Installing the software



Similar documents
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

BounceBack User Guide

Guide to Installing BBL Crystal MIND on Windows 7

Connecting to UNSW Exchange & zmail using MS Outlook Introduction

Replacing a MealTime Point of Sale Computer

FileCruiser. VA2600 SR1 Quick Configuration Guide

Important Notes for WinConnect Server VS Software Installation:

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

How To Connect To A University Of Cyprus Vpn 3000 From Your Computer To A Computer With A Password Protected Connection

Driver Updater Manual

SSL VPN Setup for Windows

DocAve Upgrade Guide. From Version 4.1 to 4.5

Apple Mac VPN Service Setting up Remote Desktop

Setup Guide. network support pc repairs web design graphic design Internet services spam filtering hosting sales programming

Xopero Backup Build your private cloud backup environment. Getting started

Installing SQL Express. For CribMaster 9.2 and Later

Using Websense Data Endpoint Client Software

Time Machine Setup for Routers

4cast Client Specification and Installation

PhoneCrypt Desktop. Phone Encryption Software. PhoneCrypt Manual Mobile phone encryption for Windows Platforms

Sophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7

Creating a Complete Backup of Shelby v5 Data

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version PROMISE Technology, Inc. All Rights Reserved.

SalonTouch SQL and.net Database Backup Instructions Updated 10/16/2006

Reference Document. SedonaOnline Support

Active Directory Integration for Greentree

Using Internet or Windows Explorer to Upload Your Site

Guide to Using Citrix at SLU (Windows)

Updating Your Applied Account

Installation Instruction STATISTICA Enterprise Small Business

Jumble for Microsoft Outlook

PCSchool SQL Backup Tech Tip. SQL Backup Tech Tip. Created in version /9

Arkay Remote Data Backup Client Quick Start Guide

User Guide Microsoft Exchange Remote Test Instructions

BSDI Advanced Fitness & Wellness Software

Setting Up Monthly Reporter

Outlook Start Outlook, and click on mserver.wlu.ca. 2. From the Tools menu, choose Options

Spector 360 Deployment Guide. Version 7

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

Chapter7 Setting the Receiving PC for Direct Upload. Setting the Receiving PC for Direct Upload For Windows For Macintosh...

CANON FAX L360 SOFTWARE MANUAL

Contents. VPN Instructions. VPN Instructions... 1

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x

Setup and configuration for Intelicode. SQL Server Express

I Expense Online Expense Approvals

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition

Imation LOCK User Manual

Xythos on Demand Quick Start Guide For Xythos Drive

Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website

Installing S500 Power Monitor Software and LabVIEW Run-time Engine

4.3 Multiview Setup. Configure this section on remote PC Install Multiview

Important Notes for WinConnect Server ES Software Installation:

Entire Connection Version 4.2.1

NeoMail Guide. Neotel (Pty) Ltd

Print Server Application Guide. This guide applies to the following models.

DPMS2 McAfee Endpoint Encryption New Installation

1. Open the Account Settings window by clicking on Account Settings from the Entourage menu.

Configuring Outlook 2016 for Windows

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

How to Copy A SQL Database SQL Server Express (Making a History Company)

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Setting up an account and logging in using Design & Print Online. Opening a saved project

TCC INTERNET. Setup and Configuration. Comtrend DSL Modem with built-in Wireless Router

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide

EZblue BusinessServer The All - In - One Server For Your Home And Business

The FlexiSchools Online Order Management (FOOM) Installation Guide

ilaw Installation Procedure

Remote Access for Cisco Unity 8.x

Outlook 2010 Setup Guide (POP3)

Kaseya Server Instal ation User Guide June 6, 2008

How to Pop to Outlook

Snow Inventory. Installing and Evaluating

QUANTIFY INSTALLATION GUIDE

Windows XP with Symantec AntiVirus 10 Corporate Edition

Using TViX Network. NFS mode : You must install the TViX NetShare utility in to your PC, but you can play the TP or DVD jukebox without stutter.

SAPIP GUI INSTALLATION. Table of Contents

DSX-HSCS Hot Swap Comm Server

Creating client-server setup with multiple clients

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Citrix Client Install Instructions

DriveLock Quick Start Guide

Working with Office Applications and ProjectWise

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Setting up a VPN connection Windows XP

Start Here. Installation Guide. Rosetta Stone Standalone License. This Guide Will Show You How To: Install the Student Management System...

Scan to Quick Setup Guide

IntelliPay Billpay Application Documentation

PC Instructions for Miller LiveArc Software

FrontDesk Installation And Configuration

How to use FTP Commander

ZeusPOS User s Manual TABLE OF CONTENTS

1 of 10 1/31/2014 4:08 PM

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

How To Set Up An Outlook Mailbox On A Windows 2007 (For Free) With A Free Account On A Blackberry Or Ipad (For A Free) Or Ipa (For An Ipa) With An Outlook 2007 (Free) Or

Altaro Hyper-V Backup - Getting Started

Allworx Installation Course

Time Machine How-To Guide

How to configure functional mailboxes in Outlook

WA2102 Web Application Programming with Java EE 6 - WebSphere RAD 8.5. Classroom Setup Guide. Web Age Solutions Inc. Web Age Solutions Inc.

Transcription:

Windows FDE ME and MI Encryption Installation Guide The CheckPoint encryption software for Windows has both a USB drive encryption product (ME) and a full disk encryption product (MI). CheckPoint Media Encryption (formerly Pointsec Protector) is used to encrypt USB storage devices and external hard drives. CheckPoint Full Disk Encryption MI is used to encrypt internal hard drives. The latest information on encryption at VMC (including supported platforms, known issues, etc.) can be found here: http://www.mc.vanderbilt.edu/root/vumc.php?site=infoprivacysecurity&doc=17072. Purchasing and Attaining the software - The software should be purchased and attained from the ITS Software Store: http://its.vanderbilt.edu/software/. CheckPoint ME (Protector): Installing the software CheckPoint ME (Protector) should be installed before encrypting the hard drives with MI. It can be installed silently or manually. To install it silently via a command line use the following: \\share\setup.exe -s -f1\\share\setup.iss with \\share being the location of the file share the installation folder is on.

To install manually via a GUI: Login as administrator and run setup.exe. You should see the following screen and click Next

You will need to accept the license agreement, then click Next

Check Custom as the setup type and click Next

Make sure Pointsec Protector DataScan is NOT checked and click Next

Under Server Name enter ncs-pointsec-p1.mc.vanderbilt.edu and click Add. Then also add ncs-pointsec-p2.mc.vanderbilt.edu, both with port 9738. Note you may get an error that it can t find the server. If you do, verify that the name is correct, then click Okay. Under Connection Type click Random then click Next

Click Next

An installation update screen will show up

You will be prompted to restart the computer when the installation has completed. Click Finish Once the computer has restarted, the USB encryption will be in place. It is strongly recommended that users take advantage of the Password Vault at: https://ncs.mc.vanderbilt.edu/ut001/devicesecurity/homepage.aspx in case they forget their passwords.

CheckPoint Windows Full Disk Encryption MI: CheckPoint FDE MI installation is a multi step process. Pre-Installation Information of CheckPoint Windows FDE (Pointsec) The pre-installation steps for installing the software are: 1. Backup all the data on the computer 2. Remove any existing encryption software 3. Run check disk 4. Run defrag 5. Review the latest information at: http://www.mc.vanderbilt.edu/root/vumc.php?site=infoprivacysecurity&doc=21650 The encryption failure rate has been very minimal and can be lessened by performing the steps above. When the encryption is being done, it reads and writes the entire hard drive which will stress the drive. So if the drive is in marginal shape, this might cause it to fail. While the steps above take time, skipping them could result in the loss of data. Installing the Device Agent To install the device agent you will need to be logged in as administrator and run Device Agent x.x.x.xxxx.msi that came in the zip file from the software store.

If you run this manually on the client you will get the following, click Next Click Install to continue the install

You will see a progress screen When the installation completes, click Finish

The next step requires action from the MI Management Server. When the device is ready to be encrypted: Open a service desk ticket (3-HELP) requesting that the computer be approved for encryption. You will need to provide the computer name and OU. Once approved on the management server; the next time the client polls the server (can take up to 4 hours); it will silently pull down and install the encryption software. At this point, the client computer needs to be restarted before the actual encryption will start. Because there is no notice given on the client when the software is installed, we recommend telling the user to restart the system when they leave for the day or for the LAN Manager to schedule a restart sometime after the user has left. The normal time to encrypt a hard drive is about 15GB per hour depending on the speed of the computer and whether the computer is being used during the encryption process.

Other useful info: You can check the encryption process by going to: Start > Programs > Check Point > Endpoint Security > Check Point Endpoint Security. Then click on the yellow Check Point padlock icon in the bottom right tool bar and select Settings. This will open the following window showing (among other things) the encryption status: When the encryption is complete, it will read 100%.

The Endpoint Security MI Device Agent GUI shows addition information and can be used to force the client to send and receive any updates from the server. Go to: Programs > Check Point > Endpoint Security > Endpoint Security MI Device Agent GUI on the client computer to open. You can force the client to connect to the server by doing a Force poll under the Command tab of the MI Device Agent GUI (you will want to force a poll about 3 times to ensure that all the required data is exchanged).

You can see what modules are installed on the Configuration tab of the MI Device Agent GUI