SecureDoc for Mac v6.1. User Manual
|
|
|
- Kristina Reeves
- 10 years ago
- Views:
Transcription
1 SecureDoc for Mac v6.1 User Manual
2 Copyright by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada and the United States of America. WinMagic advises all customers that they are responsible for familiarizing themselves with these regulations. Exports and reexports of WinMagic Inc. products are subject to Canadian and US export controls administered by the Canadian Border Services Agency (CBSA) and the Commerce Department s Bureau of Industry and Security (BIS). For more information, visit WinMagic s web site or the web site of the appropriate agency. WinMagic, SecureDoc, SecureDoc Enterprise Server, Compartmental SecureDoc, SecureDoc PDA, SecureDoc Personal Edition, SecureDoc RME, SecureDoc Removable Media Encryption, SecureDoc Media Viewer, SecureDoc Express, SecureDoc for Mac, MySecureDoc, MySecureDoc Personal Edition Plus, MySecureDoc Media, PBConnex and SecureDoc Central Database are trademarks and registered trademarks of WinMagic Inc., registered in the US and other countries. All other registered and unregistered trademarks herein are the sole property of their respective owners WinMagic Inc. All rights reserved. Acknowledgements This product includes cryptographic software written by Antoon Bosselaers, Hans Dobbertin, Bart Preneel, Eric Young ([email protected]) and Joan Daemen and Vincent Rijmen, creators of the Rijndael AES algorithm. This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( WinMagic would like to thank these developers for their software contributions. Contacting WinMagic WinMagic 200 Matheson Blvd West, Suite 201 Mississauga, Ontario, L5R 3L7 toll free: phone: (905) fax: (905) Sales: [email protected] Marketing: [email protected] Human Resources: [email protected] Technical Support: [email protected] For information: [email protected] For billing inquiries: [email protected] WinMagic Inc. SecureDoc for Mac User Manual 2
3 About SecureDoc for Mac SecureDoc for Mac securely encrypts the hard disk in your Mac computer (desktop or laptop). When the disk has been encrypted, SecureDoc's pre-boot authorization window (boot logon) appears each time you start the computer. At this window you must enter a SecureDoc password to complete the authentication and gain access to the encrypted data on your Mac. SecureDoc for Mac can also be used to encrypt and decrypt USB flash drives, protecting them with either a password or a key. This manual describes the functions of both SecureDoc for Mac when installed as a standalone application, or when installed as part of a SecureDoc Enterprise Server (SES) environment; the differences between the two will be noted in the document. WinMagic Inc. SecureDoc for Mac User Manual 3
4 About SecureDoc for Mac 3 Getting Started with SecureDoc for Mac 6 SecureDoc for Mac or FileVault 2 6 System Requirements (SecureDoc for Mac) 6 Installing SecureDoc for Mac 6 Step 1: Installing Software 6 Step 2: Encrypting a Hard Disk 8 Step 3: Create Data Recovery Media 8 SecureDoc and Boot Camp 10 Silent Installation 10 Accessing the encrypted hard disk 10 For SED Users: Firmware Updates 11 Uninstalling SecureDoc for Mac 12 Using SecureDoc for Mac 13 Customizing Boot Logon 13 Encrypting USB Media 14 Accessing Encrypted Removable Media 16 Accessing Using Encryption Key 16 Accessing Using Password 17 Working with Password-Protected USB Media 17 Changing your Password 18 Acceptable Passwords 19 Changing or Setting Self-Help Answers 20 Recovering from a Lost Password 20 WinMagic Inc. SecureDoc for Mac User Manual 4
5 Creating a Backup Key File 20 Using Recovery Media 21 Performing Cryptographic Engine Tests 21 Enabling/Disabling Hardware Protection (SED Boot Drive Only) 22 Enabling/Disabling Single Sign-On or Single Sign-On and Password Sync 22 Communicating with the Server 23 Performing Crypto-Erase 23 SecureDoc and FileVault 2 24 System Requirements 24 Installation and encryption 24 Giving local accounts access to the encrypted drive 26 Removing SecureDoc and FileVault 2 encryption 27 WinMagic Inc. SecureDoc for Mac User Manual 5
6 Chapter 1 SecureDoc for Mac or FileVault 2 GETTING STARTED WITH SECUREDOC FOR MAC Your SES administrator may have given you a FileVault 2 installation package. FileVault 2 is the native encryption engine on the Mac OS X operating system. SES can manage devices with both SecureDoc (i.e., SecureDoc for Mac) or FileVault 2 encryption. If you have a FileVault 2 installation package (check the filename), then see "Securedoc and FileVault 2" on page 1. If you have a SecureDoc for Mac installation package, then follow the instructions in this chapter. System Requirements (SecureDoc for Mac) Operating system and hardware requirements are listed here. To create data recovery media (highly recommended), you need a USB flash drive, CD, or DVD of at least 32MB capacity that can be reserved exclusively for data recovery purposes. Installing SecureDoc for Mac Before installing SecureDoc for Mac we recommend that you backup your computer and then run a disk utility to check the status of your hard drive. Step 1: Installing Software Note: If you are installing SecureDoc for Mac on a laptop, then make sure the laptop is connected to a power supply for the duration of the installation and encryption process. 1. Log in to the Mac with an account that has administrator rights. Note: If your Mac has multiple bootable volumes, log in to the volume where you want SecureDoc installed. Any additional Mac bootable volumes will be encrypted but cannot be used to start your Mac (boot logon can access only your primary volume). 2. For standalone users, download the appropriate zip file (for example, WinMagicxdSecureDocMacStandAlone) from the WinMagic web site and unzip WinMagic Inc. SecureDoc for Mac User Manual 6
7 Getting Started with SecureDoc for Mac Installing SecureDoc for Mac it. A folder is created, containing the SDMacintosh.dmg file.for users in an SES environment, obtain the SDMacintosh.dmg file from your SES administrator. 3. Double-click this file to mount the disk image. 4. Double-click the pkg file and, on the Welcome dialog, click Continue. 5. Read, print or save the software license agreement. Click Continue. To continue, you must agree to the terms of the license agreement. 6. Confirm that the current volume is the one where you want to install SecureDoc for Mac (defaults to current volume). If you want to install on another volume, stop the installation, log in to that volume, and re-start installation. 7. Choose a location for the installation. 8. Click Install. You are prompted to re-enter the administrator userid and password. Note: In an SES environment, recovery keys are sent to the server at this point. 9. For standalone users, you are prompted to enter an initial password. 10.You are warned that installing the software requires a restart and prompted to choose whether to continue. 11.Installation progress is shown. When installation is complete, you are prompted to click Restart to restart your computer. 12.When the computer restarts, the SDForm dialog appears, showing the identifying information for your computer. Click Submit. In a standalone environment, if you did not already do so, you will be asked to set a password (you can change this password later, if necessary). In an SES environment, this information is communicated to SES. Note: In an SES environment, if at any time communication with SES fails, you may be prompted to continue the installation locally. Your computer will continue to attempt to communicate with SES at regular intervals. WinMagic Inc. SecureDoc for Mac User Manual 7
8 Getting Started with SecureDoc for Mac Installing SecureDoc for Mac Step 2: Encrypting a Hard Disk Note: Encryption will continue even if you log off. 1. Encryption starts automatically. Note: If you are not in an SES environment, and you have an SED device, you are prompted to choose hardware or software encryption. If you choose Hardware, the encryption process will be very fast; if you choose Software, the encryption process is slower. 2. A progress indicator shows the percentage of the hard disk encrypted (in an SES environment, this indicator may be hidden). The length of this process depends on the size of the hard disk: approximately GB is encrypted per hour. Note: You may continue with other work while the encryption takes place. 3. Once the hard disk has been encrypted, SES users are prompted for a new password to replace the temporary password (this was provided by your SES administrator) used during initial encryption. See Acceptable Passwords on page 19 for instructions on how to choose a password. SES users may also be prompted to answer self-help password recovery questions. Note: Remember your new password: you will need it to login to your computer (at pre-boot) and to login to the SecureDoc Control Center. Step 3: Create Data Recovery Media Note: In an SES environment, data recovery media is usually created by the SES administrator, but you can also create it yourself. Data recovery media can be used to access encrypted data if for some reason boot logon does not appear. You can choose to create recovery media on a USB drive or a CD/DVD. Be sure you have available a USB flash drive of at least 32MB capacity, a CD, or a DVD that can be reserved exclusively for data recovery purposes. Note: If you use a USB flash drive, the entire contents of the drive are overwritten. Once this process is complete, you cannot use the USB flash drive for any other purpose. 1. In the SecureDoc Control Center, select Recovery Actions. WinMagic Inc. SecureDoc for Mac User Manual 8
9 Getting Started with SecureDoc for Mac Installing SecureDoc for Mac 2. Choose the type of media to use for data recovery. If you choose to use a USB, connect the USB flash drive and click OK. If you choose a CD/DVD, you will be prompted to insert it at the appropriate time. 3. Click OK to copy the recovery files to the media. Once SecureDoc has finished writing recovery media, remove it and store it in a safe place. WinMagic Inc. SecureDoc for Mac User Manual 9
10 Getting Started with SecureDoc for Mac SecureDoc and Boot Camp SecureDoc and Boot Camp If you use Boot Camp to boot into another OS (which must be on a self-encrypting drive), you must 1. Enter your username and password but do not press Enter. Instead, press F When the machine re-boots, hold the ALT key. You will be prompted to choose the OS you want to boot into. Silent Installation Your SES administrator may have used silent installation, which allows SecureDoc to be installed without your involvement. The first phase of installation is done before you log on to your Mac account, at which time the second phase of installation occurs. If installation is not completed when you log out, it will continue until complete, at which point you will have access to SecureDoc. Accessing the encrypted hard disk Once SecureDoc for Mac is installed and your disk is encrypted, you will see boot logon each time you restart your computer. It prompts for two things: key file just press Return to use the default key file, either stored on the computer itself or, if in an enterprise environment where Preboot Networking is being used, on the network SecureDoc password. If preboot authentication is done through the network and the network is not currently available, you will see an error message: clear the userid field to authenticate locally. Note: SED users who chose hardware encryption will see boot logon only when they turn the computer on and off again. Note: SES users may not see boot logon at all. If you want to boot to a CD/DVD or any other bootable Mac media (for example, for repairing an encrypted fixed disk), press and hold ALT after entering your key file and password. You are prompted to choose from a list of available bootable devices. You can change the password at any time, as described in Using SecureDoc for Mac on page 13. SES users may have a limit set to the number of attempts they can make to log in. After this limit is reached, the computer may reboot or become locked, requiring administrator support. The SecureDoc icon appears on the menu bar. When the disk is encrypted, this icon has both a dark border and a dark image. If the disk is not yet fully encrypted, the border and/or image are lighter. WinMagic Inc. SecureDoc for Mac User Manual 10
11 Getting Started with SecureDoc for Mac For SED Users: Firmware Updates For SED Users: Firmware Updates When you do a firmware update on an SED, you need to disable the hardware protection option. When the update is complete, be sure to enable hardware protection again. WinMagic Inc. SecureDoc for Mac User Manual 11
12 Getting Started with SecureDoc for Mac Uninstalling SecureDoc for Mac Uninstalling SecureDoc for Mac Note: If you are uninstalling SecureDoc for Mac from a laptop, then make sure the computer is connected to a power supply for the duration of the uninstallation and decryption process. 1. If you encrypted any removable media, decrypt it (following the steps in Using SecureDoc for Mac on page 13) before proceeding. Once SecureDoc for Mac is uninstalled, your computer can no longer access data on removable media encrypted by SecureDoc for Mac. 2. Locate the Applications\ WinMagic folder. Double-click the uninstall file SecDocUninstall. You are prompted to confirm that you want to remove protection. 3. Enter your SecureDoc password and click OK. 4. You are prompted to confirm again. 5. All data is decrypted. This process takes approximately the same amount of time as encryption. 6. You are prompted to complete the uninstall. This restarts your computer. 7. When the computer restarts, the software is automatically uninstalled. WinMagic Inc. SecureDoc for Mac User Manual 12
13 Chapter 2 Customizing Boot Logon USING SECUREDOC FOR MAC In most cases your administrator will have customized the appearance of the boot logon screen. You can change or remove these settings, but we recommend that you contact your administrator before attempting to do so. 1. Click the SecureDoc icon on the menu bar and select the the SecureDoc Control Center. 2. Select Advanced Actions. 3. Select the Preboot Customization tab and click Set Default to restore the default setting. You can personalize your SecureDoc by adding a different background image for boot logon. Choose Add Customized and browse to the location of the new background image, which must be 24 bit, PNG format, 1024 x 768 and, when zipped (SecureDoc zips the file for you), no larger than 0.5MB. WinMagic Inc. SecureDoc for Mac User Manual 13
14 Using SecureDoc for Mac Encrypting USB Media Encrypting USB Media If your installation has been configured to allow this, you can choose to encrypt USB media (including, optionally, SED removable media) with any of the following: the default key used to encrypt your hard disk (advisable only if you will not be sharing your media, since anyone with access to that key also has access to your encrypted hard disk data); another key in your key file; a password you specify. This allows you to share your media with another user. The other user will need one of the following: a Mac with SecureDoc on it and either the key or the password used to encrypt the media; a Windows machine with SecureDoc installed on it and either the key or the password used to encrypt the media; a Windows machine with the free Media Viewer (available from WinMagic) installed on it and the password used to encrypt the media. 1. Connect the USB media to the Mac. Note: Enterprise users may have media encrypted automatically, with or without warning. 2. Click the SecureDoc icon on the menu bar and select the SecureDoc Control Center. 3. Select Media Conversion. WinMagic Inc. SecureDoc for Mac User Manual 14
15 Using SecureDoc for Mac Encrypting USB Media 4. Choose the desired media from the list. 5. Choose how you want the media protected (if you click Choose Key, you see a list of available keys to choose from). If you click Password Based, you are prompted for a password (see below). 6. Choose the method you want to use for encryption: fast mode encrypts only the sectors in use at the moment, then encrypts all new data written to the drive, and is best used for media that has never contained sensitive information; thorough mode encrypts all sectors on the desk, whether used or not, and takes a little longer than fast mode; WinMagic Inc. SecureDoc for Mac User Manual 15
16 Using SecureDoc for Mac Accessing Encrypted Removable Media 7. Click Encrypt. The encryption process may take a few minutes depending on the size of the media. A message appears when the process is complete. 8. If encrypting SED removable media, you will be prompted to create recovery media and define a recovery password for the removable media. This can be used to access the encrypted removable media without the encryption key. 9. Once encryption is complete, you may remove the media. Accessing Encrypted Removable Media Accessing Using Encryption Key If you protected removable media with a key and are not logged in to the keyfile containing that key, when you insert removable media you are prompted to locate and log in to the appropriate key file. WinMagic Inc. SecureDoc for Mac User Manual 16
17 Using SecureDoc for Mac Working with Password-Protected USB Media Click Browse Key File and navigate to the appropriate key file, then enter the Password and click OK. If the removable media is a SED, you can, alternatively, navigate to the recovery file path and enter the recovery password. Accessing Using Password When encrypted removable media is inserted into a machine that does not have SecureDoc installed on it, the user is prompted for the password or, for SEDs, for the password or the recovery file and password. Working with Password-Protected USB Media 1. Connect the USB media to the Mac. 2. Click the SecureDoc icon on the menu bar and select the SecureDoc Control Center. WinMagic Inc. SecureDoc for Mac User Manual 17
18 Using SecureDoc for Mac Changing your Password 3. Select the removable media with which you want to work. 4. To change the password, click Set New Password and, when prompted, enter a new password. To remove the password, leaving the media inaccessible, click Remove Password. You are prompted to confirm. To decrypt the media, click on Decrypt. Changing your Password You can change your password at any time after installation and encryption. You may find that your SecureDoc and Mac passwords have been synchronized, so that changing one changes the other automatically. 1. Click the SecureDoc icon on the menu bar and select SecureDoc Control Center. 2. Select SecureDoc Users. 3. Select the user, and choose Change Password. WinMagic Inc. SecureDoc for Mac User Manual 18
19 Using SecureDoc for Mac Acceptable Passwords 4. Enter the old (current) password, then enter and confirm the new password. 5. Optionally, to display a hint that can help you remember your password, enter the hint in the Password Hint box (the box appears if your password rules permit it). Note: Be sure the hint does not contain enough information for an illegitimate user to determine the password, or the password itself. 6. Click OK to accept the change. Acceptable Passwords To make sure that your password is secure and difficult to guess, you must use a password that contains at least one of each of the following: upper case letter (A - Z) lower case letter (a - z) numeric character (0-9) non-alphanumeric keyboard character (any other character, such as etc.) IMPORTANT: Ensure that you remember your new password: once the computer restarts into the SecureDoc environment, there is no way to recover your data without this password. WinMagic Inc. SecureDoc for Mac User Manual 19
20 Using SecureDoc for Mac Changing or Setting Self-Help Answers Changing or Setting Self-Help Answers Use this feature to define a set of self-help questions and answers to be used for password recovery. If your installation was configured to use this feature, you can change the answers to questions originally posed at installation. Click the SecureDoc icon on the menu bar and select the SecureDoc Control Center. Choose Change Self-Help Answers. Enter questions and the corresponding answers, then click OK. Enterprise users will not be able to change the questions. Recovering from a Lost Password If you can t remember your password, at boot logon, press Enter, then press F8 and follow the instructions to perform a challenge/response password recovery or press F9 to provide answers to the self-help password recovery questions you provided when your drive was initially encrypted. When you have answered all the questions, your answers are compared to those you gave originally. If you answered any of the questions incorrectly, you are returned to the boot logon screen to try again. If you successfully answered all of the questions your Mac starts up as normal. You are immediately taken to the Change Password screen to assign a new password. Creating a Backup Key File A backup key file can be used if you forget your password or make an error when changing your password. The backup contains your encryption keys and requires no password or token to gain access, so it must be kept safe and secure at all times. 1. Click the SecureDoc icon on the menu bar and select the SecureDoc Control Center. 2. Choose Recovery Actions, then Create key file. WinMagic Inc. SecureDoc for Mac User Manual 20
21 Using SecureDoc for Mac Using Recovery Media 3. Re-enter the password used to access your encrypted hard disk. 4. Enter a recovery password and browse to the location where the key file should be created. 5. Click OK. This function creates a file called Securdoc.dbk (note the lack of an e ) in the specified location. Note that a backup key file is not the same thing as a copy: a copy requires the key file password to access. Using Recovery Media If for some reason boot logon does not appear, use your data recovery media (you may need to get this media from your SES administrator). Connect or insert the data recovery media, then hold down Option while restarting your computer. Choose to reboot from the drive containing the recovery media and follow the instructions that appear. Note: You will need to know the SecureDoc password that was in effect when you created the media. Performing Cryptographic Engine Tests You can run tests to ensure the cryptographic engine is running correctly, or to check the integrity of your computer s boot files to ensure they have not been tampered with or corrupted on boot-up. 1. Click the SecureDoc icon on the menu bar and select the SecureDoc Control Center. 2. Select Advanced Actions. 3. Select Perform Cryptographic Engine Self-Test or Perform Cryptographic Engine Integrity Test. WinMagic Inc. SecureDoc for Mac User Manual 21
22 Using SecureDoc for Mac Enabling/Disabling Hardware Protection (SED Boot Drive Only) Enabling/Disabling Hardware Protection (SED Boot Drive Only) Under normal circumstances, you would not disable hardware protection for your SED boot drive, since doing so makes the drive available to anyone. However, to upgrade SecureDoc you need to disable hardware protection (you will be prompted to enable it again as soon as the software is upgraded. The option to disable and enable hardware protection appears on the SecureDoc options menu. Enabling/Disabling Single Sign-On or Single Sign-On and Password Sync Single sign-on means that when you log on to boot logon, you automatically also log on to your Mac. Password sync means that changes to your boot logon password affect your Mac password, and vice versa. In an SES environment, these options may have been configured for you. To enable or disable these features, click the SecureDoc icon on the menu barand select SecureDoc Control Center. Choose Advanced Actions, then Settings, then Enable/Disable Single Sign On or Enable/Disable Single Sign On and Password Sync (both are toggles). You will be prompted for the password for your Mac account (local or network). WinMagic Inc. SecureDoc for Mac User Manual 22
23 Using SecureDoc for Mac Communicating with the Server Note: If your account password is changed or the account is deleted, you will be prompted, after logging on to boot logon, to enter the new password, define a new account for Single Sign-On, or disable the option. Communicating with the Server Normally communication between your computer and the server is done, at intervals, in the background. If you want to manually establish communication with the server (for example, on the request of your administrator) you can do so. Click the SecureDoc icon Performing Crypto-Erase on the menu bar and select Communicate with Server. At pre-boot or after the Mac OS has started, you can crypto-erase your computer, removing the encryption key and rendering it inaccessible. This is done only under exceptional circumstances. At the appropriate time, press the key sequence your administrator defined for this function. This takes effect immediately. If the key sequence is used at pre-boot, login will be denied. If it is used after the OS has started, the system will shut down as soon as the sequence is entered and access will be denied to all users. WinMagic Inc. SecureDoc for Mac User Manual 23
24 Chapter 3 System Requirements SECUREDOC AND FILEVAULT 2 Operating system requirements are listed here. Installation and encryption 1. Login to the Mac with an account that has administrator rights. 2. Double-click on the SDFVMac.pkg file (from your SES administrator). 3. Click Continue to review the ReadMe and the license agreement. WinMagic Inc. SecureDoc for Mac User Manual 24
25 SecureDoc and FileVault 2 Installation and encryption 4. Click Continue. WinMagic Inc. SecureDoc for Mac User Manual 25
26 SecureDoc and FileVault 2 Giving local accounts access to the encrypted drive 5. Click Restart. When the computer restarts, you are asked to login to the local administrator account that was created during the installation. The password for this account is set by your SES administrator. This account gives SecureDoc the ability to manage access to the encrypted drive for all the local accounts on the computer. The encryption continues once you have logged into this account. The encryption process takes place in the background and could take a few hours. During this time you can continue working normally on your computer; you can even log off or turn off your computer. Giving local accounts access to the encrypted drive The local accounts will not have access to the encrypted drive until they are added to the "unlock" list. When a user logs in, SecureDoc prompts for the password so that the account can be added to the "unlock" list. WinMagic Inc. SecureDoc for Mac User Manual 26
27 SecureDoc and FileVault 2 Removing SecureDoc and FileVault 2 encryption Any accounts that are created after encryption are automatically added to the "unlock" list. Removing SecureDoc and FileVault 2 encryption To uninstall SecureDoc and disable FileVault 2 encryption on the drive, run SecDocFvUninstall. WinMagic Inc. SecureDoc for Mac User Manual 27
SecureDoc Enterprise V6.5. User Guide
SecureDoc Enterprise V6.5 User Guide Copyright 1997-2014 by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada and
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ. NTI Backup Now EZ User's Guide
NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ NTI Backup Now EZ User's Guide Backup Now EZ User's Guide 2009 NewTech Infosystems, Inc. i Table of Contents INTRODUCTION... 3 WELCOME TO NTI BACKUP NOW EZ...
Full Disk Encryption Agent Reference
www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or
McAfee Endpoint Encryption (SafeBoot) User Documentation
TABLE OF CONTENTS Press the CTRL key while clicking on topic to go straight to the topic in this document. I. Introduction... 1 II. Installation Process Overview... 1 III. Checking for a Valid Current
Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...
Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4
Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
SafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
NTI Backup Now EZ v2 User s Guide
NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced
How to create a portable encrypted USB Key using TrueCrypt
How to create a portable encrypted USB Key using TrueCrypt INTRODUCTION TrueCrypt Traveler Mode provides secure encryption for programs/files on portable devices such as USB Memory keys. It uses strong
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
Secure Perfect RAID Recovery Instructions
Secure Perfect RAID Recovery Instructions Contents Overview Dell PowerEdge 2500 RAID Level 1 Recovery Instructions Overview NOTE If you possess a previous version of this document, you may notice changes
VMware Horizon FLEX User Guide
Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Sky Broadband upgrading your router software
Sky Broadband upgrading your router software Why upgrade to the new software? As with all aspects of the services we provide, we have been working to enhance the performance of the software in your wireless
2.8.1 Creating an Acronis account... 15 2.8.2 Subscription to Acronis Cloud... 16. 3 Creating bootable rescue media... 16
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
Comodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
VMware Horizon FLEX User Guide
Horizon FLEX 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Image Backup and Recovery Procedures
Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you
SafeGuard Enterprise Web Helpdesk
SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk
ScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
Sophos SafeGuard Disk Encryption, Sophos SafeGuard Easy Demo guide
Sophos SafeGuard Disk Encryption, Sophos SafeGuard Easy Demo guide Product version: 5.60 Document date: April 2011 Contents 1 Introduction...3 2 Requirements...5 3 The demo configuration package...6 4
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Image Backup and Recovery Procedures
Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you
How to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
SafeGuard Enterprise Administrator help. Product version: 6.1
SafeGuard Enterprise Administrator help Product version: 6.1 Document date: January 2014 Contents 1 About SafeGuard Enterprise 6.1...4 2 Security best practices...6 3 About SafeGuard Management Center...9
HP ProtectTools for Small Business Security Software, Version 5.10. User Guide
HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Lenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
User Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
HP RDX Continuous Data Protection Software Quickstart Guide
HP RDX Continuous Data Protection Software Quickstart Guide *5697-3351* HP Part Number: 5697-3351 Published: May 2014 Edition: Fourth Copyright 2008 2014 Hewlett-Packard Development Company, L.P. Microsoft,
ScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption
Time Stamp. Instruction Booklet
Time Stamp Instruction Booklet Time Stamp Introductions Time stamp is a useful solution for backing up and restoring system, it backs up the entire computer system to the Backup Zone. Time Stamp is used
File Management and File Storage
File Management and File Storage http://training.usask.ca Information Technology Services Division Table of Contents File Management at the University of Saskatchewan...3 Introduction...3 Creating Files
Operating System Installation Guide
Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating
OS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN
OS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN MANAGING KEYCHAINS Mac OS X features a sophisticated system that automatically protects all your authentication assets in encrypted
McAfee EETech for Mac 6.2 User Guide
McAfee EETech for Mac 6.2 User Guide COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee
User Manual - Secure Lock Ware
User Manual - Secure Lock Ware Drive Encryption System Ultra High Security - 256-bit Capable AES Encryption for Buffalo USB Hard Drives www.buffalotech.com v1.8 Table of Contents Introduction.................................
VMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
NTI CORPORATION. NTI Backup Now EZ v3. User's Guide
NTI CORPORATION NTI Backup Now EZ v3 NTI Backup Now EZ v3 User's Guide Backup Now EZ v3 User's Guide 2013 NTI Corporation i Table of Contents INTRODUCTION... 3 WELCOME TO NTI BACKUP NOW EZ... 5 OVERVIEW
System Image Backup and Recovery
System Image Backup and Recovery Enveloc s new System and Drive Imaging feature is an important part of an effective disaster recovery plan and can allow you to restore a machine after a complete crash
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
Sophos SafeGuard Disk Encryption for Mac Startup guide
Startup guide Document date: January 2011 Content 1 Before you begin... 2 2 Protecting Mac OS X computers... 3 3 Technical support... 4 4 Copyright... 5 1 1 Before you begin 1.1 System requirements Hardware
Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.
Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before
Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012
Administering FileVault 2 on OS X Lion with the Casper Suite Technical Paper July 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that
WatchDox for Mac User Guide
WatchDox for Mac User Guide Version 2.3.0 Confidentiality This document contains confidential material that is proprietary to WatchDox. The information and ideas herein may not be disclosed to any unauthorized
Full Disk Encryption Pre-Boot Authentication Reference
www.novell.com/documentation Full Disk Encryption Pre-Boot Authentication Reference ZENworks 11 Support Pack 4 Beta April 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect
McAfee Endpoint Encryption 7.0 Users Guide and FAQ
McAfee Endpoint Encryption 7.0 Users Guide and FAQ Table of Contents Introduction... 1 Installation... 1 Boot-Up/Login... 1 Encryption Status... 3 Notes for Encryption... 4 Changing Your Password... 4
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
WinMagic Encryption Software Installation and Configuration
WinMagic Encryption Software Installation and Configuration Don Mendonsa, Faranak Nekoogar, Harry Martz Lawrence Livermore National Laboratory Livermore, CA 94551 Work performed on the Science & Technology
Encrypting with BitLocker for disk volumes under Windows 7
Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1
Yale Software Library
Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, [email protected] Two-factor authentication: Installation and configuration instructions for
MAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011
MAC/OSX - How to Encrypt Data using TrueCrypt v.05201011 This chapter contains step-by-step instructions on how to create, mount, and use a TrueCrypt volume. We strongly recommend that you read the entire
Backup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
PGP Portable Quick Start Guide Version 10.2
PGP Portable Quick Start Guide Version 10.2 Introduction to PGP Portable Use PGP Portable to distribute encrypted files to users who do not have PGP Desktop software. Use PGP Portable to transport files
Installation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
CTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012
Sophos Disk Encryption License migration guide Product version: 5.61 Document date: June 2012 Contents 1 About this guide...3 2 Add encryption to an existing Sophos security solution...5 3 SDE/SGE 4.x
Software License Registration Guide
Software License Registration Guide When you have purchased new software Chapter 2 Authenticating a License When you would like to use the software on a different PC Chapter 3 Transferring a License to
CONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
How to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
2.8.1 Creating an Acronis account... 17 2.8.2 Subscription to Acronis Cloud... 17. 2.9 Parallels Desktop support...17 2.10 Backup list icons...
USER'S GUIDE Table of contents 1 Introduction...4 1.1 What is Acronis True Image 2016?... 4 1.2 New in this version... 4 1.3 System requirements... 5 1.4 Install, update or remove Acronis True Image 2016...
Aspera Connect User Guide
Aspera Connect User Guide Mac OS X 10.4/10.5 Browser: Firefox 2+, Safari 2+ Version 2.2 Chapter 1 Chapter 2 Chapter 3 Appendix Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2
Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.
Getting Started User s Guide
Getting Started This short guide can help you to quickly start using Acronis True Image Home 2011. It describes just a few of the key features of Acronis True Image Home 2011. For detailed program information,
SafeGuard Enterprise User help. Product version: 7
SafeGuard Enterprise User help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Enterprise 7.0...5 2 SafeGuard Enterprise on Windows endpoints...7 3 Security best practices...9
Using Websense Data Endpoint Client Software
1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization
Endpoint Security Client for Mac
Endpoint Security Client for Mac E80.60 User Guide 23 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are
safend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
Online Backup Client User Manual
For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.
You can find the installer for the +Cloud Application on your SanDisk flash drive.
Installation You can find the installer for the +Cloud Application on your SanDisk flash drive. Make sure that your computer is connected to the internet. Next plug in the flash drive and double click
CTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not
BounceBack User Guide
Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05
Online Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
Online Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
Hosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15
Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required
DriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Quick Start Guide. Version R91. English
Using StorageCraft Recovery Environment Quick Start Guide Version R91 English May 20, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s
HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual
HDDtoGO User Guide User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual Table of Contents Table of Contents...1 1. Introduction...2 2. System Requirements...3
Acer erecovery Management
1 Acer erecovery Management Developed by Acer's software team, Acer erecovery Management is a tool that provides you with an easy, reliable and safe means of restoring your computer to its factory default
How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
Bare Metal Recovery Quick Start Guide
Bare Metal Recovery Quick Start Guide Revisions Document Control Version 5.4.3 Status Changes Date Final Created. August 2014 Copyright 2003-2014 Intronis, Inc. All rights reserved. 1 Table of Contents
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
TABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2
Last modified on 08.11.2011 TABLE OF CONTENTS Introduction... 4 Features... 5 General Features... 5 Backup Features... 5 Restore Features... 6 Link for Application Download... 6 Install IBackup for Mac...
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
BULLGUARD BAckUp GUIDE
BULLGUARD backup GUIDE CONTENTS BullGuard Backup introduction page 3 Installing BullGuard Backup page 6 Uninstalling BullGuard Backup page 11 Registering BullGuard Backup: creating an account page 12 Running
Dual-boot Windows 10 alongside Windows 8
Most of the people are very much interested to install the newly launched Operating System Windows 10 on their devices. But, it is not recommended to directly use Windows 10 as the primary OS because it
