LogMeIn
Installation & Activation Guide
Lepide Exchange Recovery Manager Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights reserved under the
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0
Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5
Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide
Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
X.509 Certificate Generator User Manual
X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright
visionapp Remote Desktop 2010 (vrd 2010)
visionapp Remote Desktop 2010 (vrd 2010) Convenient System Management P roduct Information www.vrd2010.com Inhalt 1 Introduction... 1 2 Overview of Administration Tools... 1 2.1 RDP Administration Tools...
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
Egress Switch Reader. User Guide 2.3
Egress Switch Reader User Guide 2.3 November 2015 Confidentiality statement This document contains information confidential and proprietary to Egress Software Technologies. It shall not be disclosed in
How to Reinstall SQL Server 2005
How to Reinstall SQL Server 2005 Sometimes a problem occurs during the installation of SQL Server and it needs to be completely reinstalled. This quick reference guide will help you reinstall SQL Server
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
SafeGuard Easy upgrade guide. Product version: 7
SafeGuard Easy upgrade guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6 4.1 Upgrade
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1
DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or
Sophos Anti-Virus for NetApp Storage Systems startup guide
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R
Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install
HP ProtectTools for Small Business Security Software, Version 5.10. User Guide
HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SafeGuard Enterprise upgrade guide. Product version: 7
SafeGuard Enterprise upgrade guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6 4.1
CTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
Mobile Secure Cloud Edition Document Version: 2.0-2014-06-26. ios Application Signing
Mobile Secure Cloud Edition Document Version: 2.0-2014-06-26 Table of Contents 1 Introduction.... 3 2 Apple Team Membership....4 3 Building a Team by Adding Team Admins and Team Members.... 5 4 App Protection
In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.
QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)
CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
SysInfoTools MS SQL Database Recovery
SysInfoTools MS SQL Database Recovery Table Of Contents 1. SysInfoTools MS SQL Database Recovery... 2 2. Overview... 2 3. Getting Started... 3 3.1 Installation procedure... 4 4. Order and Activation...
Dell Recovery Manager for Active Directory 8.6.0
Dell Recovery Manager for Active Directory 8.6.0 April, 2014 These release notes provide information about the Recovery Manager for Active Directory release. About Recovery Manager for Active Directory
Privileged Access Management Upgrade Guide
Privileged Access Management Upgrade Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0
UltraBac Documentation UBDR Gold Bare Metal Disaster Recovery Administrator Guide UBDR Gold v8.0 UBDR Administrator Guide UBDR Gold v8.0 The software described in this guide is furnished under a license
Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5
Administration Quick Start
www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
Dell Client Profile Updating Utility 5.5.6
Complete Product Name with Trademarks Version Dell 5.5.6 April 21, 2015 These release notes provide information about the Dell release. Welcome to What's New Known issues Upgrade and Compatibility System
NetWrix Account Lockout Examiner Version 4.0 Administrator Guide
NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email
NovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
Synchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
Dell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
SafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
CA VPN Client. User Guide for Windows 1.0.2.2
CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
DriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
NetIQ Advanced Authentication Framework - Administrative Tools. Installation Guide. Version 5.1.0
NetIQ Advanced Authentication Framework - Administrative Tools Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 NetIQ Advanced Authentication
Using Symantec NetBackup with VSS Snapshot to Perform a Backup of SAN LUNs in the Oracle ZFS Storage Appliance
An Oracle Technical White Paper March 2014 Using Symantec NetBackup with VSS Snapshot to Perform a Backup of SAN LUNs in the Oracle ZFS Storage Appliance Introduction... 2 Overview... 3 Oracle ZFS Storage
