Enterprise Erase LAN



Similar documents
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.

Guide to Installing BBL Crystal MIND on Windows 7

Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel Fax Page 1 of 14

Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright Lismore Software Systems, Ltd. All rights reserved.

Operating System Installation Guidelines

StarWind iscsi SAN: Configuring Global Deduplication May 2012

Paragon Backup Retention Wizard

Ultra Thin Client TC-401 TC-402. Users s Guide

3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System. Version 4.2 Software Installation Guide (Upgrade) 1 P age

EZblue BusinessServer The All - In - One Server For Your Home And Business

Tutorial How to upgrade firmware on Phison S8 controller MyDigitalSSD using a Windows PE environment

Installing Windows XP Professional

ThinkServer RD540 and RD640 Operating System Installation Guide

EaseUS Todo Backup user guide. EaseUS Todo Backup. Central Management Console. User guide - 1 -

Contents. Hardware Configuration Uninstalling Shortcuts Black...29

Lexia Network Installation Instructions

Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument.

StarWind iscsi SAN Software: Using StarWind with VMware ESX Server

AMD RAID Installation Guide

Course: WIN310. Student Lab Setup Guide. Summer Microsoft Windows Server 2003 Network Infrastructure (70-291)

1. Central Monitoring System Software

3.5 EXTERNAL NETWORK HDD. User s Manual

Meridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide

ESATA PCI CARD. User s Manual

Pleiades USB/LAN. User Manual. & Installation Guide. External Storage Enclosure for 3.5 Hard Drive. v1.1

EZblue BusinessServer The All - In - One Server For Your Home And Business

Parallels Desktop for Mac

License Patrol TM Mac Client Installation Guide 7.0 for Mac OS X. September 2015 VERALAB TM

How to Test Out Backup & Replication 6.5 for Hyper-V

ThinkServer RD550 and RD650 Operating System Installation Guide

VMware Horizon FLEX User Guide

Magaya Software Installation Guide

1. Central Monitoring System Software

Puppy Linux Installation To a USB Flash Drive How to install Puppy Linux lupu Lucid to a Flash Drive

Acer LCD Monitor Driver Installation Guide

User s Manual CONTENT. Nano NAS Server for USB storages. 1. Product Information Product Specifications System requirements..

TANDBERG MANAGEMENT SUITE 10.0

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version PROMISE Technology, Inc. All Rights Reserved.

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall

WA1916 WebSphere ESB 7.0 Programming Using WID. Classroom Setup Guide. Web Age Solutions Inc. Copyright 2011 Web Age Solutions Inc.

Appendix B Lab Setup Guide

1. Central Monitoring System Software

Operating System Installation Guide

SATA RAID Function (Only for chipset Sil3132 used) User s Manual

Clearswift SECURE Exchange Gateway Installation & Setup Guide. Version 1.0

AMD RAID Installation Guide

Installing and Upgrading to Windows 7

MDM Mass Configuration Tool User s Manual

WA1791 Designing and Developing Secure Web Services. Classroom Setup Guide. Web Age Solutions Inc. Web Age Solutions Inc. 1

FOG Guide. IPBRICK International. July 17, 2013

NAS HARD DRIVE ENCLOSURE USER MANUAL. S T O R E n S H A R E MUSIC DATA PHOTO MOVIE

User s Guide for version 5 Page

3M Stats and Status Software for 3M Detection System Model 8900/9900. Administrator s Guide

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Windows Vista /Windows 7 Installation Guide

2.5" XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (X Series) 1.

Setting Up Your FTP Server

USER MANUAL. FLASH DUPLICATOR CopyKing II CPY220

Preparing the Windows version of the software for use

WA2102 Web Application Programming with Java EE 6 - WebSphere RAD 8.5. Classroom Setup Guide. Web Age Solutions Inc. Web Age Solutions Inc.

Monitor Wall 4.0. Installation and Operating Manual

Tutorial How to upgrade firmware on Phison S5 controller MyDigitalSSD

AMD RAID Installation Guide

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

Virtual Appliance Setup Guide

VMware Horizon FLEX User Guide

LOREX CLIENT Remote Software 4.0

How To Install And Configure Windows Server 2003 On A Student Computer

SupportDesk Installation Guide Main Client Version

ThinLinX TLXOS NUC / Compute Stick / RePC Installation Guide Creating the Installer (Step 1)


IP-Pro (Virtual IP Protocol Independent Version) User Instructions

AXIS Camera Station Quick Installation Guide

MiraCosta College now offers two ways to access your student virtual desktop.

System Area Manager. Remote Management

Using AORUS Notebook for the First Time

ThinLinX TLXOS 64-bit Firmware Installation Guide for the Intel NUC Range. Materials Required

Network Storage System with 2 Bays

Using VMware Workstation

Network Projector Operation Guide

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

1. System Requirements

LockView CompX Database & Network Configuration & Installation Manual

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer

Setting Up Novell Small Business Suite

OPERATION MANUAL. MV-410RGB Layout Editor. Version 2.1- higher

WA1781 WebSphere Process Server v6.2 Administration. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc.

Keychain Barcode Scanner

Multi-Share User Instructions

This document describes the standard software installation process for Doors.NET software.

Allworx Installation Course

LTFS for Microsoft Windows User Guide

MN POS TM. Hardware & Peripherals. All required hardware may be purchased from Home Office.

Dexcom Update Tool: Instructions for Use

Intel Data Migration Software

Hi-Speed USB Flash Disk User s Manual Guide


DOCSVAULT Document Management System for everyone

Back Office Recorder Dig04 Installation Guide

Transcription:

Enterprise Erase LAN Network Erasing and Asset Management Server Version 2.0 Users Guide 888.700.8560 toll free www.tabernus.com 11130 Jollyville Rd Suite 301 Austin, TX 78757

Table of Contents 1 Product Features... 3 1.1 Description... 3 1.2 How Enterprise Erase LAN Works... 3 1.3 Software Features... 4 1.4 System Requirements... 4 1.4.1 Server or Host Minimum Requirements... 4 1.4.2 Target or Client Computer Minimum Requirements... 5 2 Setting Up Enterprise Erase LAN... 5 2.1 Download Software... 5 2.2 Running Software in Demo Mode... 5 2.3 Install Software... 6 2.4 System Start Up... 7 2.5 Request Licenses... 7 2.6 Update License Request... 8 3 Running Enterprise Erase LAN... 9 3.1 Configure Screen... 14 4 Service and Support... 14 ~~ 2 of 14 ~~ Copyright 2010 Tabernus

1 Product Features 1.1 Description Enterprise Erase LAN empowers users with the ability to erase large numbers of desktops, laptops, servers, and enterprise storage over a local area network. You can erase over 200 computers simultaneously. Couple this capability with organized reporting on both the erasure and the asset information collected from the client and you have a business tool optimized to handle large volume data elimination. Enterprise Erase LAN is an asset management and data erasing system, designed to simultaneously control up to 255 clients over a local area network (LAN). Enterprise Erase LAN application deploys with its own operating system. Here are some key highlights: Works over local area network connections Capable of erasing over 200 computers simultaneously Organized reporting of both the hard drive erased, as well as the client asset information Reporting data can be ported into your database Capable of erasing any drive type (SATA, IDE, SCSI, SAS, FC) Configurable erasure options DoD, NIST SP 800-88, and others Can be deployed and activated on your hardware Enterprise Erase LAN was designed to run on its own private subnet. Although it can function on a company s main network, we recommend running on its own subnet to prevent accidental erasure of computer hard drives not assigned for decommission. 1.2 How Enterprise Erase LAN Works Enterprise Erase LAN allows for erasure of desktops, laptops, and servers over a local area network. The target devices are set up in a LAN to which the host device (that contains the Enterprise Erase LAN software) is also attached. The user can then PXE boot the target devices, see all of them through the software and erase them simultaneously. This erasure can be initiated from either the client or the host. The setup can also be run without a monitor, keyboard, and mouse at the client end. Enterprise Erase LAN allows the user to erase up to 200 target devices without having to remove the drives from their host hardware for erasure. Enterprise Erase LAN can also be used to erase small servers (four or less internal drives). Setup is similar to the graphic shown, replacing laptops and desktops with servers. ~~ 3 of 14 ~~ Copyright 2010 Tabernus

1.3 Software Features Enterprise Erase LAN Asset Management and Sanitizing Software. Easy-to-Use operator interface. Failure Notification. When a drive fails or is not successfully sanitized, visual indicators on the monitor tell the operator. Asset Management Logging Capability System Serial Number System Asset Number Processor Make, Model, Frequency Number of Processors Memory Size, Speed, Number of Memory Modules Hard Drive Make, Model, Size, Type Hard Drive Serial Number Disk Erasing Features DOD level 3, 5220-22M compliant disk sanitizer Single Pass, Single Pass with Verification, 7 Pass Sector Viewer to physically inspect data on any drive on any client. Sector Snapshot reporting to sample drives after sanitization. 1.4 System Requirements 1.4.1 Server or Host Minimum Requirements IBM-compatible PC with a Pentium or AMD processor or better (Dual Core preferred) 1024 Mb RAM 40 Gb HDD Network Interface Card Display Keyboard and Mouse USB Port ~~ 4 of 14 ~~ Copyright 2010 Tabernus

1.4.2 Target or Client Computer Minimum Requirements IBM-compatible PC with a Pentium or AMD processor 512 Mb RAM Network Card connection Optional: Display, keyboard, and mouse 2 Setting Up Enterprise Erase LAN 2.1 Download Software 1. Download Software ISO image Go to Tabernus Software Downloads webpage www.tabernus.com/index.php?page=download Complete the short form. Select Enterprise Erase LAN 2. Burn ISO image to DVD media. 3. Insert DVD and boot DVD on Server or Host System System Requirements for Server System: IBM-compatible PC with a Pentium processor or better (Dual Core Preferred) 1024 Mb RAM 40 Gb HDD Network Interface Card Display Keyboard and Mouse USB Port 4. Software will load from DVD. Desktop appears. 2.2 Running Software in Demo Mode Running Enterprise Erase in demonstration mode allows you to test all the functionality of the product and its features without having to install the software on a system. The software runs and loads into system memory from the DVD media. This allows prospective clients to perform compatibility tests and try it before you buy it with the software. The Demo mode will generate reports and perform data removal on hard drives. However, the data removal and times to completion are only 50% of the target drive in the demo mode. Before Proceeding: NOTE: The demo software will erase 50% of the target drive. Do not target a hard drive that has data that needs to be kept intact. 1. Insert DVD, and boot DVD from host computer. 2. From Desktop click, double click Enterprise Erase LAN (Demo) Icon. Note: The software will run off the DVD media and not install on the hard drive. 3. Build a small subnet with the host computer connected to target computers via network cables and hubs. If you do not have access to a hub, you can connect directly to one target computer using an ~~ 5 of 14 ~~ Copyright 2010 Tabernus

ethernet cable from host system to a single target computet. This same setup can be used for small servers instead of desktops and/or laptops. 4. Once Enterprise Erase LAN is launched, then PXE boot the target computers. Once the target computers PXE boot, each will be assigned an IP address by the software and will appear in on the host software GUI. Note: Target computers may need to be configured to PXE boot on their boot up menu. 5. Select the target computer hard drive and begin the erasure process on the target systems. Note: The data erasure process can be initiated from the host computer or the target computer GUI. Note: Refer to section 3.0 Running Enterprise Erase LAN for detailed functions of software 2.3 Install Software 1. Double-Click. Install Enterprise Erase LAN to Hard Drive Icon. 2. Generic Installer screen. No action. Click Next button. 3. Language screen. Select U.S. English. Click Next button. 4. Hostname screen. Use default hostname: localhost.localdomain. Click Next button. 5. Set time zone. Click Next button. 6. Set Root Password (aka admin password). Confirm. Click Next button. Weak password window pop-up. Click Yes. 7. Install screen. Select Remove all partitions on selected drives and create default layout. Click Next button. Confirm Write changes to drive. 8. Process window Copying live image to hard drive. 9. Doing post-installation. 10. Congratulations Install complete. Click Close button. 11. Eject DVD from player 12. Shut down computer from drop down menu. Select Restart option from pop-up menu ~~ 6 of 14 ~~ Copyright 2010 Tabernus

2.4 System Start Up 1. First time boot up screen Welcome. Click Forward button. 2. License Information. Click Forward button. 3. Create User screen. Enter user name and password of your choice. Click Forward button. 4. Set Date Time screen. Set the correct time and date. Click Forward button. Important!. Failure to set the correct date and time will result in accurate Pass/Fail certificates 5. Hardware Profile screen. No action. Click Finish button. Pop-Up screen. Select Click No, do not send button. 6. Desktop will appear. Double-click Enterprise Erase LAN icon to run software. Note: When the Enterprise Erase application opens, a terminal window will also open on the desktop. Do not close this terminal window. If the terminal window is closed, then it will shut down the application. 2.5 Request Licenses 1. In order to load licenses on Enterprise Erase LAN software, you first need to install the software to the system hard drive. Note: You cannot load licenses in Live-CD Demo Mode. 2. On the Desktop, double-click Enterprise Erase LAN icon. 3. Request License. Got to Help drop down menu. Select Request New License only once. 4. A License Request File unique to your system configuration is created on the Desktop. 5. Insert USB stick into system. The USB will automatically mount and display on the desktop. 6. Select LicRequest.txt file icon and drag and drop the file on the USB, or copy and paste. 7. Before removing USB stick from the computer, you must right-mouse click on USB icon and Unmount Volume, then remove the USB stick. ~~ 7 of 14 ~~ Copyright 2010 Tabernus

8. Take the USB stick with LicRequest.txt file to any system that can send emails. Send email to sales@tabernus.com and attach LicRequest.txt. Include the quantity requested and company contact. 2.6 Update License Request 1. Once the License Request is received by Tabernus, an UpdateLicense.txt file will be generated and emailed back to the originator. Note: The UpdateLicense.txt file authorize the licenses on the software program. The UpdateLicense.txt file must be used on the same system that generated the original LicRequest.txt file. A mismatch of files will cause an error and an unsuccessful load of licenses. 2. Using a USB stick move the UpdateLicense.txt file from the USB to the Enterprise Erase LAN desktop via copy and paste or drag and drop. 3. Open the Enterprise Erase LAN application, if not open already. Got to Help drop down menu. Select Load New License only once. 4. The Enterprise Erase LAN will update with the requested licenses. Verify license count by checking the counter located at the bottom with the software s action buttons. Before License Load After License Load ~~ 8 of 14 ~~ Copyright 2010 Tabernus

3 Running Enterprise Erase LAN Once logged in, you will see the desktop (See Figure 2). Double-click on the Enterprise Erase LAN icon to launch the software. Figure 2: Enterprise Erase LAN Desktop The application will launch and now you are ready to start (see Figure 3). After launch Enterprise Erase LAN listens for clients to boot up and get on-line. Enterprise Erase LAN is designed to be on-line prior to clients boot up. Figure 3: Initial Screen after Launch (Listening for Clients) ~~ 9 of 14 ~~ Copyright 2010 Tabernus

After Enterprise Erase LAN is launched you may connect clients which are networked into the server (see Figure 4) and boot them to the network. Figure 4: Enterprise Erase LAN Detects Client Main Window Display: Information Parameters IP Address: This specifies the IP address of the client computer. In general IP addresses will range from 192.168.0.1 to 192.168.0.255 Log Asset: This window will display until the asset is logged in which case it will show logged. Security: This displays the security level assigned to each hard drive. Drives within each client may have their own unique security level. If different erasure levels are specified for different drives within a client it will display mixed. Lvl-1: Single pass overwrite of 0 Lv1-1v: Single pass overwrite and verify Lvl-3: Three pass overwrite and verify (DoD Standard) Lv1-7: Seven pass overwrite and verify Asset #: This is a unique identifier entered or scanned by the operator for tracking purposes. Type: For the client it will display system for hard drives it will display the type of hard drive, SCSI, ATA, or SATA. Device Details: This displays vendor information and model type for client computers and disk drives. Capacity: This displays the hard drive capacity for each disk. At the client (or system) level, capacity is the total sum of all hard drives within the computer. Status: This displays the progress of the purge and estimated time to completion. At the system level progress indicates the progress of sanitizing all drives within the computer. Main Window Display: Buttons and Popups Please ensure you select a drive or system prior to initiating any action associated with main window buttons. ~~ 10 of 14 ~~ Copyright 2010 Tabernus

Get Sys. Info: This will display system (or computer) information including processor and memory data. All data is polled directly from the system BIOS (see Figure 5). Figure 5: System Information View Sector: This allows the user to view raw data from any hard drive on the network. This provides a means for a user to randomly inspect data on hard drives (see Figure 6). Start Erase: Executes the sanitizing process defined by the parameters in Set Security Level. The erase process sanitizes the hard drive by overwriting data on every byte. During this process data is written to the hard drive and the software looks for I/O errors from the drive. Single pass purging overwrites all bytes with zeros. DOD is a 3 pass wipe with 1 verify. The first pass is all zeros; the second pass is all 1s, the third pass is 10 (0xA hex). After the last pass the data is read from the disk drive to verify the final pattern. Cancel: This will cancel any tests being performed on a selected drive or system. Quit: This will quit the application. ~~ 11 of 14 ~~ Copyright 2010 Tabernus

Figure 6: Sector Data from Hard Drive Log Asset: This will log asset information to a CSV file for upload into databases. This data may be viewed by clicking on VIEW LOGS button. Set Asset Number: This allows the user to assign a particular internal tracking number to a hard drive or system. A scan gun can attached to the server and used to scan in asset numbers into the software. Set Security Level: This allow the user to assign various erasure levels to various drives. That is one drive can execute a Lv1-1 process, while another drive executes Lv1-3 sanitization standard (See Figure 7). Figure 7: Set Security Level View Logs: This allows the operator to view a log of all assets logged and hard drives sanitized by the software; this data resides within the csv director (see Figure 8). Within the detailed reports directory resides sector snapshot ~~ 12 of 14 ~~ Copyright 2010 Tabernus

data from random drives. The sampling rate or frequency of sampling drives is set within the configure window as described below. Note: All purged drives are logged whether they pass of fail. Figure 8: Log Locations Remove System: This button will release a client system from the Enterprise Erase LAN application. Typically a system is removed after sanitization or after the asset has been logged. Rescan Network: Typically Enterprise Erase LAN is launched first and listens for new clients to become active online. However in some cases the Enterprise Erase LAN application is launched after clients are already on-line. This button will actively rescan all IP addresses assigned in the configuration screen below and look for clients (see Figure 9). Figure 9: Scanning Network ~~ 13 of 14 ~~ Copyright 2010 Tabernus

3.1 Configure Screen There are a few parameters which the user can figure Enterprise Erase LAN to meet their needs (See Figure 10). Figure 10: Configure Screen Network Ports to Scan: This defines the network ports which will be scanned when the Rescan Network button pressed in the main screen. IP addresses outside this range may be detected as they come on-line; however only these addresses will be actively scanned. Note: Only the last portion of the IP address is configurable. Create Detailed Purge Report: The user can set a frequency of how often to get detailed reports on the drives. These reports are in the detailed reports folder when you select VIEW LOGS. Each detailed report shows a sector snapshot of the first, middle, and last sector of the drive. 4 Service and Support For service or support issues, please contact Tabernus Support at: Email: support@tabernus.com Phone: 888.700.8559 Online support: http://support.tabernus.com ~~ 14 of 14 ~~ Copyright 2010 Tabernus