McAfee OFFICE 3.1 Spezifikationen Seite 1

Stöbern Sie online oder laden Sie Spezifikationen nach Antivirus-Sicherheitssoftware McAfee OFFICE 3.1 herunter. McAfee OFFICE 3.1 Specifications Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 135
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
McAfee
®
Endpoint Encryption for Files
and Folders
AdministrationGuide
Version3.1.3

Seitenansicht 0
1 2 3 4 5 6 ... 134 135

Inhaltsverzeichnis

Seite 1 - AdministrationGuide

McAfee® Endpoint Encryption for Files and Folders AdministrationGuideVersion3.1.3

Seite 2 - McAfee, Inc

Introduction 10 | A key feature of Endpoint Encryption for Files and Folders is the principle of containment, or persistent encryption, as it is als

Seite 3 - Contents

Large-scale deployment considerations 100 | Make sure you have performed the name indexing before you start deploying your clients. The recommendati

Seite 4 - Preface

Large-scale deployment considerations | 101 Tune encryption intensity for network When encrypting large folders on a network share through a policy,

Seite 5

Large-scale deployment considerations 102 | Exclude Endpoint Encryption for Files and Folders client program directory Irrespective of what antiviru

Seite 6

Tokens | 103 Tokens This chapter addresses the different authentication tokens that are supported in Endpoint Encryption for Files and Folders. Passw

Seite 7 - Contacting Technical Support

Tokens 104 | When properly configured, the users can use the certificates on the supported USB authentication tokens to authenticate to Endpoint Enc

Seite 8

Tokens | 105 Also, for smart cards with certificates, you may want to try the Generic PKI token module available. Please see information below. With

Seite 9

Tokens 106 | Endpoint Encryption Connector Manager G2 for Active Directory is necessary. For documentation about the Endpoint Encryption Connector M

Seite 10 - Introduction

Tokens | 107 SbTokCSP.INI file must be done before creating any installation sets for Endpoint Encryption for Files and Folders clients that shall us

Seite 11 - Management

Tokens 108 | it in accordance with what CSP is supported, e.g. Generic PKI token files – Siemens and import/replace the SbTokCSP.INI file For a comp

Seite 12 - Endpoint Encryption Manager

Endpoint Encryption for Files and Folders Configuration Files | 109 Endpoint Encryption for Files and Folders Configuration Files Endpoint Encryption

Seite 13 - Object Directory

Introduction | 11 Endpoint Encryption for Files and Folders supports three standard algorithms with various key lengths, including the Endpoint Encry

Seite 14 - Install and Deployment

Endpoint Encryption for Files and Folders Configuration Files 110 | SBM.ini This is the configuration file for Endpoint Encryption authentication to

Seite 15

Endpoint Encryption for Files and Folders Program and Driver Files | 111 Endpoint Encryption for Files and Folders Program and Driver Files EXE files

Seite 16 - Folders Client Software

Endpoint Encryption for Files and Folders Program and Driver Files 112 | SbCeProvider Utilities for receiving and providing encryption keys to the o

Seite 17 - The system tray icon

Endpoint Encryption for Files and Folders Program and Driver Files | 113 SbCeDriverCom Utilities for controlling and running the kernel driver. Deskt

Seite 18 - Compressed files

Endpoint Encryption for Files and Folders Program and Driver Files 114 | NotificationManager Manages and responds to notification events. This libra

Seite 19 - Removable media

Endpoint Encryption for Files and Folders Program and Driver Files | 115 SbCe-POLICIES The default policy for an installation of Endpoint Encryption

Seite 20 - Files and Folders

Error Messages 116 | Error Messages Please see the file sberrors.ini for more details of these error messages. You can also find more information on

Seite 21 - Folders Policy Settings

Error Messages | 117 [5c000008] A corrupt or unexpected message was received [5c000009] Unable to load the Windows TCP/IP library (WSOCK32.DLL) Chec

Seite 22

Error Messages 118 | This may occur if an attempt is made to import large amounts of data into the database (e.g. a file) [5c00001c] Unable to creat

Seite 23 - General

Error Messages | 119 Choose a different database path [db00000a] Unable to create the database Check the path settings and make sure you have write a

Seite 24

Introduction 12 | installed, the user that logs on will be forced to retrieve the proper policy assigned to him/her in the central database. If Adm

Seite 25

Error Messages 120 | This usually means that your hard disks are in the process of being encrypted or decrypted. You can check the current Endpoint

Seite 26

Error Messages | 121 The object has been deleted from the database [db010011] License has been exceeded for this object type Check that your licenses

Seite 27 - File Extensions

Error Messages 122 | Installer program errors [15000001] Memory Error [15000002] No EXE Stub [15000003] Error reading EXE Stub [15000004] Error C

Seite 28

Technical Specifications and Options | 123 Technical Specifications and Options Language Support Endpoint Encryption Manager American English, Inter

Seite 29

Technical Specifications and Options 124 | Endpoint Encryption for Files and Folders Client • Windows 2000 SP4 with RollUp1, XP SP2, Vista SP1. Ple

Seite 30

Technical Specifications and Options | 125 DoD 5220.22-M National Industrial Security Program Operating Manual (NISPOM) January 1995, Department of D

Seite 31

Appendix 126 | Appendix Making Endpoint Encryption for Files and Folders FIPS Compliant The following procedures must be followed to operate McAfee

Seite 32 - Folders

Appendix | 127 FIPS mode registry script The following needs to be saved to a text file with the extension “.reg” and then merged into the registry a

Seite 33

Appendix 128 | "Path"="c:\\program files\\safeboot content encryption\\SbAlgs\\SbAlg00.dll" [HKEY_LOCAL_MACHINE\SOFTWARE\SafeB

Seite 34

Appendix | 129 Encryption\Verifier\21] "Path"="c:\\program files\\safeboot content encryption\\SbCeDesktopIntegration.dll" [HKE

Seite 35 - Removable Media

Introduction | 13 • Configuring Endpoint Encryption for Files and Folders Policies • Creating and assigning Endpoint Encryption for Files and Folde

Seite 36

Appendix 130 | [HKEY_LOCAL_MACHINE\SOFTWARE\SafeBoot International\SafeBoot Content Encryption\Verifier\33] "Path"="c:\\program fil

Seite 37

Appendix | 131 “Path”=“c:\\program files\\safeboot content encryption\\SbCmaCe.dll” [HKEY_LOCAL_MACHINE\SOFTWARE\SafeBoot International\SafeBoot Co

Seite 38

Appendix 132 | Encryption\Verifier\20] “Path”=“c:\\program files\\safeboot content encryption\\SbCeCoreService.exe” [HKEY_LOCAL_MACHINE\SOFTWARE\S

Seite 39

Appendix | 133 [HKEY_LOCAL_MACHINE\SOFTWARE\SafeBoot International\SafeBoot Content Encryption\Verifier\32] “Path”=“c:\\program files\\safeboot con

Seite 40 - CD / DVD Encryption

Index 134 | Index AActiveDirectory,14algorithm,13,118,120,123,126,127authentication,13CClientcekeyfile,86configurationfiles,11

Seite 41 - Key Manager

Index | 135 MMicrosoft,60NNetworkencryption,48NTDomain,14Oobjectdirectory,12,13,14,111,114PPagefileencryption,11Pentium,125,1

Seite 42 - User Local Keys

Introduction 14 | Typical information stored in the Object Directory includes: • User Configuration and Policy Configuration information • Client

Seite 43 - Allow user local keys

Introduction | 15 Manager. This executable file contains the core components and drivers needed to enable Endpoint Encryption on a user’s machine. T

Seite 44 - Encryption options

Endpoint Encryption for Files and Folders Client Software 16 | Endpoint Encryption for Files and Folders Client Software Endpoint Encryption for Fi

Seite 45

Endpoint Encryption for Files and Folders Client Software | 17 Encryption product icon), and the shell extension options, visible from the context me

Seite 46

Endpoint Encryption for Files and Folders Client Software 18 | Figure6:EndpointEncryptionsystemtrayiconmenu(EndpointEncryptionforFilesa

Seite 47

Endpoint Encryption for Files and Folders Client Software | 19 Removable media Endpoint Encryption for Files and Folders can enforce encryption on re

Seite 48 - Network

McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local McAfee repre

Seite 49

Deploying Endpoint Encryption for Files and Folders 20 | Deploying Endpoint Encryption for Files and Folders There are 7 steps you need to follow to

Seite 50 - Encryption keys

Endpoint Encryption for Files and Folders Policy Settings | 21 Endpoint Encryption for Files and Folders Policy Settings About Endpoint Encryption fo

Seite 51

Endpoint Encryption for Files and Folders Policy Settings 22 | 3. Double-click it to expand its groups. 4. Either open an existing group, or creat

Seite 52

Endpoint Encryption for Files and Folders Policy Settings | 23 Adds a new policy to the group. Rename Changes the name of the policy. This does not a

Seite 53 - Validity

Endpoint Encryption for Files and Folders Policy Settings 24 | Allow explicit decrypt Enables the Decrypt… option in the user’s context menu (displ

Seite 54

Endpoint Encryption for Files and Folders Policy Settings | 25 Show About option on system tray menu Enables the option in the system tray menu that

Seite 55 - Information

Endpoint Encryption for Files and Folders Policy Settings 26 | NOTE:iftheprevioussetting(AttemptlogonwithEndpointEncryptionforPCcredenti

Seite 56

Endpoint Encryption for Files and Folders Policy Settings | 27 The Endpoint Encryption user name and the Windows user name must be identical. It is r

Seite 57 - Assigning policies

Endpoint Encryption for Files and Folders Policy Settings 28 | 2. Click the icon for File Extensions encryption. 3. Assure the category Process Sp

Seite 58 - Updating policies

Endpoint Encryption for Files and Folders Policy Settings | 29 8. Next you must add file extensions to be encrypted by the listed processes. Mark th

Seite 59 - Creating an Install Package

Contents Preface ... 6About This Guide ...

Seite 60

Endpoint Encryption for Files and Folders Policy Settings 30 | Figure10:Processspecificextensionencryption–Addingadditionalprocesses Figu

Seite 61 - Creating the Install set

Endpoint Encryption for Files and Folders Policy Settings | 31 Figure12:Processspecificextensionencryption–ExamplesetupTo remove or edit a

Seite 62 - Supported platforms

Endpoint Encryption for Files and Folders Policy Settings 32 | Deleting extensions It is important to notice that deleting a file extension does not

Seite 63

Endpoint Encryption for Files and Folders Policy Settings | 33 [PROFILE] = The user’s local user root directory, i.e. [SYSDRIVE:\Documents and Settin

Seite 64

Endpoint Encryption for Files and Folders Policy Settings 34 | Edit Lets you edit a selected folder encryption item from the list, e.g. change encry

Seite 65

Endpoint Encryption for Files and Folders Policy Settings | 35 Whenencryptinglargefoldersonanetworksharethroughapolicy,itisstronglyreco

Seite 66

Endpoint Encryption for Files and Folders Policy Settings 36 | If the Make all removable media plaintext (see below) option is enabled, then any exi

Seite 67

Endpoint Encryption for Files and Folders Policy Settings | 37 • Commandpromptfileoperations(copy*,move*)• Filesbeingcreateddirectlyon

Seite 68 - Folders client

Endpoint Encryption for Files and Folders Policy Settings 38 | You will find the DeviceID of a device by looking in the Windows Device Manager on a

Seite 69 - Endpoint Encryption Recovery

Endpoint Encryption for Files and Folders Policy Settings | 39 Figure17:IdentifyingtheDeviceIDforaremovablemediadeviceTo add exemptions to

Seite 70

Preface 4 | Client Registry controls ... 85Controlling the authentication

Seite 71 - Show status

Endpoint Encryption for Files and Folders Policy Settings 40 | Changes to the list of exempted DeviceIDs are done by using the Edit and Remove butto

Seite 72 - Synchronize

Endpoint Encryption for Files and Folders Policy Settings | 41 About Multi-Session CDs/DVDs The CD/DVD encryption feature supports burning of encrypt

Seite 73

Endpoint Encryption for Files and Folders Policy Settings 42 | Automatic key loading/unloading Enable inactivity timeout If a user has successfully

Seite 74

Endpoint Encryption for Files and Folders Policy Settings | 43 Allow user local keys Marking this box prepares the Endpoint Encryption for Files and

Seite 75 - Decrypt…

Endpoint Encryption for Files and Folders Policy Settings 44 | Allow import of user local keys This option allows users to import keys that have bee

Seite 76 - Search encrypted…

Endpoint Encryption for Files and Folders Policy Settings | 45 With this option, it is possible to have the original time values restored (preserved)

Seite 77 - Create Self-Extractor

Endpoint Encryption for Files and Folders Policy Settings 46 | If you want to enforce removable media encryption on floppy disk drives, setting this

Seite 78

Endpoint Encryption for Files and Folders Policy Settings | 47 The main purpose of process blocking is to prevent encrypted data from being unintenti

Seite 79 - Opening a Self-Extractor

Endpoint Encryption for Files and Folders Policy Settings 48 | didn’t halt. In addition, encrypted files will be scanned later whenever they are acc

Seite 80 - Attach encrypted to e-mail…

Endpoint Encryption for Files and Folders Policy Settings | 49 Enable network encryption This tick box switches network encryption on/off. If uncheck

Seite 81

Preface | 5 Index ... 134 

Seite 82

Encryption keys 50 | Encryption keys About Encryption keys Encryption keys are generic purpose objects which Endpoint Encryption applications can us

Seite 83 - Accessing encrypted files

Encryption keys | 51 7. Select the algorithm to be used by the key. You may select algorithm from the drop-down menu. The recommendation is to use t

Seite 84 - Some client characteristics

Encryption keys 52 | Delete key Deletes the selected encryption key. If you delete a key, all users connected to that policy will have all restricti

Seite 85 - Client Registry controls

Encryption keys | 53 Group This dialog presents information about the Keys group. You may type in some description for the group in the field. Click

Seite 86

Encryption keys 54 | copy of the key. If the key could be obtained from the Database, then the local copy may be installed, or updated at the same t

Seite 87

Encryption keys | 55 userthatisassignedtothekey,thenthatgrouporusercannolongermanagethekey.Beextracautiousifthisistheonlyob

Seite 88

Encryption keys 56 | Users Please see Users section of this Guide for details on this dialog. 

Seite 89 - Kernel and User traces

Assigning and Updating Policies | 57 Assigning and Updating Policies Assigning policies Once you have created encryption policies, these must be assi

Seite 90

Assigning and Updating Policies 58 | NOTE:Youcanonlyassignonetypeofpolicytoausergrouporuser.I.e.ausercannothavetwodifferentEnd

Seite 91

Creating an Install Package | 59 Creating an Install Package About Install Packages Endpoint Encryption for Files and Folders is installed by running

Seite 92

Preface 6 | Preface McAfee is dedicated to providing you with the best in security for protecting data on personal computers. Applying the latest te

Seite 93

Creating an Install Package 60 | installation set and thus applied without the user having to logon on to the Endpoint Encryption database. Install

Seite 94

Creating an Install Package | 61 Figure28:CreatinganInstallSetAfter the install file has been run on a client machine and the machine restarte

Seite 95

Creating an Install Package 62 | Installing Endpoint Encryption for Files and Folders client Supported platforms • Windows 2000 Workstation SP4 wit

Seite 96 - Folders Logon

Creating an Install Package | 63 3. Execute the Install Package created by the Endpoint Encryption administrator on the target computer. This enable

Seite 97

Creating an Install Package 64 | If you know precisely the file(s) that have changed for a particular upgrade, you may upgrade the file(s) individua

Seite 98 - SbC4.INI

Creating an Install Package | 65 8. In the search dialog that opens, browse the system directory where you have installed the Endpoint Encryption fi

Seite 99 - Large-scale deployment

Creating an Install Package 66 | Endpoint Encryption for Files and Folders authentication. If there is no connection to the Endpoint Encryption Serv

Seite 100 - Key caching

Creating an Install Package | 67 Also, when uninstalling from a Windows Vista system, there will be a (hidden) directory left behind on the client: [

Seite 101 - Dedicated machine

Endpoint Encryption for Files and Folders client 68 | Endpoint Encryption for Files and Folders client This chapter describes the client side of End

Seite 102

Endpoint Encryption for Files and Folders client | 69 About Endpoint Encryption for Files and Folders This option opens up a dialog with information

Seite 103 - USB tokens

Preface | 7 Conventions This guide uses the following conventions: Bold Condensed All words from the interface, including options, menus, buttons, an

Seite 104 - Smart cards

Endpoint Encryption for Files and Folders client 70 | User Web Recovery is used, then the questions entered by the user at the time of Web Recovery

Seite 105 - Generic PKI token

Endpoint Encryption for Files and Folders client | 71 For more information about setting up and configuring Endpoint Encryption Web Recovery, please

Seite 106 - Installation

Endpoint Encryption for Files and Folders client 72 | Synchronize Synchronizing Endpoint Encryption for Files and Folders triggers an authentication

Seite 107 - Name=RSA Sign-on Manager CSP

Endpoint Encryption for Files and Folders client | 73 Create Local Key… Starts the encryption key creation wizard. Keys may be stored either on the

Seite 108 - PIN caching

Endpoint Encryption for Files and Folders client 74 | In order to complete the import, the transport password must be entered. Also, the user must a

Seite 109 - Folders Configuration Files

Endpoint Encryption for Files and Folders client | 75 Figure34:EndpointEncryptionforFilesandFolders–ContextmenuoptionsEncrypt… If enabled

Seite 110 - SBM.ini

Endpoint Encryption for Files and Folders client 76 | If the folder/file is encrypted (e.g. according to a policy), the user cannot decrypt it. This

Seite 111 - DLL files

Endpoint Encryption for Files and Folders client | 77 This operation is very helpful before uninstalling Endpoint Encryption for Files and Folders fr

Seite 112

Endpoint Encryption for Files and Folders client 78 | Figure38:Enteringencryptionpasswordforself‐extractingfileIn essence, only the passwor

Seite 113

Endpoint Encryption for Files and Folders client | 79 The self-extractor is packaged into a *.cab file as these are widely recognized in most compute

Seite 114 - DAT files

Introduction 8 | Introduction Why Endpoint Encryption for Files and Folders? All organizations have their own rules about what data is available to

Seite 115 - Other files

Endpoint Encryption for Files and Folders client 80 | By default, the open-close-wipe option is selected. If the Extract option is selected instead,

Seite 116 - Error Messages

Endpoint Encryption for Files and Folders client | 81 CAUTION:Pleaseobservethefollowingregardingthisoption:First,inordertohaveEncryptan

Seite 117

Endpoint Encryption for Files and Folders client 82 | Identifying encrypted files and folders Figure43:EndpointEncryptionforFilesandFolders

Seite 118 - DB00: Directory

Endpoint Encryption for Files and Folders client | 83 Accessing encrypted files Figure44:EndpointEncryptionforFilesandFoldersauthentication

Seite 119

Endpoint Encryption for Files and Folders client 84 | The .cekey file When encrypting folders, either manually using the Encrypt option or when encr

Seite 120 - DB01: Database, Objects

Endpoint Encryption for Files and Folders client | 85 Follow target When a file that is encrypted with key A, for example, and is moved to a folder w

Seite 121 - A100 Algorithm

Endpoint Encryption for Files and Folders client 86 | [Options.Logon] Manual.ShowFailedRemoteConnect=Yes RequestKey.ShowFailedRemoteConnect=Yes The

Seite 122 - Installer program errors

Endpoint Encryption for Files and Folders client | 87 8. Browse for the SbC4.INI file from step (4) and finish the import. 9. Create and deploy a n

Seite 123 - System Requirements

Utilities for Endpoint Encryption for Files and Folders 88 | Utilities for Endpoint Encryption for Files and Folders This chapter describes the vari

Seite 124 - Data wiping standard

Utilities for Endpoint Encryption for Files and Folders | 89 • Communication between the Endpoint Encryption for Files and Folders client and the da

Seite 125

Introduction | 9 Users can work without interruption. With the exception of the initial logon to access protected data, Endpoint Encryption for Files

Seite 126 - Appendix

Utilities for Endpoint Encryption for Files and Folders 90 | 2. SbCeShell -use_full_driver_trace 3. SbCeShell -enable_driver_trace <{comple

Seite 127 - FIPS mode registry script

Utilities for Endpoint Encryption for Files and Folders | 91 Figure46:Windowsdialogformini‐dumpfile• In the section named Write debugging in

Seite 128

Utilities for Endpoint Encryption for Files and Folders 92 | Complete memory dump The Complete memory dump is the ideal dump from an error investiga

Seite 129

Utilities for Endpoint Encryption for Files and Folders | 93 Hanging applications Open the Task Manager and identify the frozen process that needs to

Seite 130

Utilities for Endpoint Encryption for Files and Folders 94 | 6. Wait until SBCECore.exe crashes. To know when this happens, you should look into th

Seite 131

Utilities for Endpoint Encryption for Files and Folders | 95 Where source must be a path to a file, either complete or relative, and destination must

Seite 132

The Endpoint Encryption for Files and Folders Logon 96 | The Endpoint Encryption for Files and Folders Logon The Forced Logon When Endpoint Encrypti

Seite 133

The Endpoint Encryption for Files and Folders Logon | 97 [Options.Logon] Manual.Force.UsePrivateDesktop=No Manual.UsePrivateDesktop=No

Seite 134

The Endpoint Encryption for Files and Folders Logon 98 | [Options.Logon] Manual.UsePrivateDesktop=No RequestKey.UsePrivateDesktop=No Manual.Force

Seite 135

Large-scale deployment considerations | 99 Large-scale deployment considerations This chapter briefly outlines some recommendations for large scale d

Kommentare zu diesen Handbüchern

Keine Kommentare