McAfee OFFICE 3.1 Especificaciones Pagina 1

Busca en linea o descarga Especificaciones para Software de seguridad antivirus McAfee OFFICE 3.1. McAfee OFFICE 3.1 Specifications Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 135
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 0
McAfee
®
Endpoint Encryption for Files
and Folders
AdministrationGuide
Version3.1.3

Vista de pagina 0
1 2 3 4 5 6 ... 134 135

Indice de contenidos

Pagina 1 - AdministrationGuide

McAfee® Endpoint Encryption for Files and Folders AdministrationGuideVersion3.1.3

Pagina 2 - McAfee, Inc

Introduction 10 | A key feature of Endpoint Encryption for Files and Folders is the principle of containment, or persistent encryption, as it is als

Pagina 3 - Contents

Large-scale deployment considerations 100 | Make sure you have performed the name indexing before you start deploying your clients. The recommendati

Pagina 4 - Preface

Large-scale deployment considerations | 101 Tune encryption intensity for network When encrypting large folders on a network share through a policy,

Pagina 5

Large-scale deployment considerations 102 | Exclude Endpoint Encryption for Files and Folders client program directory Irrespective of what antiviru

Pagina 6

Tokens | 103 Tokens This chapter addresses the different authentication tokens that are supported in Endpoint Encryption for Files and Folders. Passw

Pagina 7 - Contacting Technical Support

Tokens 104 | When properly configured, the users can use the certificates on the supported USB authentication tokens to authenticate to Endpoint Enc

Pagina 8

Tokens | 105 Also, for smart cards with certificates, you may want to try the Generic PKI token module available. Please see information below. With

Pagina 9

Tokens 106 | Endpoint Encryption Connector Manager G2 for Active Directory is necessary. For documentation about the Endpoint Encryption Connector M

Pagina 10 - Introduction

Tokens | 107 SbTokCSP.INI file must be done before creating any installation sets for Endpoint Encryption for Files and Folders clients that shall us

Pagina 11 - Management

Tokens 108 | it in accordance with what CSP is supported, e.g. Generic PKI token files – Siemens and import/replace the SbTokCSP.INI file For a comp

Pagina 12 - Endpoint Encryption Manager

Endpoint Encryption for Files and Folders Configuration Files | 109 Endpoint Encryption for Files and Folders Configuration Files Endpoint Encryption

Pagina 13 - Object Directory

Introduction | 11 Endpoint Encryption for Files and Folders supports three standard algorithms with various key lengths, including the Endpoint Encry

Pagina 14 - Install and Deployment

Endpoint Encryption for Files and Folders Configuration Files 110 | SBM.ini This is the configuration file for Endpoint Encryption authentication to

Pagina 15

Endpoint Encryption for Files and Folders Program and Driver Files | 111 Endpoint Encryption for Files and Folders Program and Driver Files EXE files

Pagina 16 - Folders Client Software

Endpoint Encryption for Files and Folders Program and Driver Files 112 | SbCeProvider Utilities for receiving and providing encryption keys to the o

Pagina 17 - The system tray icon

Endpoint Encryption for Files and Folders Program and Driver Files | 113 SbCeDriverCom Utilities for controlling and running the kernel driver. Deskt

Pagina 18 - Compressed files

Endpoint Encryption for Files and Folders Program and Driver Files 114 | NotificationManager Manages and responds to notification events. This libra

Pagina 19 - Removable media

Endpoint Encryption for Files and Folders Program and Driver Files | 115 SbCe-POLICIES The default policy for an installation of Endpoint Encryption

Pagina 20 - Files and Folders

Error Messages 116 | Error Messages Please see the file sberrors.ini for more details of these error messages. You can also find more information on

Pagina 21 - Folders Policy Settings

Error Messages | 117 [5c000008] A corrupt or unexpected message was received [5c000009] Unable to load the Windows TCP/IP library (WSOCK32.DLL) Chec

Pagina 22

Error Messages 118 | This may occur if an attempt is made to import large amounts of data into the database (e.g. a file) [5c00001c] Unable to creat

Pagina 23 - General

Error Messages | 119 Choose a different database path [db00000a] Unable to create the database Check the path settings and make sure you have write a

Pagina 24

Introduction 12 | installed, the user that logs on will be forced to retrieve the proper policy assigned to him/her in the central database. If Adm

Pagina 25

Error Messages 120 | This usually means that your hard disks are in the process of being encrypted or decrypted. You can check the current Endpoint

Pagina 26

Error Messages | 121 The object has been deleted from the database [db010011] License has been exceeded for this object type Check that your licenses

Pagina 27 - File Extensions

Error Messages 122 | Installer program errors [15000001] Memory Error [15000002] No EXE Stub [15000003] Error reading EXE Stub [15000004] Error C

Pagina 28

Technical Specifications and Options | 123 Technical Specifications and Options Language Support Endpoint Encryption Manager American English, Inter

Pagina 29

Technical Specifications and Options 124 | Endpoint Encryption for Files and Folders Client • Windows 2000 SP4 with RollUp1, XP SP2, Vista SP1. Ple

Pagina 30

Technical Specifications and Options | 125 DoD 5220.22-M National Industrial Security Program Operating Manual (NISPOM) January 1995, Department of D

Pagina 31

Appendix 126 | Appendix Making Endpoint Encryption for Files and Folders FIPS Compliant The following procedures must be followed to operate McAfee

Pagina 32 - Folders

Appendix | 127 FIPS mode registry script The following needs to be saved to a text file with the extension “.reg” and then merged into the registry a

Pagina 33

Appendix 128 | "Path"="c:\\program files\\safeboot content encryption\\SbAlgs\\SbAlg00.dll" [HKEY_LOCAL_MACHINE\SOFTWARE\SafeB

Pagina 34

Appendix | 129 Encryption\Verifier\21] "Path"="c:\\program files\\safeboot content encryption\\SbCeDesktopIntegration.dll" [HKE

Pagina 35 - Removable Media

Introduction | 13 • Configuring Endpoint Encryption for Files and Folders Policies • Creating and assigning Endpoint Encryption for Files and Folde

Pagina 36

Appendix 130 | [HKEY_LOCAL_MACHINE\SOFTWARE\SafeBoot International\SafeBoot Content Encryption\Verifier\33] "Path"="c:\\program fil

Pagina 37

Appendix | 131 “Path”=“c:\\program files\\safeboot content encryption\\SbCmaCe.dll” [HKEY_LOCAL_MACHINE\SOFTWARE\SafeBoot International\SafeBoot Co

Pagina 38

Appendix 132 | Encryption\Verifier\20] “Path”=“c:\\program files\\safeboot content encryption\\SbCeCoreService.exe” [HKEY_LOCAL_MACHINE\SOFTWARE\S

Pagina 39

Appendix | 133 [HKEY_LOCAL_MACHINE\SOFTWARE\SafeBoot International\SafeBoot Content Encryption\Verifier\32] “Path”=“c:\\program files\\safeboot con

Pagina 40 - CD / DVD Encryption

Index 134 | Index AActiveDirectory,14algorithm,13,118,120,123,126,127authentication,13CClientcekeyfile,86configurationfiles,11

Pagina 41 - Key Manager

Index | 135 MMicrosoft,60NNetworkencryption,48NTDomain,14Oobjectdirectory,12,13,14,111,114PPagefileencryption,11Pentium,125,1

Pagina 42 - User Local Keys

Introduction 14 | Typical information stored in the Object Directory includes: • User Configuration and Policy Configuration information • Client

Pagina 43 - Allow user local keys

Introduction | 15 Manager. This executable file contains the core components and drivers needed to enable Endpoint Encryption on a user’s machine. T

Pagina 44 - Encryption options

Endpoint Encryption for Files and Folders Client Software 16 | Endpoint Encryption for Files and Folders Client Software Endpoint Encryption for Fi

Pagina 45

Endpoint Encryption for Files and Folders Client Software | 17 Encryption product icon), and the shell extension options, visible from the context me

Pagina 46

Endpoint Encryption for Files and Folders Client Software 18 | Figure6:EndpointEncryptionsystemtrayiconmenu(EndpointEncryptionforFilesa

Pagina 47

Endpoint Encryption for Files and Folders Client Software | 19 Removable media Endpoint Encryption for Files and Folders can enforce encryption on re

Pagina 48 - Network

McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local McAfee repre

Pagina 49

Deploying Endpoint Encryption for Files and Folders 20 | Deploying Endpoint Encryption for Files and Folders There are 7 steps you need to follow to

Pagina 50 - Encryption keys

Endpoint Encryption for Files and Folders Policy Settings | 21 Endpoint Encryption for Files and Folders Policy Settings About Endpoint Encryption fo

Pagina 51

Endpoint Encryption for Files and Folders Policy Settings 22 | 3. Double-click it to expand its groups. 4. Either open an existing group, or creat

Pagina 52

Endpoint Encryption for Files and Folders Policy Settings | 23 Adds a new policy to the group. Rename Changes the name of the policy. This does not a

Pagina 53 - Validity

Endpoint Encryption for Files and Folders Policy Settings 24 | Allow explicit decrypt Enables the Decrypt… option in the user’s context menu (displ

Pagina 54

Endpoint Encryption for Files and Folders Policy Settings | 25 Show About option on system tray menu Enables the option in the system tray menu that

Pagina 55 - Information

Endpoint Encryption for Files and Folders Policy Settings 26 | NOTE:iftheprevioussetting(AttemptlogonwithEndpointEncryptionforPCcredenti

Pagina 56

Endpoint Encryption for Files and Folders Policy Settings | 27 The Endpoint Encryption user name and the Windows user name must be identical. It is r

Pagina 57 - Assigning policies

Endpoint Encryption for Files and Folders Policy Settings 28 | 2. Click the icon for File Extensions encryption. 3. Assure the category Process Sp

Pagina 58 - Updating policies

Endpoint Encryption for Files and Folders Policy Settings | 29 8. Next you must add file extensions to be encrypted by the listed processes. Mark th

Pagina 59 - Creating an Install Package

Contents Preface ... 6About This Guide ...

Pagina 60

Endpoint Encryption for Files and Folders Policy Settings 30 | Figure10:Processspecificextensionencryption–Addingadditionalprocesses Figu

Pagina 61 - Creating the Install set

Endpoint Encryption for Files and Folders Policy Settings | 31 Figure12:Processspecificextensionencryption–ExamplesetupTo remove or edit a

Pagina 62 - Supported platforms

Endpoint Encryption for Files and Folders Policy Settings 32 | Deleting extensions It is important to notice that deleting a file extension does not

Pagina 63

Endpoint Encryption for Files and Folders Policy Settings | 33 [PROFILE] = The user’s local user root directory, i.e. [SYSDRIVE:\Documents and Settin

Pagina 64

Endpoint Encryption for Files and Folders Policy Settings 34 | Edit Lets you edit a selected folder encryption item from the list, e.g. change encry

Pagina 65

Endpoint Encryption for Files and Folders Policy Settings | 35 Whenencryptinglargefoldersonanetworksharethroughapolicy,itisstronglyreco

Pagina 66

Endpoint Encryption for Files and Folders Policy Settings 36 | If the Make all removable media plaintext (see below) option is enabled, then any exi

Pagina 67

Endpoint Encryption for Files and Folders Policy Settings | 37 • Commandpromptfileoperations(copy*,move*)• Filesbeingcreateddirectlyon

Pagina 68 - Folders client

Endpoint Encryption for Files and Folders Policy Settings 38 | You will find the DeviceID of a device by looking in the Windows Device Manager on a

Pagina 69 - Endpoint Encryption Recovery

Endpoint Encryption for Files and Folders Policy Settings | 39 Figure17:IdentifyingtheDeviceIDforaremovablemediadeviceTo add exemptions to

Pagina 70

Preface 4 | Client Registry controls ... 85Controlling the authentication

Pagina 71 - Show status

Endpoint Encryption for Files and Folders Policy Settings 40 | Changes to the list of exempted DeviceIDs are done by using the Edit and Remove butto

Pagina 72 - Synchronize

Endpoint Encryption for Files and Folders Policy Settings | 41 About Multi-Session CDs/DVDs The CD/DVD encryption feature supports burning of encrypt

Pagina 73

Endpoint Encryption for Files and Folders Policy Settings 42 | Automatic key loading/unloading Enable inactivity timeout If a user has successfully

Pagina 74

Endpoint Encryption for Files and Folders Policy Settings | 43 Allow user local keys Marking this box prepares the Endpoint Encryption for Files and

Pagina 75 - Decrypt…

Endpoint Encryption for Files and Folders Policy Settings 44 | Allow import of user local keys This option allows users to import keys that have bee

Pagina 76 - Search encrypted…

Endpoint Encryption for Files and Folders Policy Settings | 45 With this option, it is possible to have the original time values restored (preserved)

Pagina 77 - Create Self-Extractor

Endpoint Encryption for Files and Folders Policy Settings 46 | If you want to enforce removable media encryption on floppy disk drives, setting this

Pagina 78

Endpoint Encryption for Files and Folders Policy Settings | 47 The main purpose of process blocking is to prevent encrypted data from being unintenti

Pagina 79 - Opening a Self-Extractor

Endpoint Encryption for Files and Folders Policy Settings 48 | didn’t halt. In addition, encrypted files will be scanned later whenever they are acc

Pagina 80 - Attach encrypted to e-mail…

Endpoint Encryption for Files and Folders Policy Settings | 49 Enable network encryption This tick box switches network encryption on/off. If uncheck

Pagina 81

Preface | 5 Index ... 134 

Pagina 82

Encryption keys 50 | Encryption keys About Encryption keys Encryption keys are generic purpose objects which Endpoint Encryption applications can us

Pagina 83 - Accessing encrypted files

Encryption keys | 51 7. Select the algorithm to be used by the key. You may select algorithm from the drop-down menu. The recommendation is to use t

Pagina 84 - Some client characteristics

Encryption keys 52 | Delete key Deletes the selected encryption key. If you delete a key, all users connected to that policy will have all restricti

Pagina 85 - Client Registry controls

Encryption keys | 53 Group This dialog presents information about the Keys group. You may type in some description for the group in the field. Click

Pagina 86

Encryption keys 54 | copy of the key. If the key could be obtained from the Database, then the local copy may be installed, or updated at the same t

Pagina 87

Encryption keys | 55 userthatisassignedtothekey,thenthatgrouporusercannolongermanagethekey.Beextracautiousifthisistheonlyob

Pagina 88

Encryption keys 56 | Users Please see Users section of this Guide for details on this dialog. 

Pagina 89 - Kernel and User traces

Assigning and Updating Policies | 57 Assigning and Updating Policies Assigning policies Once you have created encryption policies, these must be assi

Pagina 90

Assigning and Updating Policies 58 | NOTE:Youcanonlyassignonetypeofpolicytoausergrouporuser.I.e.ausercannothavetwodifferentEnd

Pagina 91

Creating an Install Package | 59 Creating an Install Package About Install Packages Endpoint Encryption for Files and Folders is installed by running

Pagina 92

Preface 6 | Preface McAfee is dedicated to providing you with the best in security for protecting data on personal computers. Applying the latest te

Pagina 93

Creating an Install Package 60 | installation set and thus applied without the user having to logon on to the Endpoint Encryption database. Install

Pagina 94

Creating an Install Package | 61 Figure28:CreatinganInstallSetAfter the install file has been run on a client machine and the machine restarte

Pagina 95

Creating an Install Package 62 | Installing Endpoint Encryption for Files and Folders client Supported platforms • Windows 2000 Workstation SP4 wit

Pagina 96 - Folders Logon

Creating an Install Package | 63 3. Execute the Install Package created by the Endpoint Encryption administrator on the target computer. This enable

Pagina 97

Creating an Install Package 64 | If you know precisely the file(s) that have changed for a particular upgrade, you may upgrade the file(s) individua

Pagina 98 - SbC4.INI

Creating an Install Package | 65 8. In the search dialog that opens, browse the system directory where you have installed the Endpoint Encryption fi

Pagina 99 - Large-scale deployment

Creating an Install Package 66 | Endpoint Encryption for Files and Folders authentication. If there is no connection to the Endpoint Encryption Serv

Pagina 100 - Key caching

Creating an Install Package | 67 Also, when uninstalling from a Windows Vista system, there will be a (hidden) directory left behind on the client: [

Pagina 101 - Dedicated machine

Endpoint Encryption for Files and Folders client 68 | Endpoint Encryption for Files and Folders client This chapter describes the client side of End

Pagina 102

Endpoint Encryption for Files and Folders client | 69 About Endpoint Encryption for Files and Folders This option opens up a dialog with information

Pagina 103 - USB tokens

Preface | 7 Conventions This guide uses the following conventions: Bold Condensed All words from the interface, including options, menus, buttons, an

Pagina 104 - Smart cards

Endpoint Encryption for Files and Folders client 70 | User Web Recovery is used, then the questions entered by the user at the time of Web Recovery

Pagina 105 - Generic PKI token

Endpoint Encryption for Files and Folders client | 71 For more information about setting up and configuring Endpoint Encryption Web Recovery, please

Pagina 106 - Installation

Endpoint Encryption for Files and Folders client 72 | Synchronize Synchronizing Endpoint Encryption for Files and Folders triggers an authentication

Pagina 107 - Name=RSA Sign-on Manager CSP

Endpoint Encryption for Files and Folders client | 73 Create Local Key… Starts the encryption key creation wizard. Keys may be stored either on the

Pagina 108 - PIN caching

Endpoint Encryption for Files and Folders client 74 | In order to complete the import, the transport password must be entered. Also, the user must a

Pagina 109 - Folders Configuration Files

Endpoint Encryption for Files and Folders client | 75 Figure34:EndpointEncryptionforFilesandFolders–ContextmenuoptionsEncrypt… If enabled

Pagina 110 - SBM.ini

Endpoint Encryption for Files and Folders client 76 | If the folder/file is encrypted (e.g. according to a policy), the user cannot decrypt it. This

Pagina 111 - DLL files

Endpoint Encryption for Files and Folders client | 77 This operation is very helpful before uninstalling Endpoint Encryption for Files and Folders fr

Pagina 112

Endpoint Encryption for Files and Folders client 78 | Figure38:Enteringencryptionpasswordforself‐extractingfileIn essence, only the passwor

Pagina 113

Endpoint Encryption for Files and Folders client | 79 The self-extractor is packaged into a *.cab file as these are widely recognized in most compute

Pagina 114 - DAT files

Introduction 8 | Introduction Why Endpoint Encryption for Files and Folders? All organizations have their own rules about what data is available to

Pagina 115 - Other files

Endpoint Encryption for Files and Folders client 80 | By default, the open-close-wipe option is selected. If the Extract option is selected instead,

Pagina 116 - Error Messages

Endpoint Encryption for Files and Folders client | 81 CAUTION:Pleaseobservethefollowingregardingthisoption:First,inordertohaveEncryptan

Pagina 117

Endpoint Encryption for Files and Folders client 82 | Identifying encrypted files and folders Figure43:EndpointEncryptionforFilesandFolders

Pagina 118 - DB00: Directory

Endpoint Encryption for Files and Folders client | 83 Accessing encrypted files Figure44:EndpointEncryptionforFilesandFoldersauthentication

Pagina 119

Endpoint Encryption for Files and Folders client 84 | The .cekey file When encrypting folders, either manually using the Encrypt option or when encr

Pagina 120 - DB01: Database, Objects

Endpoint Encryption for Files and Folders client | 85 Follow target When a file that is encrypted with key A, for example, and is moved to a folder w

Pagina 121 - A100 Algorithm

Endpoint Encryption for Files and Folders client 86 | [Options.Logon] Manual.ShowFailedRemoteConnect=Yes RequestKey.ShowFailedRemoteConnect=Yes The

Pagina 122 - Installer program errors

Endpoint Encryption for Files and Folders client | 87 8. Browse for the SbC4.INI file from step (4) and finish the import. 9. Create and deploy a n

Pagina 123 - System Requirements

Utilities for Endpoint Encryption for Files and Folders 88 | Utilities for Endpoint Encryption for Files and Folders This chapter describes the vari

Pagina 124 - Data wiping standard

Utilities for Endpoint Encryption for Files and Folders | 89 • Communication between the Endpoint Encryption for Files and Folders client and the da

Pagina 125

Introduction | 9 Users can work without interruption. With the exception of the initial logon to access protected data, Endpoint Encryption for Files

Pagina 126 - Appendix

Utilities for Endpoint Encryption for Files and Folders 90 | 2. SbCeShell -use_full_driver_trace 3. SbCeShell -enable_driver_trace <{comple

Pagina 127 - FIPS mode registry script

Utilities for Endpoint Encryption for Files and Folders | 91 Figure46:Windowsdialogformini‐dumpfile• In the section named Write debugging in

Pagina 128

Utilities for Endpoint Encryption for Files and Folders 92 | Complete memory dump The Complete memory dump is the ideal dump from an error investiga

Pagina 129

Utilities for Endpoint Encryption for Files and Folders | 93 Hanging applications Open the Task Manager and identify the frozen process that needs to

Pagina 130

Utilities for Endpoint Encryption for Files and Folders 94 | 6. Wait until SBCECore.exe crashes. To know when this happens, you should look into th

Pagina 131

Utilities for Endpoint Encryption for Files and Folders | 95 Where source must be a path to a file, either complete or relative, and destination must

Pagina 132

The Endpoint Encryption for Files and Folders Logon 96 | The Endpoint Encryption for Files and Folders Logon The Forced Logon When Endpoint Encrypti

Pagina 133

The Endpoint Encryption for Files and Folders Logon | 97 [Options.Logon] Manual.Force.UsePrivateDesktop=No Manual.UsePrivateDesktop=No

Pagina 134

The Endpoint Encryption for Files and Folders Logon 98 | [Options.Logon] Manual.UsePrivateDesktop=No RequestKey.UsePrivateDesktop=No Manual.Force

Pagina 135

Large-scale deployment considerations | 99 Large-scale deployment considerations This chapter briefly outlines some recommendations for large scale d

Comentarios a estos manuales

Sin comentarios