Dell ControlPoint Security Manager



Similar documents
Smart TPM. User's Manual. Rev MD-STPM-1001R

Table of Contents. TPM Configuration Procedure Configuring the System BIOS... 2

Motion Computing Tablet PC

HP ProtectTools User Guide

Trusted Platform Module (TPM) Quick Reference Guide

BitLocker Encryption for non-tpm laptops

HP ProtectTools. Getting Started

Encrypting with BitLocker for disk volumes under Windows 7

Dell OptiPlex XE Watchdog Timer

TPM. (Trusted Platform Module) Installation Guide V2.1

ACER ProShield. Table of Contents

TPM. (Trusted Platform Module) Installation Guide V for Windows Vista

Firmware security features in HP Compaq business notebooks

HP ProtectTools Security Manager Guide

HP ProtectTools User Guide

HP Client Security. Getting Started

Check Point FDE integration with Digipass Key devices

HP ProtectTools Security Manager

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012

Dell InTrust Preparing for Auditing Microsoft SQL Server

DriveLock and Windows 7

PROTECTOR SUITE QL. version 5.8

HP ProtectTools for Small Business Security Software, Version User Guide

TPM Key Backup and Recovery. For Trusted Platforms

Disk Encryption. Aaron Howard IT Security Office

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Configuring Outlook for IMAP. Creating a New IMAP Account. Modify an Existing Account

Utimaco SafeGuard Easy Installation Instructions for Notre Dame installer v2.5

Trusted Platform Module (TPM) Quick Reference Guide

DriveLock and Windows 8

Online Backup and Recovery Manager Setup for Microsoft Windows.

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Active Directory Integration for Greentree

EMBASSY Remote Administration Server (ERAS) Administrator Manual

How Drive Encryption Works

OnDemand. Getting Started Guide

Computer Setup User Guide

DIGIPASS CertiID. Getting Started 3.1.0

How Endpoint Encryption Works

Futronic Technology Company Ltd. FinLogon Add-On Pack. User's Guide. Version 6.0. (c) Futronic Technology Company Ltd.

Xopero Backup Build your private cloud backup environment. Getting started

Global VPN Client Getting Started Guide

Working with Office Applications and ProjectWise

White Paper: Whole Disk Encryption

Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows

1. System Requirements

DELL. Unified Server Configurator Security Overview. A Dell Technical White Paper. By Raja Tamilarasan, Wayne Liles, Marshal Savage and Weijia Zhang

HP ProtectTools Embedded Security Guide

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Start Here. P5100 Fingerprint Reader. Quick Installation Guide. Verifi. IMPORTANT. This product must be used with Windows 7 or 8.

HP Commercial Notebook BIOS Password Setup

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN June 2009

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

Dell DR4000 Disk Backup System. Introduction to the Dell DR4000 Restore Manager A primer for creating and using a Restore Manager USB flash drive

TERAcloud w w w. t e r a c l o u d. u k

Fingerprint Identity User Manual for the Griaule Biometric Framework Rev 1.00

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012

Installing the software

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

Using Websense Data Endpoint Client Software

Windows BitLocker Drive Encryption Step-by-Step Guide

In order to enable BitLocker, your hard drive must be partitioned in a particular manner.

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec

NETGEAR ReadyNAS and Acronis Backup & Recovery 10 Configuring ReadyNAS as an Acronis Backup & Recovery 10 Vault

Remote Installation of VMware ESX Server Software Using Dell Remote Access Controller

Administering FileVault 2 on OS X Mavericks with the Casper Suite v9.2 or Later. Technical Paper October 2013

Instructions: Configuring Outlook 2003 with Exchange 2010 on the FIUMail

Managing Applications, Services, Folders, and Libraries

Sophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7

Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file

Entrust Managed Services PKI Administrator Guide

SQL Server 2008 R2 Express Edition Installation Guide

Using BitLocker to encrypt a Windows 8 device

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class

Accessing the Media General SSL VPN

14 Failover and Instant Failover

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

formerly Help Desk Authority Upgrade Guide

Defender Token Deployment System Quick Start Guide

To add Citrix XenApp Client Setup for home PC/Office using the 32bit Windows client.

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

WebBIOS Configuration Utility Guide

IBM Client Security Solutions. Client Security User's Guide

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

Instructions For Opening UHA Encrypted

How to set up Outlook Anywhere on your home system

HP ProtectTools Troubleshooting Guide HP Compaq Business Desktops

Cautions When Using BitLocker Drive Encryption on PRIMERGY

Contents Notice to Users

MySabre with Sabre VPN

File Management Utility User Guide

IPSec VPN Client Installation Guide. Version 4

How to Encrypt your Windows 7 SDS Machine with Bitlocker

Web Remote Access. User Guide

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7

The cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL.

Transcription:

Dell ControlPoint Security Manager www.dell.com support.dell.com

Notes NOTE: A NOTE indicates important information that helps you make better use of your computer. Information in this document is subject to change without notice. 2009 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell and the DELL logo are trademarks of Dell Inc. Microsoft and Windows are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. January 2009 Rev A00

Contents About Dell ControlPoint Security Manager........ 3 Quick Links......................... 3 Viewing and Configuring Security Devices........ 4 Trusted Platform Module (TPM)........... 5 Fingerprint Reader.................. 5 Smart Card Controller................ 6 Contactless Smart Card............... 6 Full Disk Encryption.................. 6 Configuring Logins and Passwords............ 7 Selecting a Windows Login Authentication Type.. 7 Configuring a Pre-boot Password.......... 7 Managing Password Settings............ 8 Modifying Data Protection Settings............ 8 Configuring the Hard Drive Password........ 8 Configuring the Document Vault........... 9 Modifying File and Folder Encryption........ 9 Embassy Security Center................. 9 Contents 1

2 Contents

About Dell ControlPoint Security Manager Security Manager provides local management of system security through the use of features such as Trusted Platform Module (TPM), contact and contactless smart card, fingerprint match processing, system disk encryption, and login passwords. The Security Manager plug-in includes: Security Center Overview Lists the system devices and displays the current status; has a tab to launch the independent application ControlPoint Security Manager. Security Status Lists the system security devices and displays the current status. Logins and Passwords Allows administrators to select login type and manage password settings. Data Protection Allows administrators to set the hard drive password, configure the document vault, and modify file encryption. To configure the installed security devices, click Manage Security. Quick Links provides information on the three links available from the lower portion of Security Manager. Figure 1-1. Security Center Overview Screen Quick Links Three quick links are always available from the lower portion of Security Manager: Dell ControlPoint Security Manager 3

Run security configuration wizard Allows you to configure system security devices. Enroll your fingerprint Launches the Fingerprint Enrollment Wizard and allows you to configure a fingerprint to be used by the fingerprint processing engine. The scanned fingerprint can be used for Microsoft Windows login and pre-boot authentication. This task can be launched multiple times for the same user or it can be launched multiple times for different users. Back up security data Creates a backup of security data. Use this in the event the current platform is broken or stolen. From the backup, the security data can be loaded to the new replacement platform. Viewing and Configuring Security Devices Security Device Status lists the security devices in your system and displays the current status, as indicated by the colored icon. See Table 1-1 for information on the security device status associated with each colored icon. If you click Settings, a wizard launches that helps you configure each security device. Security devices include: Trusted Platform Module (TPM) Fingerprint Reader Smart Card Controller Contactless Smart Card Full Disk Encryption 4 Dell ControlPoint Security Manager

Table 1-1. Color Green Yellow Gray Red Security Device Status Icon Legend Status Enabled Needs Attention Disabled and the device is not available to the user Not installed Trusted Platform Module (TPM) Trusted Platform Module (TPM) is a hardware module that stores critical information such as passwords and encryption keys. Because TPM provides hardware-based authentication, a system with TPM can provide more security from unauthorized access than a system that relies strictly on software-based authentication. The TPM device must be enabled and ownership must be taken in order for security functions to operate properly. For more information, see the Embassy Security Center documentation. NOTE: Only a user with administrator rights can configure the TPM device. To configure the Trusted Platform Module (TPM) device: 1 Click Settings next to Trusted Platform Module (TPM). 2 Use Embassy Security Center to enable and set ownership of the TPM device. Embassy Security Center also provides TPM device information, such as version number. Fingerprint Reader Fingerprint authentication can be used in place of or in addition to the standard Windows password authentication to increase the security of the Windows login. If fingerprint authentication is used for Windows login or pre-boot authentication, enroll a fingerprint prior to enabling fingerprint authentication. To enroll or update a fingerprint: 1 Click Settings next to Fingerprint Reader. 2 Use the Fingerprint Enrollment Wizard to enroll or update a fingerprint. Follow the onscreen prompts. Dell ControlPoint Security Manager 5

Smart Card Controller Contacted smart cards are pocket-sized plastic cards that have an embedded silicon chip containing user information. The information on the card is read when the metal contacts on the smart card are placed directly on the contacts of the smart card reader, also known as a smart card controller. Smart cards can be used alone or combined with other authentication methods for Windows or TPM authentication. If the smart card is configured for authentication, enroll the smart card prior to enabling smart card authentication. NOTE: Only a user with administrator rights can configure the smart card. To enroll a smart card: 1 Click Settings next to Smart Card Controller. 2 Use the Smart Card Enrollment Wizard to enroll a smart card. Follow the onscreen prompts. Contactless Smart Card Contactless smart cards are pocket-sized cards that have an embedded silicon chip containing user information. Unlike contacted smart cards, the information on contactless smart cards is read by the smart card controller with the use of radio frequency when the smart card is in close proximity to the controller. Contactless smart cards can be used alone or combined with other authentication methods for Windows or TPM authentication. If the smart card is configured for authentication, enroll the smart card prior to enabling smart card authentication. NOTE: Only a user with administrator rights can configure the smart card. To enroll a contactless smart card: 1 Click Settings next to Contactless Smart Card Controller. 2 Use the Smart Card Enrollment Wizard to enroll a smart card. Follow the onscreen prompts. Full Disk Encryption The Microsoft Encrypting File System (EFS) is used to encrypt and decrypt files and folder on your system. Use the Secure EFS wizard to configure EFS to use a digital certificate that has its private key protected by the TPM device. To configure EFS for creating or using a TPM-secured digital certificate: 6 Dell ControlPoint Security Manager

1 Click Settings next to Full Disk Encryption. 2 Use the Secure EFS Wizard to create or use a digital certificate for encrypting files and folders on your system. Follow the onscreen prompts. Configuring Logins and Passwords Configuring login and password tasks are only enabled for users with administrator rights. Logins and Passwords allow administrators to perform the following tasks: Select Windows Login Authentication Type Configure Pre-boot Password Manage Password Settings Selecting a Windows Login Authentication Type The selected Windows login authentication type will apply to all users of the system. To select the Windows login authentication: 1 Click Settings next to Require a fingerprint or password for Windows logon. 2 Use Embassy Security Center to enable Windows login, select the authentication type for Windows login, and enroll users for fingerprints for Windows login. Follow the onscreen prompts. Configuring a Pre-boot Password A pre-boot password is used to authenticate the user before the system boots up. This prevents unauthorized users from accessing data on the hard drive in the event the system is lost or stolen. Options for pre-boot login include: None No option is chosen for pre-boot login. System password The pre-boot login uses the system password for authorization. Hard drive password The pre-boot login uses the hard drive password for authorization. Fingerprint The pre-boot login uses a fingerprint for authorization. Smart card The pre-boot login uses a smart card for authorization. To configure the pre-boot password: Dell ControlPoint Security Manager 7

1 Click Settings next to Set a pre-boot system password. 2 Use the Enrollment Wizard to register your fingerprints or smart card for preboot authentication. Managing Password Settings Windows is set up to manage accounts for all users of a system. Some Microsoft User Accounts tasks available for configuration require that you log on as an administrator or a member of the Administrators group. See the Microsoft documentation for more information. To manage password settings: 1 Click Settings next to Manage your Windows Password Settings. 2 Use Microsoft User Accounts to add and remove users, reset passwords, and manage passwords. Modifying Data Protection Settings Modifying data protection tasks are only enabled for users with administrator rights. Data Protection is used to perform the following tasks: Configure the Hard Drive Password Configure Document Vault Modify File and Folder Encryption Figure 1-2. Modify Data Protection Settings Screen Configuring the Hard Drive Password The internal hard drive password is separate from the system password and is used by the system's internal hard drive. 8 Dell ControlPoint Security Manager

To configure the hard drive password: 1 Click Settings next to Select or manage your Hard Drive password. 2 Use the wizard to configure the hard drive password. Follow the onscreen prompts. Configuring the Document Vault To configure the document vault: 1 Click Settings next to Access your Document Vault and adjust settings. 2 Use the wizard to configure document vault. Follow the onscreen prompts. Modifying File and Folder Encryption The Microsoft Encrypting File System (EFS) is used to encrypt and decrypt files and folder on your system. Use the Secure EFS wizard to configure EFS to use a digital certificate that has its private key protected by the TPM device. To modify the settings for file and folder encryption: 1 Click Settings next to Modify File and Folder encryption. 2 Use the Secure EFS Wizard to create or use a digital certificate for encrypting files and folders on your system. Follow the onscreen prompts. Embassy Security Center Wave Systems Embassy Security Center (ESC) provides the tools for managing the Trusted Platform Module (TPM), which conforms to the standard by the Trusted Computing Group (TCG). ESC also contains advanced password management and authentication functions. For more information on Embassy Security Center, visit www.wave.com/support. Dell ControlPoint Security Manager 9

10 Dell ControlPoint Security Manager