Documentation for Configuration of BeCrypt Removable Media Encryption



Similar documents
BitLocker To Go User Guide

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7

Encrypting with BitLocker for disk volumes under Windows 7

How to Encrypt your Windows 7 SDS Machine with Bitlocker

Fus - Exchange ControlPanel Admin Guide Feb V1.0. Exchange ControlPanel Administration Guide

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2007

HOW TO SETUP EVOKO ROOM MANAGER EVO WITH EXCHANGE

Yale Software Library

Windows XP Exchange Client Installation Instructions

Here is a guide on how to encrypt a part of your USB flash drive and access it on any computer:

Step by step guide how to password protect your USB flash drive

Massey University Wireless Network Client Configuration Windows 7

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)

Working with Office Applications and ProjectWise

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

CWOPA Broadband Users. Windows Operating System

HGC SUPERHUB HOSTED EXCHANGE

BounceBack User Guide

1. Set Daylight Savings Time Create Migrator Account Assign Migrator Account to Administrator group... 4

A. I do not have my own personal certificate I am a new client or want to download a new certificate

Remote Access End User Guide (Cisco VPN Client)

DataTraveler Secure - Privacy Edition

Apple Mac VPN Service Setting up Remote Desktop

SMS for Outlook. Installation, Configuration and Usage Guide

Installing the Gerber P2C Plotter USB Driver

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.

In order to enable BitLocker, your hard drive must be partitioned in a particular manner.

Instructions for connecting to the FDIBA Wireless Network. (Windows XP)

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2010

Wireless Network Configuration Guide

Beckhoff TwinCAT. Creating Boot Projects for TwinCAT

How to enable Disk Encryption on a laptop

Connecting to eduroam using Windows 8

Egress Switch Client Deployment Guide V4.x

Copyright. Disclaimer. Introduction 1. System Requirements Installing the software 4

ICE.TCP Pro Update Installation Notes

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)

Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel Fax Page 1 of 14

eadvantage Certificate Enrollment Procedures

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members

Xythos on Demand Quick Start Guide For Xythos Drive

HP RDX Continuous Data Protection Software Quickstart Guide

Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file

Supplement I.B: Installing and Configuring JDK 1.6

Deep Freeze - Retaining User Data TECHNICAL PAPER Last modified: June, 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

Encrypting a USB Drive Using TrueCrypt

APNS Certificate generating and installation

Export the address book from the Blackberry handheld to MS Outlook 2003, using the synchronize utility in Blackberry Desktop Manager.

Lab: Data Backup and Recovery in Windows XP

Signup instructions for the End User

How to Connect to Berkeley College Virtual Lab Using Windows

BorderGuard Client. Version 4.4. November 2013

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18

ECA IIS Instructions. January 2005

Table of Contents. TPM Configuration Procedure Configuring the System BIOS... 2

Bosco Internet Setup Guide For Zest Apartments. Windows XP, Vista and Mac OS X

PGP Desktop Encrypting Removable Media. May Version 1.3

Trend ScanMail. for Microsoft Exchange. Quick Start Guide

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec

NICCA User Guide for digitally signing Using Digital Signature Certificate (DSC) in Outlook Express

Installation Manual (MSI Version)

GoldKey Software. User s Manual. Revision WideBand Corporation Copyright WideBand Corporation. All Rights Reserved.

Accessing your Staff (N and O drive) files from off campus

Edith Cowan University Information Technology Services Centre

USING SSL/TLS WITH TERMINAL EMULATION

Richmond Systems. SupportDesk Quick Start Guide

Instructions: Configuring Outlook 2003 with Exchange 2010 on the FIUMail

Yale Software Library. PGP 9.6 for Windows

SafeGuard Enterprise Web Helpdesk

BSDI Advanced Fitness & Wellness Software

Downloading and installing SMART Notebook Software

DriveLock Quick Start Guide

Basic Use of the SPC Feature on 1100R+/H+ Testers

Lab - Data Backup and Recovery in Windows XP

Tufts VPN Client User Guide for Windows

Windows BitLocker Drive Encryption Step-by-Step Guide

SA-9600 Surface Area Software Manual

Getting started with 2c8 plugin for Microsoft Sharepoint Server 2010

CNW Re-Tooling Exercises

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Florida Atlantic University VPN Client Installation Guide

File Management and File Storage

SECURE USER GUIDE OUTLOOK 2000

Best Practice Document Hints and Tips

Motion Computing Tablet PC

Hyper-V Protection. User guide

Guide how to protect your private data with Rohos Disk Encryption

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

Sync Tool for Clarion NX700/NX509/NP509 Series

Connect to the Sheridan College / Gillette College - STUDENT Secure Wireless Network with the PEAP Client (Windows XP Pro)

Comodo Disk Encryption

For paid computer support call

SupportDesk Extensions Installation Guide Extension Service - Versions

Transcription:

Documentation for Configuration of BeCrypt Removable Media Encryption Laptop Configuration Procedure and Details. Laptops were to be configured with BeCrypt encryption application in such a manner that allows the users to save work/data to USB drive only. This was achieved by using BeCrypt in conjunction with Microsoft Steady State ; this utility is used to restrict user access in the desired manner. Steady State is configurable via the XP User administrator account. Partition Magic was used to create a partition to facilitate key export/import (and image storage if necessary) for users. (BeCrypt needs access to keys to import). See note below:- It was necessary to create a partition to export the key to so that the Becrypt utility could access the key to then import it. It was found that this couldn t be achieved by saving said key to the C: drive or a share(on the C: drive) that could be mapped to a drive, it was thought that Steady State prevented this by applying restrictions necessary to lock down the laptop. Appropriate NTFS permissions can then be applied to the partition or folder/files therein. XP User has full permissions to the X drive (XP User only), the IAF User should have/has read only access. Currently keys that are active on the D610 image are exported/saved to Stuart s system on root of C: in a directory called Encryption Keys. Install Partition Magic and configure as necessary before installing Becrypt or Steady State. (Remember to untick use simple file sharing to get access to the permissions. Place Social Work Word Templates in Word Templates directory, in this instance it is C:\Documents and Settings\IAF User\Application Data\Microsoft\Templates and C:\Documents and Settings\XP User\Application Data\Microsoft\Templates.Templates can be found in J:\Technicians\Social Work Encryption Back Up Files and Documents\Templates\Social Work Templates. Users will access the templates from within Word new>. Create XP User and IAF User with robust passwords. Install and configure Steady State as required. Configure logon message (how-to in Technicians dir on network) Install BeCrypt Removable Media Encryption and reboot PC. Log in as an Administrator (XP User) For future reference the IAF User password Open up DISK Protect Management Tool. Note: Contact Mary Timpany for passwords.

Right click on the XP User and select Add Key

Ensure that Generate a random key is selected and that a suitably indicative name is given to the Key Description. For our purposes we have named the key description as swencryptionkey. Select Generate Key, which will invoke the key generation procedure. You will notice the text next to Generate Key states Key successfully generated Select OK Key Recovery option is presented

The Recovery File name should again be indicatively named and for our purposes we have called it swencryptionkey_recoveryfile. Select Save As and save to an intermediate location i.e. memory stick. Select OK IMMEDIATELY (well relatively quickly) COPY THIS KEY TO THE CENTRAL ADMINISTRATIVE LOCATION. TYPICALLY AN ADMINISTRATOR S PC. The above dialogue will appear showing that the encryption key has been generated and successfully imported and saved. Select OK.

On returning to the opening screen you will notice that the swencryptionkey is now a valid key for the XP User. Notice that there is an option here to Disable Removable Media Encryption. This is self-explanatory. Only available to the administrator. IT SHOULD BE NOTED THAT ANY USB DEVICE (IPOD, OTHER MEMORY DEVICES ETC) PLUGGED INTO THIS DEVICE WHEN LOGGED IN AS THIS USER AND ENCRYPTION IS ENABLED WILL AUTOMATICALLY HAVE ALL THE DATA ON THIS DEVICE ENCRYPTED MAKING IT UNUSABLE AND RECOVERABLE. Exporting and Importing Key/s We now require to export the key that we have generated as XP User to make it available to a group of users (IAF Users). This will then be imported per user. Invoke the Becrypt application. On the DISK Protect Management Tool screen right click on the swencryptionkey and select export keys.

You will see the above screen. Enter the XP User s password Enter the password to secure the exported keys. Select Export Keys. Select an area to Save To where it can be accessed by the intended recipients (A safe accessible location. For our purposes we named the key swencryptionkey and saved it to the root of C:) The above screen should appear. Importing Previously Saved Keys After rebooting and logging in as IAF User, open up the DISK Protect Management Tool either from START/Programs or by double clicking the padlock icon in the system tray (next to the time).

Right click on IAF User and select Add Key. From the screen select Import a key or keys from a key file. Select Browse and navigate to where the key was previously saved. Input the password for the key file, established earlier. Select OK and you should see a 1 media key(s) successfully imported. After inputting the key for a given user, if it s not already, remove the USB stick and re-insert. You will then be prompted for the key to be used to encrypt the device. From the pull down for our purposes this was: swencryptionkey. This was the key we exported earlier. It was observed that when a key is imported the key name is modified (prepended) with a prefix, in this instance it was FFFE, this is normal. After selecting the key to encrypt data for the user you will be prompted to format the USB drive. This is normal and should be done. The USB device is now encrypted and data will not be visible on another PC unless equipped with the same key. The administrator will now have the key also and will be able to un-encrypt the data on the memory stick and manipulate it as required

Recovery Console ****Remove the Disk Protection on the laptop so that changes can be saved.**** Install the Recovery Console component of BeCrypt on the Administrators PC/System and ensure that the.brf file for that key is on on that Administrator s PC/System (this can be copied over from AN Other System). When the IAF User logs in they will be asked to type in their Windows password and then be given a challenge code. On the admin PC run Recovery Console and in Recovery Console Tab select new and set up a new recovery database. Then select Import and point to the.brf file. Then select Password Recovery, this will ask for the last 6 digits of the Challenge Code from the laptop. After adding the digits press the response button. This will generate a response code enquiry on the laptop, re-apply the disk protection once finished. Procedure when new/non encrypted USB Device is inserted. User will get prompt asking for key to be used to encrypt device. Select the socialwork key (actual name may differ slightly, ie; may be prepended by hex characters) User will also be prompted by the dialog below, select start, this is normal.

Format confirmation. Settings For Windows Steady State (For BeCrypt Encryption) The following are settings for Windows Steady State for the Social Work laptops. There is an image available for this.

On the above screen place a tick in the Hide Drives section in Local Disk (C:).