Identity Finder Setup

Similar documents
Identity Finder: Managing Your Results

owncloud Configuration and Usage Guide

USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)

Introduction to Microsoft Access 2003

MY WORLD GIS. Installation Instructions

Baylor Secure Messaging. For Non-Baylor Users

Outlook Web Access. PRECEDED by v\

Introduction to Microsoft Access 2010

at Bradford - Outlook

NETWORK PRINT MONITOR User Guide

Microsoft Office 365 Outlook Web App (OWA)

Introduction to Microsoft Access 2013

Web Mail Guide... Error! Bookmark not defined. 1 Introduction to Web Mail Your Web Mail Home Page Using the Inbox...

CheckBook Pro 2 Help

Solution domain. Cloud PC Backup Startingkit for users. Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact

Fairfield University Using Xythos for File Sharing

Affiliation Security

1.5 MONITOR. Schools Accountancy Team INTRODUCTION

Working together with Word, Excel and PowerPoint 2013

Windows XP File Management

Decision Support AITS University Administration. Web Intelligence Rich Client 4.1 User Guide

Table of Contents. Page 1 MLS PIN Customer Support Monday Friday 8 am to 7:30 pm, Saturday 9 am to 5 pm, Sunday 9 am to 1 pm

Contact Manager HELP GUIDE

Step One. Step Two. Step Three USING EXPORTED DATA IN MICROSOFT ACCESS (LAST REVISED: 12/10/2013)

USER GUIDE. Unit 2: Synergy. Chapter 2: Using Schoolwires Synergy

MICROSOFT OUTLOOK 2010 WORK WITH CONTACTS

Ohio University Computer Services Center August, 2002 Crystal Reports Introduction Quick Reference Guide

UF Health SharePoint 2010 Document Libraries

Business Objects 4.1 Quick User Guide

SimpleFTP. User s Guide. On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJ United States of America

DOF e-repository User Guide

BIGPOND ONLINE STORAGE USER GUIDE Issue August 2005

Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1

Microsoft Access 2010 handout

Contents. Getting Started...1. Managing Your Drives Backing Up & Restoring Folders Synchronizing Folders Managing Security...

Netmail Search for Outlook 2010

Using the City of Stamford / Stamford Public Schools. Web System

Decision Support AITS University Administration. Web Intelligence 4.1 Reporting Basics

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Concession FTP User Guide May 2011 Version 1.2

Sample- for evaluation purposes only! Advanced Excel. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc.

MicroStrategy Tips and Tricks

Mail Merge. Course Description. Objectives: Design a Main Document. Design a Data Source. Directories. Merge the Main Document with the Data

User Manual - Sales Lead Tracking Software

INTRODUCTION TO WINDOWS AND FILE MANAGEMENT. Windows 7

KEYBOARD SHORTCUTS. Note: Keyboard shortcuts may be different for the same icon depending upon the SAP screen you are in.

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.

Using Outlook Web App

FUGU - SFTP FOR MACS- REFERENCE GUIDE

Outlook 2010 Essentials

Creating Interactive PDF Forms

Detecting and Removing Spyware From Your Home Computer

CONTENTS. Introduction Outlook at a glance Configure Outlook 2010 on-campus Creating Folders Sorting s...

You may have been given a download link on your trial software . Use this link to download the software.

Managing documents, files and folders

Microsoft Office 365 Outlook Web App (OWA)

Getting Started Guide

How to access your via Outlook Web Access

CareAware Capacity Management - Patient Flow Patient List Gadget

Initial Setup of Mozilla Thunderbird with IMAP for OS X Lion

Outlook Web App User Guide

Project Management WalkThrough

CAS CLOUD WEB USER GUIDE. UAB College of Arts and Science Cloud Storage Service

FTP-Stream Module: InstantShare End User Guide

How To Upload To Google Drive On Pc Or Mac Or Mac (Or Mac) On Pc (Or Pc Or Ipad) On A Pc Or Pc Or Minecraft (Or Minecraft) On Your Computer Or Mac) Or Ipa (Or

Getting Started The Windows SharePoint Services Window

User Guide. Version 3.2. Copyright Snow Software AB. All rights reserved.

Guide to using Cumulus software (a.k.a., the Cumulus "client")

How to install and use the File Sharing Outlook Plugin

Lotus Notes Client Version 8.5 Reference Guide

Sophos Anti-Virus for Mac OS X: Home Edition Help

Sophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 6.1

BID2WIN Workshop. Advanced Report Writing

Chapter 2: Clients, charts of accounts, and bank accounts

Crystal Reports Payroll Exercise

MAC/OSX - How to Encrypt Data using TrueCrypt. v

Business Warehouse Reporting Manual

Connecting to LUA s webmail

O UTLOOK 2003 HELP SHEET MAIL. Opening the program. Mail

EMC Documentum Webtop

Backups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete

GO MARKETS MT4 FOR MAC

Alfresco Online Collaboration Tool

What is OneDrive for Business at University of Greenwich? Accessing OneDrive from Office 365

Outlook Web Access Tipsheets

Using FileMaker Pro with Microsoft Office

Customer Service: Us:

Importing Contacts to Outlook

Sophos Anti-Virus for Mac OS X Help

LEARNING RESOURCE CENTRE GUIDE TO OFFICE 365

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

Web Mail Classic Web Mail

A computer running Windows Vista or Mac OS X

Stores copies of items you sent to others, by default. Stores items created offline that you want to send the next time you are online

7. Data Packager: Sharing and Merging Data

Junk Settings. Options

Using the TI-Nspire Computer Link Software

EXCEL PIVOT TABLE David Geffen School of Medicine, UCLA Dean s Office Oct 2002

Transcription:

Identity Finder Information Sheet for MAC This document will walk you through how to install, scan, and secure any SI found on your computer, or storage devices using the Identity Finder Software. This is a broad run through of how the software works, if you have any additional questions, please contact Doug Florczyk 870-972-3033. Identity Finder Setup To install Identity Finder on a MAC first download the Identity Finder for MAC file from http://www.astate.edu/a/its/software-downloads/ 1. Launch the Identity Finder setup program, Click Continue: 2. Select where to install, and Click Continue:

3. Click Install: 4. Installation Progress will be shown:

5. When complete, Click Close: This will add Identity Finder to your Applications list, you can run the program from here, or create a shortcut on the Dock by dragging Identity Finder Icon down to the Dock. 6. In the Applications List, Right Click on the Identity Finder Icon, Click on Get Info, make sure to check Prevent App Nap.

Creating a Profile The first time you use Identity Finder you will see a dialog box to create a New Identity Finder Profile. This Profile is unique to the user logged into Mac. A single Mac user may not have multiple profiles. After you create your Profile, you will always be prompted to sign into it to load your settings and any sensitive information that you have chosen to save. Each time you start Identity Finder you will be asked to sign into your Profile. Once open, you may choose the Start button on the toolbar to immediately start your search with the default options (or previously saved options) or choose the Files button to choose which location you want to search specifically.

Identity Finder will begin searching for all identity types you have selected via the Identities button on the toolbar. A Status Window will appear to show your current status: You may interact with results as they appear. A dialog box will inform you when the search has been completed. Click OK to see the search results.

Viewing Search Results The results of the search are displayed in the a) Results View and, along with the b) Preview Pane, provide all of the relevant information about the result including the full path to its location, the type and value of the result, a preview of that result in context and many other details. The Results View is a reporting table, similar to a spreadsheet, that is on the left side of Identity Finder. It contains all of the information about the results of your search and allows you to analyze those results and take action to protect any sensitive information.

Choosing Columns The Results View has a header across the top that allows you to Choose Results Columns to Display. Sorting Columns You may sort the results by clicking on specific column headers to toggle between ascending and descending. Any column which has sorting on it will display an up arrow or a down arrow in the center of the column header indicating ascending or descending, respectively. No arrow indicates that column is not sorted. When you click on a column header to set a sort it will remove any previous sorting from all other columns. The results can only be sorted on one column at a time. Previewing Identity Matches The Preview Pane is enabled by default but can be turned on and off by clicking the Preview Pane menu item on the View menu. The Preview Pane displays an unformatted version of the result you have selected. The header of the Preview Pane contains information about the result. The main body of the Preview Pane contains the full content where your result was located with all the Identity Matches highlighted in yellow. You can seek through highlighted matches and review the criticality of your result.

Collapsing and Expanding Rows Identity Finder may uncover multiple unique identity matches within a location. Unique identity matches are distinct from multiple occurrences of the same Identity match. For example, when five different passwords are discovered in a file there are five unique identity matches, however, when five instances of the same password are discovered in one file there are five occurrences of that specific password. When Identity Finder uncovers multiple unique identity matches within a single result, a parent row will be displayed in the results view that says Multiple Matches with a total counter of all matches in the location. Each unique match will be displayed in a child row beneath the parent. By default, all parent rows are collapsed for ease of viewing. To allow you to see all of the matches uncovered by Identity Finder you may choose to expand these rows by clicking the Expand All Rows menu item on the Review menu. When you do this, all parent rows are expanded, not just the row you have highlighted.

To expand or collapse a single parent row, you may click on the or icon just to the left of the folder location. Selecting and Deselecting All Rows There are two ways to select or deselect all rows in the search results. You can click the checkbox on top left of the column header and it will select all unless all are already selected in which case it will deselect all. You can also use the Select All Rows and Deselect All Rows menu items on the Review menu. Navigating to Next and Previous Identity Matches You can use the Previous Match and Next Match menu items on the Review menu to seek to Identity Matches within the result that you are previewing. You may not use these Previous and Next menu items to seek to another identity match, if it is in a different location. To skip to another file you can use the arrow keys or your mouse.

Each Identity Match will be highlighted in yellow. As you use these Previous and Next Match menu items to seek through highlighted matches, you might see the Preview Pane jump around as the identity matches do not necessarily appear sequentially in the location. Using the Shredding Feature When a location has sensitive identity match information in it and you wish to remove it from your computer, you should utilize the Shred feature. Shred is great when you no longer need the personal information or any other data in the item. The Shred button is located on the toolbar and is enabled for all types of results. Shred utilizes a secure United States Department of Defense wiping standard known as DOD 5220.22-M. Note: It is not possible to "undo" a Shred. Shredded results cannot be recovered. Once you shred something, it is gone. There are two ways to Shred a location: 1. Single click the result with the left mouse button to highlight it and click the Shred button on the toolbar.

2. Single click the result with the right mouse button to highlight it and bring up a context menu, then highlight and left-click on Shred. Shred is effective at protecting your identity because it is permanent. While this means that you can never get your data back, it also means that a hacker or malicious intruder also cannot get your data back. Securing Files with Identity Matches When a file has sensitive identity match information in it and you wish to secure it, you should utilize the Secure feature. Secure will encrypt your file so that it cannot be accessed by unauthorized individuals. It is important that you choose a strong password to secure the file. There are two ways to secure a single file: 1. Single click the file result with the left mouse button to highlight it and click the Secure button on the toolbar. After clicking Secure, if you are not logged in with an Identity Finder Profile, a dialog box will prompt you to enter a password of your choice to secure the file. If you are logged in with an Identity Finder Profile, your profile password will automatically be used and no dialog box will display. 2. Single click the file result with the right mouse button to highlight it and bring up a context menu, then highlight and left-click on Secure. To secure multiple files at one time, check the checkbox of each file and then choose the method described above to begin securing the files.

To secure all files at one time, click the checkbox on top left of the column header to select all rows or use the Select All Rows menu item on the Review Menu and then choose the method described above to begin securing the files. After clicking OK, identity Finder will secure each file and remove its result row from the Results View allowing you to continue dealing with other, unsecured identity matches. Securing Files Inside the Identity Finder Vault When a file or a document has sensitive information in it and you wish to securely store it, you may utilize the Identity Finder Vault. The Identity Finder Vault will store your documents securely with a password and encryption so that it cannot be accessed by unauthorized individuals. It is important that you choose a strong password to secure the file. To encrypt a file, click the Vault button on the toolbar. The Identity Finder Vault dialog box will appear. There are a total of five different options on the page that you can control: Specify if you would like to Encrypt or Decrypt: Choose encrypt to secure a file inside an Identity Finder Vault.

Encrypt: If you chose encrypt, here is where you select a file on your computer to secure. Enter the full path or use the browse button. Destination: Choose the destination location. By default the same path as your original file will be inserted except the file will be renamed to an extension ending with.idfvault. You may choose any destination though. Leave Original File Behind After Encryption in file vault: Choose this option if you do not want your original unsecured file shredded after it is secured inside the Identity Finder Vault.(DO NOT USE). Leave Identity Finder Vault Behind After Decrypting: Choose this option if you do not want your original secure Identity Finder Vault file deleted after you extract its contents. Once you have chosen all your options and a file location click the Encrypt button. If you are encrypting a file, you will be asked for a password and confirmation password or you can choose to Use Identity Finder Profile Password by selecting the checkbox:

Extracting Files from the Identity Finder Vault When a file or a document has sensitive information in it and you wish to securely store it, you may utilize the Identity Finder Vault. The Identity Finder Vault will store your documents securely with a password and encryption so that it cannot be accessed by unauthorized individuals. When you want to access or modify your original file you need to extract it from the Identity Finder Vault. To do this you will need to decrypt it. To decrypt a file, click the Vault button on the toolbar. The Identity Finder Vault dialog box will appear. There are a total of five different options on the page that you can control: Specify if you would like to Encrypt or Decrypt: Choose decrypt to extract your original file from its Identity Finder Vault. Decrypt: If you chose decrypt, here is where you select an Identity Finder Vault file from which to extract the contents. Destination: Choose the destination location. By default the same path as your original file will be inserted except the file will be renamed to remove the.idfvault extension. You may choose any destination though. Leave Original File Behind After Encryption in file vault: Choose this option if you do not want your original unsecured file shredded after it is secured inside an Identity Finder Vault.

Leave Identity Finder Vault Behind After Decrypting: Choose this option if you do not want your original secure Identity Finder Vault file deleted after you extract its contents. Once you have chosen all your options and a file location click the Decrypt button. If you are decrypting a file you will be asked for the original password: *Note: You can also decrypt a file by double-clicking on the encrypted file and entering your profile password. Remember if you decrypt a file, do not forget to re-encrypt this file after you are finished. Notes: An automatic scan will run once a week, and will show the results page on your screen when complete.

After a scan is complete with matches found containing Sensitive Information: Shred any emails and documents that are found containing SI If an email attachment needs to be saved, copy that attachment to a specific location and secure that attachment, then shred the email using Identity Finder If a document is needed, secure using Identity Finder