Home
ProtectDrive User Manual - Secure Support
Contents
1. The Foundation of Information Security e B m gt di 4 U ty r prm 3 k JL f p P P Y A IS AT TII J FOI 22 JLE ia K I LA a 7 Wa 1 i _ u gu s ERA EJ UE A 4 UY P CN A e r All rights r Copyright 2010 SafeNe 2010 SafeNet Inc All rights reserved Part Number 007770 001 Rev F 6 2010 Software Version 3 6 3 All intellectual property is protected by copyright All trademarks and product names used or referred to are the copyright of their respective owners No part of this document may be reproduced stored in a retrieval system or transmitted in any form or by any means electronic mechanical chemical photocopy recording or otherwise without the prior written permission of SafeNet SafeNet makes no representations or warranties with respect to the contents of this document and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose Furthermore SafeNet reserves the right to revise this publication and to make changes from time to time in the content hereof without the obligation upon SafeNet to notify any person or organization of any such revisions or changes SafeNet invites constructive comments on the contents of this document These comments together with your personal and or company details should be sent to the address below SafeNet Inc 4690 Millennium Drive Belcamp Marylan
2. Orphan Exclusion Personal Configuration PKI PKI Mode Policy Policy Keyphrase ProtectFile Administrator ScrCtrl Utility Shared Domain Sleeping Domain SafeNet Inc Glossary A string of characters that can represent a password or can be used to generate a cryptographic key ProtectFile defines a number of different keyphrase types Each keyphrase type has a different purpose in securing encrypted files inside domains and ProtectFile features All keyphrases entered must adhere to normal password rules Refer to page Error Bookmark not defined for details See Data Encryption Keyphrase Domain Administration Keyphrase Domain Keyphrase Policy Keyphrase and User Password Lightweight Directory Access Protocol NT File System A type of Windows file system See also FAT An exclusion not contained within a domain A set of domains exclusions and excluded extensions protected under a private user password which defines the location and type of protected files for a particular user A personal configuration is usually unique to an individual Public Key Infrastructure An operating mode of ProtectFile where a user can create and administer envelopes See also Domain Mode A range of permissions that restrict the features of ProtectFile available to an unprivileged user The keyphrase used to view and modify policy settings The system administrator uses policy settings to prevent users f
3. 5 Chapter 3 Operation Menu Bar The menus available from the ProtectFile main menu bar are listed below Under each menu a description of the commands and dialog boxes available via the menu is given A more detailed description of the commands and dialog boxes follows after this section File Disable Log Off Domain Mode FIPS Mode Exclusion Add View Remove Extension Add View Remove Envelope Add View Remove Administration Register De Register View Toolbar Log file Help About Allows user to disable enable the encryption driver Allows user to exit the ProtectFile application Allows user to enable Domain Mode Allows user to enable FIPS Mode Allows user to add an exclusion Allows user to view available exclusions Allows user to remove an exclusion Allows user to add an excluded extension Allows user to view excluded extensions Allows user to remove an excluded extension Allows user to add an envelope Allows user to view available envelopes Allows user to remove an envelope Allows user to perform envelope administration Allows user to register an envelope Allows user to de register an envelope Allows user to hide view the toolbar Allows user to view the log file of ProtectFile events Displays program information and version number details and provides access to Policy Setting Properties dialog SafeNet Inc Chapter 3 Oper
4. ProtectFile to the system tray to prevent an unauthorized user from accessing the ProtectFile menu and modifying your personal configuration If ProtectFile is minimized to the system tray you must first restore it from the system tray to access menu commands To restore ProtectFile from the system tray 1 Click the ProtectFile icon in the system tray 2 Type your User Password and click OK or press Enter System Tray Status Icons l l ProtectFile is enabled but no encrypted folders exist in your personal configuration MI ProtectFile is enabled and at least one encrypted folder exists in your personal configuration 7 ProtectFile is disabled You are not logged on to ProtectFile SafeNet Inc Chapter 3 Operation Chapter 3 Operation The Main Menu All ProtectFile features and settings are accessible from the main menu After a successful login if the main menu screen does not start automatically 1t can be invoked by clicking on the ProtectFile icon si in the Windows system tray The ProtectFile GUI consists of e a menu bar which allows for all ProtectFile operations e atoolbar which contains various shortcuts e astatus bar which indicates the status of ProtectFile Add Remove Show About Exclusion Exclusion Log ProtectPile ProtectFile SEE ajej e w af Ready n EMABLED Add Remove ProtectFile Extension Extension Status Figure 2 Menu bar and toolbar SafeNet Inc
5. administration Register Allows user to register a domain De Register Allows user to de register a domain Share Domain Allows user to share a domain Working With Domains Managing Domains A domain refers to a file or folder which is protected by ProtectFile The term protected as used in the context of ProtectFile means that the subfolders and files within the domain are encrypted Following the installation of ProtectFile no domains exist in any personal configurations Before ProtectFile can be effective you must define one or more domains in your personal configuration Domains may be defined in your personal configuration by adding a domain or registering a domain By default users do not have access rights to create or register a domain This must be granted by the ProtectFile administrator To create a new domain you must use the Add Domain command described below For example if the E Secret Files folder has not been encrypted and you wish to encrypt the folder you should use the Add Domain command To access encrypted files and subfolders in a pre existing domain a user can use the Register Domain command to make the domain available in their personal configurations For example if your colleague would like access to the EASecret Files domain that you added they would need to use the Register Domain command to do so Domains can be added or removed at any time however care must be taken when performing th
6. the Lock Code pair displayed Lock Code 1 Lock Code 2 2 Your ProtectFile Administrator will supply you with an Unlock Key Enter the supplied Unlock Key 3 If the Unlock Key is correct you will be required to enter a new password after which you will be able to continue using ProtectFile as normal O NOTE e If you are not prompted to enter a new password and ProtectFile closes the Unlock Key entered 1s incorrect This could be due to a number of factors The Unlock Key was entered incorrectly The Unlock Codes you supplied to the ProtectFile Administrator were incorrect The Unlock Key supplied by your ProtectFile Administrator was incorrect Dealing With Lost User Passwords If you have forgotten your user password and you are not presented with a dialog requesting an Unlock Key it may be possible to recover data provided that one of the following conditions is met e The domain envelope keyphrases are known Of e Anold configuration with your current user password was previously saved In either case contact your system administrator Temporarily Disabling ProtectFile File Decryption To prevent unauthorized users from accessing your encrypted files while you are away from your computer you can temporarily disable ProtectFile file decryption From the main menu select File Disable While ProtectFile is disabled e A check mark is shown next to the Disable option in the File menu e The
7. the envelope via Windows Explorer Encryption Mode This drop down list allows the user to select the algorithm used for encryption The default algorithm can be set by the system administrator Refer to ProtectFile Administration Guide for additional details O NOTE e Ifthe FIPS Mode check box is selected and the IDEA license has been installed the IDEA algorithm is not available in the Encryption Mode drop down list e Ifthe IDEA algorithm is already selected and then the FIPS Mode check box is selected the following message displays IDEA algorithm is not available in FIPS mode 11 Chapter 3 Operation 5 Click OK to close the Add Envelope dialog 0 NOTE Do not use Access Control for envelopes on a computer running ProtectFile that are to be shared This feature works only for envelopes located on servers that do NOT run ProtectFile Access Control only works for envelopes that do not have any exclusions defined on subfolders If an exclusion is defined inside an envelope with Access Control enabled then Access Control will be disabled The actual encryption key that is used to encrypt the envelope is chosen at random by ProtectFile This increases security as it is no longer possible to choose weak keyphrases Removing Envelopes O NOTE If the envelope 1s shared with other users be careful not to use this function without making sure that files no longer need to be protected by ProtectFile Als
8. to adding it as an envelope Use Random Domain Key If this check box is selected the key used to encrypt the data is generated randomly If this check box 1s cleared the Domain Keyphrase and Confirm Domain Keyphrase fields become active allowing the user to enter a keyphrase which will be utilized to derive the data encryption key Domain Keyphrase If the FIPS Mode check box is selected on the Add Envelope dialog this option is unavailable and Use Random Domain Key is automatically selected When the Use Random Domain Key check box is cleared this field and the Confirm Domain Keyphrase field become active If these fields are used ProtectFile will generate the data encryption key when a keyphrase 1s entered Enter a keyphrase that is at least 10 characters and case sensitive then confirm the keyphrase in the Confirm Domain Keyphrase field Access Control This check box turns on the ProtectFile Access Control feature Access Control prevents unauthorized users from viewing the contents of an envelope If this option is selected then users who are not authenticated with ProtectFile will not be able to access any files within an envelope including files within excluded subfolders or files of the type that have been configured as excluded extensions For example if an envelope has been added with the Access Control feature enabled a user who is not registered to the envelope will not be able to view the files and subfolders in
9. Control feature enabled a user who is not registered to the domain will not be able to view the files and subfolders in the domain via Windows Explorer e Encryption Mode This drop down list allows the user to select the algorithm used for encryption The default algorithm can be set by the system administrator Refer to ProtectFile Administration Guide for additional details O NOTE e If the FIPS Mode check box is selected the IDEA algorithm is not available in the Encryption Mode drop down list e Ifthe IDEA algorithm is already selected and then the FIPS Mode check box is selected the following message displays IDEA algorithm is not available in FIPS mode Click Advanced The Data Encryption Key dialog displays 6 Modify this dialog as needed to choose advanced domain keyphrase features e Random Key TIf this option is selected the key used to encrypt the data 1s generated randomly This option can be used 1f the FIPS Mode check box is selected on the Add Domain dialog e Derive from key phrase If the FIPS Mode check box is selected on the Add Domain dialog this option and the Key phrase for data encryption group controls are unavailable See note below If this option is selected the Key phrase for data encryption area of the dialog becomes active Enter the Keyphrase which will be used by ProtectFile to generate the data encryption key keyphrases must be at least 10 characters and are case sensitive then c
10. Directory Search with Filter box select All Users to view all the valid users in the Current Active Search Base Alternatively the search may be refined by selecting the Selected Users option and entering the appropriate query The Advanced button makes available the entry of more complex queries Users holding a valid certificate who are found via the search query described above are shown in the bottom most left display panel The bottom most right display panel shows the list of users who have access rights to the envelope Users who are classed as administrators to the selected envelope are specially marked e To add an administrator to the envelope select the user from the bottom most left display panel and click Admin The user will appear in the bottom most right display panel e To add a user to the envelope select the user from the bottom most left display panel and click the button e To remove a user or an administrator select the user in the right display panel and click the button e To remove all users press the lt lt button 13 Chapter 3 Operation 7 Select the Show DN check box to display the users names in Distinguished Name format O NOTE e When using Directory Search with Filter represents alphanumeric characters regardless of their number and value Registering an Envelope During normal day to day operation users are typically not required to interact with ProtectFile s
11. ation Logging Off To log off select File gt Log Off A dialog informs the user of the ProtectFile shutdown and prompts for confirmation to continue Following a log off ProtectFile will become inactive Any data saved while ProtectFile is inactive will not be protected The only way to be certain that data is protected by ProtectFile is to save and close all applications prior to logging out of ProtectFile While ProtectFile is shut down all files within domains will appear encrypted to all applications Before disabling ProtectFile make sure that all applications do not have any files open that are inside domains to prevent data corruption Working with Envelopes Managing Envelopes An envelope refers to a file or folder which 1s protected by ProtectFile Premium The term protected as used in the context of ProtectFile means that the subfolders and files within the envelope are encrypted For example if you have an envelope C Folder Subfolder defined then ProtectFile will prevent you from defining an envelope in C Folder or C Folder Subfolder SubSub Folder To work effectively with ProtectFile it is important to understand the concept and definition of envelopes An envelope defines a file region such as a folder which ProtectFile will manage as a secure repository for data files To the user envelopes appear as regular file folders which include standard control attributes such as permissions From an administrative
12. ation for professional use e those with 90 days time limitation for evaluation If your ProtectFile license is a trial evaluation license upgrade to a full license by changing the license code You can upgrade your license any time 1 From the main menu select Help gt About ProtectFile The About ProtectFile dialog displays 2 Click the License button next to the License Number Enter the new license number into the fields provided and click OK 4 Click OK again to close the window O NOTE To upgrade from one version to another for example BUSINESS PASSWORD to BUSINESS CSP you must uninstall and reinstall ProtectFile with the new license number Your personal configuration will not be affected SafeNet Inc 31 Chapter 5 Administration Restrictions Sleeping Domains Envelopes During startup ProtectFile reads the tag file of all registered domains envelopes Sometimes this is not possible for example the CD with the domain envelope is not inserted or the server hosting a domain envelope is not available Such domains envelopes are called sleeping domains envelopes They are marked as asleep in the View Domains or View Envelopes dialog Typically their existence is of no importance as the corresponding files are not available However it may happen that a sleeping domain envelope becomes available later on for example the CD 1s inserted or the network server is restarted In this case Pr
13. clusions 1 From the main menu select Exclusion gt View The View Exclusion dialog displays 2 Click OK to return to the main menu Managing Excluded Extensions Files can be excluded from encryption by ProtectFile based on their file name extension For example if you want all files ending with ZIP to be unprotected you need to add a ZIP excluded extension to your ProtectFile personal configuration ProtectFile always excludes files with certain extensions from encryption In general this applies to any program files The default file extensions always excluded are BAT COM DLL EXE PROF and S YS Additional extensions can be added to your personal configuration Modifications to the excluded extension list are system wide This means that files specified in the excluded extension list are never encrypted in any domains Special care must be taken as frequent use of this feature may compromise data integrity when sharing domains with other users The recommended course of action is to make a decision about which extensions will be excluded and add those excluded extensions immediately after installing ProtectFile All applications should be closed before making changes to your ProtectFile personal configuration to prevent any data integrity problems Prior to adding an excluded extension to your personal configuration it is important to make sure that no files are in use by an application
14. commended that while you have a mixed environment Clients and Management Console of differing versions that you do not use AES encryption for anything you wish to share with clients running earlier versions The actual encryption key that is used to encrypt the domain is chosen at random by ProtectFile This increases security as it is no longer possible to choose weak key phrases If an explicit encryption key phrase is required it can be entered in the Data Encryption Key dialog which is accessible via the Advanced button Refer to the ProtectFile Administration Guide for additional details Removing Domains 26 From the main menu select Domain gt Remove or click the Remove Domain icon B on the toolbar The Remove Domain dialog displays Select the domain to be removed and click OK Verify all encrypted files are closed and click Continue Enter the administrator password of this domain and click OK The domain may only be removed if you know this password The Decrypt Files check box is present only for domains which were created in an older version of ProtectFile and should be selected if you wish to decrypt all files contained in the domain prior to its removal Continue removing domains as needed When you are finished restart Windows to maintain full data integrity NOTE The newer style domains provide better recovery options In cases where you want to de register a user from a legacy domain without decryptin
15. d 21017 USA Technical Support If you encounter a problem while installing registering or operating this product please make sure that you have read the documentation If you cannot resolve the issue please contact your supplier or SafeNet Support SafeNet Support operates 24 hours a day 7 days a week Your level of access to this service is governed by the support plan arrangements made between SafeNet and your organization Please consult this support plan for further information about your entitlements including the hours when telephone support is available to you Technical Support Contact Information Phone 800 545 6608 Email support safenet inc com Acknowledgements Windows is a registered trademark of Microsoft Corporation in the United States and other countries Windows Vista is either a registered trademark or trademark of Microsoft Corporation in the United States and or other countries Table of Contents Table of Contents Chapter 1 Mitr OCU CUO mee M 1 SCC UTIL ONCE W nin 2 Chapter 20 Os uo te EIN RR NEIN MINE NIE 3 DATO Protec il Ener neces ds 3 Workstation Secuelas 3 IU Mea A Er secs E E ate ecb idu ete sda ni edad E T aden E A E 4 SOSA US ICONS ns sea des etes Docs D ele tU D QE 4 Chapter Operations t ei i e e RE iq eri ii eL rien ee 5 dE Mer Tt 5 MUD O RP Cr 6 BOSS OM a a XR 7 Workine With Envelopes saciedad 7 MARA VIN TV CLO CS A ie en ei te ad ud 7 ENYELOPEA MIMO e none 8 En
16. e compared against the character string you enter For example if Y ABC was specified the following examples would all be excluded from ProtectFile protection sadfy abc y abc 1234567 y abc In addition you can choose to include the file extension separator character Or not If you choose not to include the separator character a broader range of files may match the excluded extension given For example if you just type ZIP instead of ZIP then the exclusion will match files with names like file BZIP and MYZIP no actual extension If prompted type the administration keyphrase of each encrypted folder in your personal configuration and click OK 5 Click Continue when the Cipher Operation displays 6 Continue to add excluded extensions as needed SafeNet Inc 19 Chapter 3 Operation Removing Excluded Extensions 1 From the main menu select Extension gt Remove or click the Remove Extension icon BR on the toolbar 2 Select the Encrypt Files option if you want to encrypt all files with the extension being removed 3 Select the extension to remove and click OK 4 If prompted type the administration keyphrase of each encrypted folder in your personal configuration and click OK 5 Click Continue when the Cipher Operation displays 6 Continue to remove excluded extensions as needed o NOTE e Extreme care must be taken to ensure that no users are accessing any files with the exten
17. e with a file from the Recycle Bin If this is attempted an error will occur Instead you must delete the destination file in the domain envelope before restoring the file of the same name from the Recycle Bin For other Windows versions ProtectFile allows a file of the same name to be overwritten Adding Envelopes o Adding an envelope will define a new area where files will be secured by encryption The user who adds an envelope automatically becomes the Envelope Administrator of that envelope l NOTE It is very important to check that the required folder is correctly selected to prevent the inadvertent encryption of incorrect areas such as the entire hard disk As a guideline do not encrypt disk areas that contain operating system files If there is a distinct need to encrypt the entire drive including the operating system please contact SafeNet Support for advice Ensure that the folder that contains the ProtectFile application typically C Program Files SafeNet ProtectFile 1s not encrypted as this will lead to start up problems A user can be registered to a maximum of 50 envelopes This limit also applies to any envelopes that the user has created and has been automatically registered to by ProtectFile Before an envelope is added or removed ProtectFile scans the entire directory to ensure it can change the file attributes and exclusively access files If an error occurs a message informs the user of the file that caus
18. ed the problem how to address the issue and provides the option to either retry or cancel the attempt In the event that ProtectFile is unable to access a file exclusively during the encryption decryption process the user will see this same message If the user chooses to cancel the process the operation may result in a directory with a combination of both encrypted and unencrypted plain text files In this scenario if the user was attempting to remove an envelope the envelope is not removed to ensure the media key remains available From the main menu select Envelope Add or click the Add Envelope icon Ci on the toolbar The Add Envelope dialog displays Click Browse to display the Browse For Folder dialog showing the file system The default folder shown will generally be the My Documents folder Select the folder you wish to add as a ProtectFile envelope and click OK Verify that the Path Selected text box in the Add Envelope dialog matches the folder that you want to protect Note that any subfolders contained within the selected folder will also be secured SafeNet Inc Chapter 3 Operation 4 Modify the remainder of this dialog as needed SafeNet Inc FIPS Mode If this option is selected the user can create an envelope in FIPS mode e using the FIPS compliant CGX Cryptographic module Encrypt Existing Files If this option is selected ProtectFile encrypts any files that existed in the folder prior
19. es that will also be excluded from encryption Refer to the Adding Excluded Extensions section for additional details o NOTE e If exclusions are required it is preferable to add them prior to adding the domain It is not possible to define a domain that 1s a subfolder of an exclusion SafeNet Inc 23 Chapter 4 Operation During Migration Adding Domains O NOTE e tis very important to check that the required folder is correctly selected to prevent the inadvertent encryption of incorrect areas such as the entire hard disk As a guideline do not encrypt disk areas that contain operating system files If there 1s a distinct need to encrypt the entire drive including the operating system please contact SafeNet Support for advice e Ensure that the folder that contains the ProtectFile application typically C Program Files SafeNet ProtectFile 1s not encrypted as this will lead to start up problems e A user can be registered to a maximum of 50 domains This limit also applies to any domains that the user has created and has been automatically registered to by ProtectFile 1 From the main menu select Domain gt Add or click the Add Domain icon m on the toolbar The Add Domain dialog displays 2 Click Browse to display the Browse For Folder dialog showing the file system The default folder shown will generally be the My Documents folder 3 Select the folder you wish to add as a ProtectFile domain and click OK Verify
20. ese actions since alterations take effect immediately A user can be registered to a maximum of 50 domains This limit also applies to any envelopes that the user has created and has been automatically registered to by ProtectFile 22 SafeNet Inc Chapter 4 Operation During Migration All applications should be closed before changing the ProtectFile configuration to prevent any problems Prior to making any changes to a domain that 1s shared by other users it is important to make sure that there are no files in use by an application or another user Following a change restart Windows in order to ensure data and system integrity Before adding a new domain the user should decide whether or not that domain will contain exclusions An exclusion is a lower level unsecured folder in a domain Since the protection of ProtectFile is hierarchical and automatically extends to any folders contained in a domain exclusions provide a means to specify areas that don t require protection Refer to the Managing Exclusions section for additional details Norma Unprotected Folder Protected Folder J Exclusion Unprotected Folder jm Protected Folder es Protected Folder a Exclusion Unprotected Folder Figure 5 Example of exclusions ProtectFile also has the capacity to exclude certain types of files By default ProtectFile always excludes executable and system files The user also has the capacity to define other file typ
21. folder containing the folder that you want to exclude and click OK Click Continue when the Cipher Operation displays Continue to add exclusions as needed NOTE When performing this action on a shared envelope domain make sure that files are not currently being used and no longer need to be protected by ProtectFile The exclusion prevails over the definition of a envelope domain This means that it is not possible to define a envelope domain that is a subfolder of an exclusion Removing Exclusions When an exclusion 1s no longer required it can be removed from the personal configuration SafeNet Inc l From the main menu select Exclusion Remove or click the Remove Exclusion icon eh on the toolbar A list of all current exclusions displays Select the exclusion to remove and click OK e If the folder you want to remove from exclusion is inside an encrypted folder make sure Encrypt Files option is selected e If the folder you want to remove from exclusion is not inside an encrypted folder make sure Encrypt Files option is not selected Continue to remove exclusions as needed NOTE The Encrypt Files check box should only be selected if you are the owner of the parent envelope domain and you want to protect the currently excluded files as part of that envelope domain Do not use this facility without ensuring that no other user is accessing the envelope domain 17 Chapter 3 Operation Viewing Ex
22. g the legacy domain you will need to clear this check box Typically you will have such a need when you want to prohibit a user from accessing a domain In new style domains the check box is not available so a decrypt is always associated with removal of a domain If the domain is shared with other users be careful not to use this function without making sure that files no longer need to be protected by ProtectFile Also ensure that are no one is making use of the domain or has any open files SafeNet Inc Chapter 4 Operation During Migration Registering a Domain To add an existing domain to your personal configuration you must register it Registering a domain allows you to access protected files on a Windows network file share or view the contents of an encrypted CD ROM created by another ProtectFile user To register a domain you need its domain keyphrase 1 From the main menu select Domain gt Register The Register Domain dialog displays 2 Click Browse select the domain to register and click OK Click Register 4 Enter the domain key phrase when prompted The domain is registered if the password is correct Otherwise it is not possible to access the domain O NOTE e A user can be registered to a maximum of 50 domains This limit also applies to any domains that the user has created and has been automatically registered to by ProtectFile Viewing Registered Domains Viewing registered domains allows
23. ied during envelope creation it will automatically become the envelope administration keyphrase You will need to specify a data encryption keyphrase when creating an envelope when you want to record the cipher key to make encrypted file recovery possible after a system disk failure Data Encryption Standard First proposed as a U S Federal Information Processing Standard and now the recognized industry encryption standard See also IDEA A directory including its sub directories that are protected by ProtectFile Business Each domain has a unique keyphrase assigned when it is created 35 Glossary 36 Domain Administration Keyphrase Domain Keyphrase Domain Mode Encryption Envelope Envelope Administrator Excluded Extensionas Exclusion FAT GINA Hashing IDEA Used to allow administration of the domain Only the creator of the domain should know the domain administration keyphrase You will need the domain administration keyphrase of a domain to remove that domain modify the settings of that domain change the domain keyphrase of that domain or add an exclusion inside that domain Used to allow access to the domain for authorized users You will need the domain keyphrase of a domain to register that domain An operating mode of ProtectFile where a user can create and administer domains See also PKI Mode A reversible transformation of data using a key and mathematical algorithm which prevent
24. ince operation 1s totally transparent and automatic The only exception is when a user wants to access someone else s envelope for the first time To do this a user will have to register the required envelope This can only be done if an Envelope Administrator has previously added the user to the required envelope 1 From the main menu select Envelope gt Register The Register Envelope dialog displays 2 Click Browse select the envelope to register and click OK 3 Click Register 4 If the user is found to be included in the envelope user list ProtectFile will now record all settings 1n the user s registry automatically including any exclusions defined for that particular envelope Viewing Registered Envelopes Viewing registered envelopes allows you to see which envelopes are currently available for transparent encryption The status of each envelope that is currently registered is also displayed The View option is only available if there are envelopes to view in your personal configuration 1 From the main menu select Envelope gt View 2 Click OK to return to the main menu 14 SafeNet Inc Chapter 3 Operation De Registering an Envelope It is possible for a user or an envelope administrator to de register an envelope When an envelope is de registered the user will no longer be able to decrypt data files in that envelope However the user can re register again to restore access providing that they ha
25. information to the selected users Administration of a Domain Administration of a domain allows you to change the settings and keyphrases of that domain You may need to change the domain keyphrase 1f 1t becomes known to unauthorized users 1 From the main menu select Domain gt Administration 2 Choose the desired domain from the list Enter the domain s administration password The Domain Administration dialog which allows modification of the domain s settings displays 3 To set a new domain keyphrase select the Change Domain Keyphrase check box and enter and confirm the new keyphrase 4 Verify that the Access Control check box is set appropriately refer to the Access Control description on page 24 e NOTE e If a domain key phrase is changed all existing domain users lose their right to use the domain and are unregistered automatically 28 O SafeNet Inc Chapter 5 Administration Chapter 5 Administration Administration Tasks Changing the User Password You can change your user password at any time via the main menu 1 From the main menu select Keyphrase gt Set New Password The New Password dialog displays 2 Enter and confirm the new user password and then click OK Following correct entry the new user password takes effect immediately Hashing a Keyphrase The term hashing refers to a cryptographic operation which can be used to derive a value from a specific input The ProtectFile ci
26. llow you to define another exclusion in C Folder or in C Folder SubFolder SubSubF older The parent exclusion will take precedence over any child exclusions This means that child exclusions can be removed without having any effect on files inside the child exclusion Exclusions not belonging to an encrypted folder are called orphan exclusions Since orphan exclusions have no effect on files typically you will not create any orphan exclusion without the intention to create an encrypted folder associated with an orphan exclusion Encrypted folders can not be created inside exclusions Adding Exclusions Sub folders of envelopes or domains can be excluded from the encryption process with the Add Exclusion command This will take the selected sub folder and add it to the list of exclusions in the personal configuration An exclusion will remain active until it is removed 1 From main menu select the Exclusion gt Add or click the Add Exclusion icon fk on the toolbar SafeNet Inc Chapter 3 Operation Click Browse select the folder to exclude and click OK e If the folder you want to exclude is inside an encrypted folder and files are encrypted make sure Decrypt Existing Files option is selected e If the folder you want to exclude is not inside an encrypted folder and files are not yet encrypted make sure Decrypt Existing Files option is not selected If prompted type the administration keyphrase of the encrypted
27. llows or restricts user rights to perform certain operations An envelope administrator is subjected to such policy control and has no access right to modify these unless of course that person is also a ProtectFile administrator It is important to realize that the user status of a ProtectFile envelope administrator is independent of the user status held within the Windows 2000 XP environment In other words a 2000 XP system administrator or a 2000 XP domain administrator does not have automatic access rights to read sensitive ProtectFile files such as an Envelope sys file Access to envelope files is controlled by the envelope administrator There are only two ways to acquire envelope administrator status e A user who adds or creates an envelope automatically becomes the administrator for that envelope Note that a ProtectFile administrator must assign a user the right to create or add envelopes e Any user may be nominated to take on the role of envelope administrator by an existing envelope administrator Using this scheme a ProtectFile administrator 1s able to delegate envelope administration to other users without compromising security Being an envelope administrator for one particular envelope will not introduce any additional rights to another envelope Following the installation of ProtectFile no envelopes exist in any personal configurations Before ProtectFile can be effective you must define one or more envelopes in your per
28. o ensure that no one 1s using the envelope or has any open files Envelope removal is only available to users with Envelope Administrator status for the selected envelope 1 From the main menu select Envelope gt Remove The Remove Envelope dialog displays 2 Select the envelope to be removed and click OK Verify all encrypted files are closed and click Continue 4 Enter the administrator password of this envelope and click OK The envelope may only be removed 1f you know this password 12 O SafeNet Inc Chapter 3 Operation Administration of an Envelope Envelope Administrators can change the user access of the envelopes that they have administration rights over l 2 SafeNet Inc From the main menu select Envelope Administration Choose the desired envelope from the list The User Administration dialog which allows modification of the envelope s settings displays Verify that the Access Control check box is set appropriately refer to the Access Control description on the previous page The middle section of the dialog allows the user to search for other users on the network which they wish to configure to utilize the envelope The search query must be entered in the Distinguished Name format LDAP Refer to your Certificate Authority Help pages for additional details From the Current Active Search Base drop down list select the search base from the list of available search bases In the
29. onfirm the keyphrase in the Confirm Keyphrase field O NOTE e If the FIPS Mode check box is not selected when first adding a domain and the user selects the Derive from key phrase check box and then selects the FIPS Mode option the following message displays FIPS Mode and Derive from key phrase are incompatible To switch on FIPS Mode click on Advanced button and switch off the Derive from key phrase radio button e Legacy Domain This check box is only active if the Key phrase for data encryption area of the dialog is used Select the Legacy Domain option so that ProtectFile encrypts the domain according to the legacy method e Encrypt Existing Files TIf this option is selected ProtectFile encrypts any file that existed in the folder prior to adding it as a domain 7 Click OK to close the Data Encryption Key dialog 8 Click OK to close the Add Domain dialog SafeNet Inc 25 Chapter 4 Operation During Migration a NOTE Do not use the Access Control feature for domains on a computer running ProtectFile that are to be shared This feature works only for domains located on servers that do NOT run ProtectFile If you are using version 3 02 00 or higher of ProtectFile Management Console or Client and have chosen AES as your encryption algorithm for either the profiles or domains then those systems running versions of the Client earlier than version 3 02 00 will not be able to read the encrypted data It is re
30. or another user Following a modification restarting Windows 1s strongly recommended in order to maintain data integrity 18 SafeNet Inc Chapter 3 Operation Adding Excluded Extensions Adding an excluded extension allows the user to define other file extensions and file names that will also be excluded from encryption 0 l NOTE Special care must be taken when using this feature as it affects all files which end with the excluded extension regardless of the domain envelope they are stored in Frequent use of this feature can compromise sharing domains envelopes with other users and lead to administration problems for large organizations It is recommended that an organization makes a one time policy decision regarding excluded file extensions and applies this immediately after installing ProtectFile A user can have a maximum of 50 excluded extensions in their personal configuration From the main menu select Extension Add or click the Add Extension icon t on the toolbar 2 Unless you are the owner of all the domains envelopes do not select the Decrypt Files option since this decision will affect all files on the system Enter the new extension to be excluded from encryption for example CGX and click OK You may enter a three character DOS type extension or any combination up to 16 characters long If an extension longer than three characters 1s defined then the last characters of all file names ar
31. or not that envelope will contain exclusions An exclusion is a lower level unsecured folder in an envelope Since the protection of ProtectFile is hierarchical and automatically extends to any folders contained in an envelope exclusions provide a means to specify areas that don t require protection Refer to the Managing Exclusions section for additional details Norma Unprotected Folder Protected Folder io Exclusion Unprotected Folder je Protected Folder Protected Folder Le m Exclusion Unprotected Folder Figure 3 Example of exclusions ProtectFile also has the capacity to exclude certain types of files By default ProtectFile always excludes executable and system files The user also has the capacity to define other file types that will also be excluded from encryption Refer to the Adding Excluded Extensions section for additional details o NOTE e If exclusions are required it is preferable to add them prior to adding the envelope It is not possible to define an envelope that is a subfolder of an exclusion SafeNet Inc 9 Chapter 3 Operation 0 10 NOTE Files that are deleted from a domain envelope are moved in encrypted form to the Recycle Bin Windows Vista installations only ProtectFile does not allow the restoration of a previously deleted file if a file with the same name already exists in the domain envelope In other words you cannot overwrite a file in a domain envelop
32. otectFile login dialog displays ProtectFile Premium supports a single method to authenticate a user at log on third party authentication Starting ProtectFile will result in authentication by the third party product installed on the system The authentication method may be transparent to the user Entrust installations use Entrust authentication Refer to the documentation supplied with the appropriate third party product for additional details The license code entered during the ProtectFile installation determines which edition of ProtectFile Business or Premium and authentication method is used A correct login will result in a key folder icon being placed into the system tray which can be used to gain access to the ProtectFile main menu screen Workstation Security To safeguard against unauthorized users gaining access to an unattended workstation it is strongly recommended that some type of timed lock out workstation functionality be implemented as a minimum precaution This could include a password protected screensaver feature or Entrust s Single Sign On solution SafeNet Inc 3 Chapter 2 Log On The System Tray ProtectFile resides in the system tray while running The system tray icon shows whether ProtectFile 1s enabled disabled or you have not logged in yet If you have not logged on or you have disabled ProtectFile then no encryption or decryption operations are performed You can minimize
33. otectFile offers the possibility of waking these domains envelopes In order to do so click on the ProtectFile icon in the task bar Sleeping domains envelopes can have a limited number of operations performed on them They may be de registered or awakened Refer to page 15 for information on how to de register a domain envelope To awaken a domain or envelope 1 Confirm that the domain or envelope is accessible by inserting the media or restoring the network connection where the domain envelope is location 2 Minimize ProtectFile to the system tray Click the ProtectFile system tray icon once Nested Domains Envelopes It is not possible to define a domain envelope inside an existing domain envelope Backup Restore ProtectFile Domains Envelopes For Windows Vista only Do not use the standard Vista Backup and Restore Center to backup and restore ProtectFile envelope sys files as encrypted files will be filtered out skipped Use an alternate backup restore utility to avoid possible data corruption NTFS Compression The NTFS compression attribute and the encryption are not compatible with one another Compressed files should not be encrypted and encrypted files should therefore not be compressed in order to avoid file corruption 32 SafeNet Inc Chapter 5 Administration Compatibility Issues Dr Solomon s WinGuard for Windows 2000 XP When using Windows 2000 XP as an operating system ProtectFile is compatible wi
34. perspective envelopes are secure file areas that need to be managed like any other For this role an envelope administrator will have to be chosen At a minimum the envelope administrator must have Read Write and Modify permissions When an envelope administrator makes changes to an envelope ProtectFile copies the contents of the envelope to a temporary file and performs the encryption and decryption operations on that temporary file When the contents of the temporary file are copied back to the original envelope ProtectFile will securely destroy the temporary file If ProtectFile is unable to copy the file s content it will not destroy the temporary file To ensure the randomly created media key is not lost ProtectFile will write the envelope and the temporary file name and location to the log file where the user can manually recover the envelope SafeNet Inc 7 Chapter 3 Operation Envelope Administration Envelope Administrator An envelope administrator refers to a user who has the responsibility to administer one or more envelopes At a minimum the envelope administrator must have Read Write and Modify permissions This role can also be granted to multiple users at the administrator s discretion An envelope administrator should not be confused with a ProtectFile administrator whose task is to administer and maintain the ProtectFile application environment The ProtectFile administrator defines the policy that a
35. pher keys are generated from the keyphrase using a hashing algorithm Each different keyphrase generates a unique cipher key At times it may be necessary to know the actual cipher key value that corresponds to a particular keyphrase for example to comply with local regulations on the use of ciphers or to comply with a company policy The Hash Keyphrase option is available from the main menu for such a requirement To view the key derived from a keyphrase 1 From the main menu select Keyphrase gt Hash Keyphrase The Hash Keyphrase dialog displays 2 Enter and confirm the particular keyphrase for which you want to derive the key 3 Select the required algorithm the key will be used with 4 Click Show A string of hex digits will display This is the derived key for the selected algorithm Hyphens are inserted to assist you when reading and copying down this value they are not part of the key itself SafeNet Inc 29 Chapter 5 Administration O NOTE e The Show button is not enabled until you have entered correct and matching values as a key phrase e Cipher key values must be guarded as carefully as your key phrases since knowledge of these values can compromise your data Recovering After Losing the User Password If you have forgotten your user password and are presented with a dialog requesting an Unlock Key you will need to take the following actions 1 Contact your ProtectFile Administrator and supply
36. rom accessing specific ProtectFile features The ProtectFile administrator allows users to create and remove envelopes and domains Note that for Windows 2000 XP 2003 the user for this role must have system administrator rights A command line utility that 1s used to perform encrypted file backups A domain where more than one user has access and knows the domain keyphrase for example on group directories A domain that cannot be accessed 37 Glossary 38 User Password Windows Registry Your User Password 1s set the first time ProtectFile starts Each user should have a unique User Password to og on to ProtectFile It is a text string that consists of arbitrary characters case sensitive and is a minimum of 10 characters long If the GINA authentication and Password Synchronization options were selected during the installation of ProtectFile your User Password is always the same as your Windows Logon password A database built into the Windows operating system where configuration information is stored END OF DOCUMENT SafeNet Inc
37. rrect cipher keys In this way ProtectFile not only protects stored data but also ensures that an unauthorized entity cannot gain access to the contents of sensitive files by using techniques such as wire tapping En Decryption Key Storage Keyphrase protected Encrypted Encrypted Directories Domains Directories Domain s ZACOMPANY CADATA SECRET P USER 1 Figure 1 ProtectFile functional overview SafeNet Inc 1 Chapter 1 Introduction Security Overview There are a number of simple cryptographic terms mentioned throughout this manual which the reader is required to understand This section is therefore intended as a brief overview of what these terms mean in the context of the ProtectFile product In the field of cryptography the term key refers to a value which is used to encrypt data using an algorithm There are many different types of keys and algorithms The term algorithm refers to a defined mathematical calculation that is used to encrypt decrypt or verify data using a key 2 SafeNet Inc Chapter 2 Log On Chapter 2 Log On Invoking ProtectFile If during installation it was specified that ProtectFile should automatically start after rebooting the computer then it will be placed in the Startup menu To manually start ProtectFile follow these steps 1 From the Windows Start menu select Programs or All Programs 2 Select SafeNet gt ProtectFile gt ProtectFile The Pr
38. s unauthorized persons from viewing the transformed data cipher text in its original form plain text without possessing the key A directory including its sub directories that are protected by ProtectFile Premium with a PKI key management scheme It is like a PKI enabled domain The envelope administrator has the right to create or remove envelopes allow or deny other users to access envelopes or to delegate these rights to other users for specific envelopes Files with certain specified file name extensions are always excluded from the protection of ProtectFile There are five default excluded extensions BAT COM DLL EXE and SYS Eleven more can be defined A directory including its sub directories under a domain or envelope which is not included under the protection of ProtectFile File Allocation Table A type of Windows File System See also NTES A Graphical Identification and Authentication dynamic link library DLL The Windows sub system that controls authentication The transformation of data into a usually shorter fixed length value that uniquely represents the original string and is difficult or impossible to reverse 1 e it 1s difficult or impossible to find the data that produces a given hash value International Data Encryption Algorithm Symmetric encryption algorithm developed by ETH Zurich and Ascom AG owned by Ascom AG SafeNet Inc Keyphrase LDAP NTFS
39. sautsicansaieneminnt uina lite ti Moine 30 Temporarily Disabling ProtectFile File Decryption essen 30 CONCURRAN ENS TON tu ERAN tm eite eite 31 Bep gero mds aros Re a te cree eee 31 Re COS Re dead sen te eee ae eee eee 52 DICCDIN Ge Doma MYL TV CLOVES iis shes meu oda EVER IUE nl a aM E AAA 32 Nested Domains TNV COP CS es tied nn wann Orat evi eae 32 Backup Restore ProtectFile Domains Envelopes cesses eene nnne 32 NIFS COMPITO TON ne heap cists ne pa ed iu VER Nr mE V uM ed iue M Mm OE 32 Compatibility ISSUE S uodsso aee o crias ni 33 Dr Solomon s WinGuard for Windows 2000 XP ss 33 GIOSSOE V TT nei bten A EN che i AE A tocius S been bie Su e uU oes 35 11 O SafeNet Inc Chapter 1 Introduction Chapter 1 Introduction ProtectFile is a high strength data security solution for network applications The product operates transparently to the user but performs encryption for all data files that are found on the secured network file servers attached to the secured network local hard disks on workstations connected to the secured network local removable media such as floppy disks for workstations connected to the secured network The principle behind ProtectFile is to allow users to safely store or transmit sensitive data within a network environment Files are encrypted locally at the workstation before storage or transmission via the network Secure files can only be viewed by those users who have access to the co
40. sion being removed Viewing Excluded Extensions 1 From the main menu select Extension gt View The View Excluded Extension dialog displays 2 Click OK to return to the main menu 20 O SafeNet Inc Chapter 4 Operation During Migration Chapter 4 Operation During Migration This chapter describes the operation of ProtectFile during the migration period from ProtectFile Business to ProtectFile Premium After a successful upgrade to ProtectFile Premium domains that have not yet been migrated to envelopes by the system administrator can still be administered by the user This capability is reflected in Figure 4 which shows the Main Menu that displays during the migration phase The inclusion of the Domain menu permits the user to access domains while the Envelope menu permits the user to access envelopes The Main Menu During Migration EC EM S FT Exclusion Exclusion Los ProtectFile ProtectFile a ES View Help ENABLED Add Remove ProtectFile Extension Extension tatus Figure 4 Menu and toolbar during migration phase SafeNet Inc 21 Chapter 4 Operation During Migration The commands available under the Domain menu are listed below more detailed description of the commands and dialog boxes follows Domain Add Allows user to add a domain View Allows user to view available domains Remove Allows user to remove a domain Administration Allows user to perform domain
41. sonal configuration Envelopes may be defined in your personal configuration by adding an envelope or registering an envelope To create a new envelope you must use the Add Envelope command described below For example if the E Secret Files folder has not been encrypted and you wish to encrypt the folder you should use the Add Envelope command SafeNet Inc Chapter 3 Operation To access encrypted files and subfolders in a pre existing envelope a user can use the Register Envelope command to make the envelope available in their personal configurations For example if your colleague would like access to the E Secret Files envelope that you added they would need to use the Register Envelope command to do so Envelopes can be added or removed at any time however care must be taken when performing these actions since alterations take effect immediately A user can be registered to a maximum of 50 envelopes This limit also applies to any envelopes that the user has created and has been automatically registered to by ProtectFile All applications should be closed before changing the ProtectFile configuration to prevent any problems Prior to making any changes to an envelope that is shared by other users it 18 important to make sure that there are no files in use by an application or another user Following a change restart Windows to ensure data and system integrity Before adding a new envelope the user should decide whether
42. text Disabled also appears in the status bar e The icon in the system tray will change to a key with a stop sign 30 O SafeNet Inc Chapter 5 Administration When ProtectFile is disabled your protected files are not readable but they can be copied and transferred in their protected form This feature 1s especially helpful when you need to transfer the files in an encrypted format for example when you backup the files To re enable ProtectFile from the main menu select File gt Disable The operation is reversed and all the disabled indicators are removed O NOTE This feature has been designed with great care to avoid loss of data However never forget that disabling ProtectFile influences access to all files located in the defined domains envelopes Therefore do not forget to re enable ProtectFile immediately after you have completed the operation for which it was disabled o While ProtectFile is disabled all files within domains will appear encrypted to all applications Before disabling ProtectFile make sure that all applications do not have any files open that are inside domains to prevent data corruption Configuring the Screen The toolbar component of the main menu can be turned on or off via the View menu To hide or display the toolbar from view from the main menu select View gt Toolbar Upgrading Your License There are two types of license numbers available e those without any time limit
43. th Dr Solomon s WinGuard for Windows 2000 XP but requires special configuration For complete details on how to configure ProtectFile to operate in conjunction with Dr Solomon s WinGuard please contact SafeNet Support SafeNet Inc 33 Chapter 5 Administration THIS PAGE INTENTIONALLY LEFT BLANK 34 SafeNet Inc Glossary Access Control ADSI AES 128 192 256 bit API Authentication AVS Backing up CA Challenge Response CSP Glossary A feature that is used to prevent unauthorized viewing of files within a domain Active Directory Services Interface Advanced Encryption Standard established as a replacement to DES by the US Federal Information Processing Standard Application Programming Interface The process of establishing your identity Anti virus Software The process of making a copy of important data files in case of computer failure Certificate Authority The process of responding to a cryptographic challenge usually a sequence of numbers Cryptographic Service Provider Data Encryption Keyphrase DES or 2 Key Triple DES Domain SafeNet Inc A keyphrase which is entered during the envelope creation process This keyphrase is used to generate the DES or Triple DES cipher key used during encryption operations Specifying a data encryption keyphrase allows you greater control over how envelopes are encrypted Note that if a data encryption keyphrase is specif
44. that the Path Selected text box matches the folder that you want to protect Note that any subfolders contained within the selected folder will also be secured 4 Modify the remainder of this dialog as needed e FIPS Mode ff this option is selected the user can create a domain in FIPS mode 1 e using the FIPS compliant CGX Cryptographic module e Domain Keyphrase A domain keyphrase is a phrase which ProtectFile uses to generate a key which protects the domain It is used to prevent unauthorized access to the domain for unauthorized users The key phrase can be given to other users in order to give them access to this domain refer to the section entitled Register a Domain Following entry of the domain key phrase the user is prompted to enter the administrator key phrase Enter a keyphrase that is at least 10 characters and case sensitive then confirm the keyphrase in the Confirm Domain Keyphrase field e Access Control This check box turns on the ProtectFile Access Control feature Access Control prevents unauthorized users from viewing the contents of a domain If this option is selected then users who are not authenticated with ProtectFile will not be able to access any files within a domain including files within excluded subfolders or files of the type that have been configured as excluded extensions 24 SafeNet Inc Chapter 4 Operation During Migration For example if a domain has been added with the Access
45. ve not been removed from the user list by an envelope administrator It should be noted that de registering an envelope does not affect the user s access right to the specific envelope and only an envelope administrator can take away a user s access right De registering is therefore a user s voluntary action to block their own access right when needed 1 From the main menu select Envelope gt De Register 2 Select the desired envelope from the list and click OK SafeNet Inc 15 Chapter 3 Operation 16 Managing Exclusions An exclusion is a folder marked as being unprotected by ProtectFile containing unencrypted files and sub folders O NOTE e Exclusions can be added and removed at any time However care must be taken when performing these actions since alterations take effect immediately All applications should therefore be closed before making changes to the ProtectFile configuration in order to prevent any problems e Prior to making any changes to a domain envelope that is shared by other users it is important to make sure that there are no files in use by an application or another user Following a change restart Windows to ensure data and system integrity e A user can have a maximum of 50 exclusions in their personal configuration Exclusions can be defined inside another exclusion These are called nested exclusions For example if you have an exclusion C Folder SubFolder defined ProtectFile will a
46. velope Adran SrA OP ducente t ia ee HE Ne Da ee Ea fd I ern een S AUT TEV CLONES sea ne ea ete nent en ee nn 10 IRCMOVING ENVELOPES etu NOR RS SR ne Mu nu done 12 Administration OF an EnvVelopDesss sales a t ore a eti pe ME eee mas tud Lee UE 15 Registerina dn ERVOlODE AAA A AAA dan doi NI HEU 14 VIEWING ICQI SICICG ENVELOPES EE RSR tu bes Re ct a Cab odeur 14 Dee ostenta e aM ETVE TODE la nep Pontes admet tip er etuer etus ida 15 Ma asine EXCUSA me to te in 16 Addn oL TO ONS m 16 IRCINOVING E XCIUSI ONS ri ici 17 VIEW E EXCLUSIONS iio in dt IS Managing Excluded EXTENSIONS casein A A E nine 18 PAGING EXCLUDED ENTENI ONS ti 19 Remoying Exclua cd LISTON S eee eee t 20 Viewine Excluded EXtenstOW Sis SAA AAA O 20 Chapter 4 Operation During Migration ooomm 21 Le Main Menu Dutino MiSTAUON sen seine naine 21 WY Orkin Wiirt DOMAINES Lo T 22 Mana GING DOMAINS tu tbe a acaba ar ioc PO eM 22 DUI Burm mec ia 24 Renov ne DOMA S vas ts che sas cies ad e t tubo On ue ened toD Ode Lc tn 26 INO URINE AAA A A E TT A 27 VIeWIng Registered DOMAIN niet uen 27 Derer ernea DOMOAN t c 2 y o dH SAT UB OTA NR 28 EIA ANA AA A A Cie 28 O SafeNet Inc 1 Table of Contents Chapter gt Administraun aiia ie ien er ei Pa Ee odi ies 29 PACU ET AU ON LaS ads 29 Chanoine The User PASSWOTG di ibn diese fu bu Padus 29 Haste KEPTOS ARA 29 Recovering After Losing the User Password esee eene eene nennen nennen nns 30 Dealing With Los tU Ser PasswoLd
47. you to see the which domains are currently available for transparent encryption The status of each domain that is currently registered 1s also displayed The View option 1s only available 1f there are domains to view in your personal configuration 1 From the main menu select Domain gt View 2 Click OK to return to the main menu De registering a Domain When a domain is de registered the user will no longer be able to decrypt data files in that domain However the user can re register again to restore access 1 From the main menu select Domain gt De Register 2 Select the desired domain from the list and click OK SafeNet Inc 27 Chapter 4 Operation During Migration Sharing a Domain This function allows a user to select the other users who are allowed to access the domain 1 From the main menu select Domain gt Share Domain 2 Select a domain from a list of available domains Select the users with whom you wish to share the selected domain At this point you will also be able to assign Domain Administration rights to the selected users if required Refer to the Management Console User Guide for details db NOTE e You will need Domain Administration rights to perform this function e This function is only available if the ProtectFile client is used in conjunction with the ProtectFile Management Console The Management Console generates the necessary transport keys and coordinates the send of the domain
Download Pdf Manuals
Related Search
Related Contents
MANUAL DEL USUARIO - Icon Heath & Fitness NEC Express5800/320La Configuration Guide Copyright © All rights reserved.
Failed to retrieve file