Pointsec_PC_EW_6.2_Admin_A

Transcription

Pointsec_PC_EW_6.2_Admin_A
Pointsec PC
Administrator’s Guide
Version 6.2, A
July 2007
© 2003-2007 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying,
distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written
authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or
omissions. This publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and
Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.
TRADEMARKS:
©2003–2007 Check Point Software Technologies Ltd. All rights reserved.
Check Point, AlertAdvisor, Application Intelligence, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, Confidence Indexing,
ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, CoSa, DefenseNet, Dynamic
Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker
ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine,
MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle
Management, Provider-1, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro,
SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Sentivist, SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter
Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM,
SmartMap, SmartPortal, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network
Extender, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, UTM-1, VPN-1, VPN-1 Accelerator Card, VPN-1
Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer,
VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security
Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point
Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein
are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668,
5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, and 7,165,076 and may be protected by other U.S. Patents, foreign patents, or pending
applications.
For third party notices, see “THIRD PARTY TRADEMARKS AND COPYRIGHTS” on page 267.
Contents
Preface
Chapter 1
Who should read this guide? ............................................................................... 1
Related Documentation ...................................................................................... 1
Contact Information ........................................................................................... 3
Overview of PC Security ...................................................................................... 3
PC Security Methods and Technologies ........................................................... 4
Pointsec PC Security Features and Benefits.......................................................... 5
Managing Pointsec PC........................................................................................ 6
Deploying Pointsec PC........................................................................................ 6
Languages Supported in Pointsec PC ................................................................... 7
Pointsec PC in a Common Criteria EAL-4 Environment .......................................... 7
An Administration Overview
Administration Levels ......................................................................................... 9
System Administrator .................................................................................... 9
Administrator.............................................................................................. 10
User Level ....................................................................................................... 11
Typical Permissions for Roles ....................................................................... 11
Overview of the Pointsec PC Management Console (PCMC) .................................. 13
PCMC Dialog .............................................................................................. 14
PCMC Menu Bar ......................................................................................... 14
Chapter 2
Configuring System Settings
Accessing Local Settings .................................................................................. 17
Status Information ...................................................................................... 19
Encryption Information ................................................................................ 19
Editing Settings ............................................................................................... 20
Hardware Device Settings ............................................................................ 20
Install Settings ........................................................................................... 21
Logon Settings............................................................................................ 25
Remote Help Settings.................................................................................. 27
Screen Saver Settings.................................................................................. 28
System Passwords Policy Settings................................................................. 29
Wake-on-LAN Settings................................................................................. 30
Windows Integrated Logon Settings............................................................... 32
The Export to CSV File Button ...................................................................... 34
The Print Settings Button ............................................................................ 34
Printing Settings .............................................................................................. 34
Exporting Settings to a CSV File ........................................................................ 36
Viewing the Event Log Database ........................................................................ 36
Filtering Log Entries .................................................................................... 39
Exporting Logs................................................................................................. 41
Chapter 3
Configuring Group and User Account Settings
Local Settings for Groups and User Accounts...................................................... 43
System Settings for Groups .......................................................................... 45
Chapter 4
Group Authority Levels
What Is a Group Authority Level (GAL)? ......................................................... 61
Using GALs To Create a Tiered Authority Structure ......................................... 62
Table of Contents
i
Master Installation GALs..............................................................................
GAL Sanity Checks......................................................................................
GALs and Permissions .................................................................................
GALs and Remote Help................................................................................
63
68
68
69
Chapter 5
Managing Groups and User Accounts
Creating Group Accounts .................................................................................. 71
Default Values and How the Effective Values of Settings are Determined .......... 74
Adding a User Account to a Group ..................................................................... 77
Password Authentication.............................................................................. 80
Dynamic Token Authentication ..................................................................... 81
Smart Card Authentication ........................................................................... 86
Chapter 6
Working with Configuration Sets
Root Directory Path .......................................................................................... 89
Directory Paths ........................................................................................... 90
Creating a New Set .......................................................................................... 91
Exporting/Importing Set Configurations .............................................................. 96
Chapter 7
Working with Installation and Update Profiles
About Pointsec PC Profiles.............................................................................. 101
Converting Pre-6.2 Profiles to 6.2 Profiles................................................... 102
Installation Profiles ................................................................................... 102
Update Profiles......................................................................................... 103
Upgrade Profiles ....................................................................................... 103
Uninstall Profiles ...................................................................................... 103
What’s in a profile? ................................................................................... 103
Creating a Profile Based on Another Profile or Local Settings......................... 104
Before Creating Profiles .................................................................................. 105
Working with Profiles – an Overview ................................................................. 105
Sets......................................................................................................... 106
Deploying Pointsec PC for the First Time ..................................................... 107
Updating Pointsec PC Settings ................................................................... 107
Updating Pointsec PC Software .................................................................. 107
Removing Pointsec PC using a Profile ......................................................... 108
Creating and Deploying Installation Profiles ...................................................... 108
Creating a New Set.................................................................................... 108
Creating an Installation Profile ................................................................... 113
Creating an Update Profile .............................................................................. 121
Difference between Remove and Mark for Removal....................................... 122
Uninstall Profiles ...................................................................................... 122
Ensuring that Administrator Accounts Exist on Both the Admin Machine and all Client
Machines............................................................................................... 123
Deploying Pointsec PC Using an Install Profile.................................................. 124
Deploying in an MSI Package .......................................................................... 125
Verifying a Pointsec PC Deployment................................................................. 126
Running Pointsec PC as a Service on a PC ....................................................... 127
Pointsec Service Start Service Account Specifics ......................................... 127
Creating and Deploying Update Profiles............................................................ 129
Creating an Update Profile ......................................................................... 130
Working with Accounts in an Update Profile ................................................ 130
Deploying an Update Profile....................................................................... 130
Pushing Update Profiles to Computers ............................................................. 130
ii
How does the Update Profile Affect a Logged-on User? ................................. 131
Chapter 8
Upgrading Pointsec for PC 4.x and 5.x Installations
Overview ..................................................................................................
From Which Legacy Versions Can You Upgrade?...........................................
Requirements for Upgrading a 4.x/5.x Client................................................
The Process of Upgrading ..........................................................................
The Characteristics of an Upgrade Profile ....................................................
Configuring an Upgrade Profile...................................................................
Legacy Account Handling...........................................................................
Upgrade Operations...................................................................................
Chapter 9
133
135
135
135
136
139
139
140
Upgrading from Pointsec for PC 6.x.x to Pointsec PC
Upgrading from 6.x.x to 6.2 ............................................................................ 145
Before Upgrading ...................................................................................... 145
Performing the Upgrade............................................................................. 146
.................................................................................................................... 148
Chapter 10
Using a Service Start Account
Pointsec PC Service Start Service Program - pstartsr.exe.................................... 150
Setting up the Pointsec Service Start Account ............................................. 152
General Requirements ............................................................................... 162
What does the Pointsec Service Start Service Do? ........................................ 163
Example of Setup...................................................................................... 163
Upgrade from Pointsec 4.x/5.x Installations ................................................. 164
Chapter 11
Pointsec PC Logging Functionality
The Local Event Database............................................................................... 165
The Local Log File.......................................................................................... 166
The Central Log File ....................................................................................... 167
Manually Transferring the Local Log File to the Central Log File ......................... 168
Timestamps and the Windows Event Log .......................................................... 168
Exporting Logs............................................................................................... 168
Viewing a Local Log File ............................................................................ 169
Chapter 12
Remote Help
Implementing a Remote Help Procedure .......................................................... 171
Types of Remote Help .................................................................................... 172
Verifying Users .............................................................................................. 173
Providing Remote Help ................................................................................... 173
Chapter 13
Pointsec PC Utilities
Pointsec PC Password Synchronization............................................................. 177
Synchronizing Using the Windows Password for Authentication in Pointsec PC Preboot
178
Synchronizing Using the Pointsec PC Preboot Authentication Password for
Authentication in Windows ...................................................................... 179
Windows Password Complexity Requirements............................................... 180
Pointsec PC Wake-on-LAN (WOL) .................................................................... 180
Setting up WOL ........................................................................................ 180
WOL Logon Example ................................................................................. 181
Pointsec PC Windows Integrated Logon (WIL) ................................................... 181
Security Features on WIL-enabled Computers .............................................. 182
User Perspective on WIL ............................................................................ 183
Table of Contents
iii
Administrator Perspective on WIL ............................................................... 183
Pointsec PC in Multi-language Environments .................................................... 183
Language Support ..................................................................................... 183
Support for Multi-language Keyboards......................................................... 184
Switching Keyboard Layouts....................................................................... 184
Single Sign-On (SSO) ..................................................................................... 185
About SSO ............................................................................................... 185
SSO and Password Changes ....................................................................... 185
Entrust SSO ............................................................................................. 185
Entrust Profile Revocation.......................................................................... 186
Windows Smart Card ................................................................................. 189
Enabling SSO ........................................................................................... 189
Chapter 14
Removing Pointsec PC
Uninstall Profiles ........................................................................................... 191
Creating an Uninstall Profile ...................................................................... 191
Configuring Uninstall Profiles ..................................................................... 193
Deploying an Uninstall Profile .................................................................... 193
Windows Add/Remove Programs ...................................................................... 194
Chapter 15
Recovery, Repair and Bootable Media
The Pointsec PC Recovery File ........................................................................ 197
If the Recovery File Path is not Found.............................................................. 197
Recovery and the Pointsec PC Version on the Client .......................................... 198
Recovery via the Start menu....................................................................... 198
Recovery from the PCMC ........................................................................... 198
Creating a Recovery Disk from the PCMC.......................................................... 199
Creating a Recovery CD-ROM .......................................................................... 201
Recovering Information................................................................................... 202
Using Slave Drive Functionality to Recover Information................................. 202
Booting from Alternative Media ....................................................................... 205
Accessing the Alternative Boot Media Menu................................................. 205
Appendix A
Being Authenticated by Pointsec PC
About Authentication...................................................................................... 207
Navigating................................................................................................ 208
Ensuring that your Computer has not been Tampered with ............................ 208
Being Authenticated for the First Time............................................................. 208
Using a Fixed Password ............................................................................. 209
Using a Dynamic Token ............................................................................. 211
Using a Smart Card/USB Token .................................................................. 212
Synchronizing Passwords ................................................................................ 216
What if I forget my password?.......................................................................... 217
What if I don't have access to my token/smart card? .......................................... 218
Pointsec PC Single Sign-on (SSO) ................................................................... 219
Appendix B
Status Information When Exported to File
Appendix C
Pointsec PC Permissions
Permissions: With Pointsec PC Service Start..................................................... 227
Recommended Users................................................................................. 227
Required Permissions ................................................................................ 228
Permissions: Without Pointsec PC Service Start ................................................ 228
Permissions: Remote Desktop ......................................................................... 228
iv
Windows User Account Registry Permissions..................................................... 229
Appendix D
Language Support
Support for Tier 1 Languages ..................................................................... 231
Support for Tier 2 Languages ..................................................................... 231
Appendix E
Language Packs
Installing Language Packs............................................................................... 233
Before Installation of Pointsec PC............................................................... 233
After Installation of Pointsec PC ................................................................. 234
Language Packs ............................................................................................. 234
Legacy Language Pack (Default) ................................................................. 234
2 - Americas............................................................................................. 234
3 - Scandinavian and Baltic ....................................................................... 235
4 - Asia and Pacific (APAC)........................................................................ 235
5 - Europe 1............................................................................................. 236
6 - Europe 2............................................................................................. 236
7 -All ....................................................................................................... 236
Appendix F
Keyboard Layouts
Supported Keyboard Layouts ........................................................................... 237
Appendix G
PS Control Command Line Utility
Using the PS Control Utility ............................................................................ 239
Options .................................................................................................... 240
Commands ............................................................................................... 240
Error Codes .............................................................................................. 241
Examples of Using the PS Control Utility ..................................................... 241
Smart Cards, Smart Card Readers and their Drivers ........................................... 242
Managing Smart Cards, Smart Card Readers and Drivers............................... 243
Exporting a Machine’s Status Information......................................................... 243
Export Status File ..................................................................................... 244
Installing Language Packs............................................................................... 247
Appendix H
The pslogexp.exe Log Export Utility
pslogexp.exe Utility Syntax and Commands ...................................................... 249
Syntax ..................................................................................................... 249
Commands ............................................................................................... 250
Examples of Using the pslogexp.exe Utility ....................................................... 250
Correct Display of National Characters in Exported Files .................................... 251
Appendix I
Pointsec PC and IBM RRU
Installing the InstallRRU.msi Package ............................................................. 253
RRU Functionality on a Pointsec PC Machine ................................................... 253
Accessing................................................................................................. 253
Using....................................................................................................... 254
Appendix J
Pointsec PC Common Criteria Configuration
Common Criteria EAL4 Configuration Requirements .......................................... 256
Cryptographic Algorithms and Key Sizes ...................................................... 256
All Partitions Encrypted, Boot Protection Enabled ........................................ 256
No Delete Access to the Pointsec File Share ................................................ 256
Wake on LAN............................................................................................ 256
Table of Contents
v
Windows Integrated Logon .........................................................................
User Level Privileges .................................................................................
Local Administration Disabled ....................................................................
Administration and Configuration via Profiles...............................................
Software Upgrade between Common Criteria Versions Only............................
Password Requirements.............................................................................
Password Synchronization Requirements .....................................................
Maximum Failed Logons before Reboot .......................................................
Appendix K
257
257
257
257
258
258
258
258
Importing Encryption Keys
Preparing to Use Imported Encryption Keys ...................................................... 259
Key Import Directory Structure ................................................................... 259
precheck.txt File ....................................................................................... 260
precheck.txt Settings for Encryption Key Import ........................................... 260
Administrator Checklist for Importing Encryption Keys....................................... 261
End-user Interaction During Installation ........................................................... 262
Appendix L
Glossary
Index ........................................................................................................... 271
vi
P
Preface
Preface
This preface contains background information on PC security and
Pointsec PC benefits and features, as well as a general discussion of how
Pointsec PC Enterprise Workplace Edition (hereafter referred to as
Pointsec PC) is designed and how it should be deployed.
Who should read this guide?
Administrators who will be deploying and administrating Pointsec PC, and
providing Remote Help within their organization should read this guide.
Related Documentation
This release includes the following documentation:
TABLE P-1
Pointsec PC documentation
Title
This document contains...
Pointsec PC Installation Guide
Instructions and information on how to install
Pointsec PC the first time, the so-called master
installation.
1
Related Documentation
TABLE P-1
Pointsec PC documentation
Title
This document contains...
Pointsec PC Deployment Guide
Describes an imaginary, but realistic, customer
environment and how to deploy Pointsec PC on the
computers in that environment.
Pointsec PC Quick Start Guide
Contains guidance related to among other things,
the master installation, configuring installation
profiles, and deploying via the installation profiles.
Pointsec PC Release Notes
•
•
System requirements
Current information about the product, such as
• new features and functions in the current
release,
• problems that have been fixed since the
previous release, and
• any known issues about the current release.
2
Contact Information
Contact Information
If you require information on Check Point’s other security products or
services, or if you should encounter any problems with Pointsec PC, please
visit our web site or call us.
TABLE P-2
Telephone
Web site
Contact information
Technical Support
Sales
The Americas
972-444-6600
1-800-429-4391
International
+972-3-6115100
https://secureknowledge
.checkpoint.com/.
http://partners.us.checkpoint.com
Here you can search for a Check
Point sales partner near you.
Our SecureKnowledge
center is a
comprehensive
self-service database
designed to quickly and
easily answer all of your
technical installation,
configuration and
upgrade needs on Check
Point products.
Overview of PC Security
With computer security becoming increasingly important, almost all focus
has been on securing large, multi-user machines. This makes sense
because mainframes and large servers are not only major repositories of
data, they are also crucial to daily operations. However, there is an equally
serious and growing risk of compromise to the many smaller, mostly
single-user, machines such as desktop and laptop PCs, as well as even
Pocket PC, Palm OS and other PDAs. These computers frequently store an
enterprise’s most current and valuable information. Increasingly, portable
computers also store passwords, logon scripts, and certificates used to
access the enterprise network. The small size and portability of these
computers mean that they are also much more vulnerable than large
machines are to theft or illicit access.
Preface
3
PC Security Methods and Technologies
An additional and often unrecognized problem is that a PC is the most
available and vulnerable starting point for access to a network. Studies of
computer crime reveal that insiders pose the largest threat. Clearly,
providing secure PCs is an essential component of establishing network
security.
PC Security Methods and Technologies
A variety of methods and technologies have been employed to secure PCs
and their contents, including physical controls (cables, locks on power
supplies, anchored docking stations, etc.) and electronic means such as
data encryption, user authentication, audit logs and tracking utilities.
Physical access control is becoming less relevant, with users insisting on
portability. Consequently, there is an increasing emphasis on electronic
protection. There are two general types of electronic PC security: file and
full disk encryption, and boot protection/authentication.
The following graphic illustrates the difference between unprotected data,
standard file encryption and Pointsec PC protection:
FIGURE P-1
4
Pointsec PC Security Features and Benefits
File and Full Disk Encryption
File encryption enables users to protect vital data. It is usually easy to
implement but is subject to user discretion regarding what to secure, and
the willingness of users to consistently follow security procedures. Given
this dependence on user compliance, organizations seeking to enforce a
security policy often find file encryption insufficient.
Unlike file encryption, which leaves security holes, Pointsec PC encrypts
the entire disk sector by sector, including the system files, temp files, and
even deleted files. The encryption is user-transparent and automatic, so
there is no need for user intervention or user training. Because the
encryption occurs in the background without noticeable performance loss,
there is no user downtime. This provides enforceable security that cannot
be bypassed by the user.
Boot Protection/Authentication
The importance of boot protection is often misunderstood or confused with
the BIOS password schemes offered by computer manufacturers.
Boot protection means authenticating users before a computer is booted. It
prevents the operating system from being subverted by unauthorized
persons using any of the widely available password cracking tools. These
tools have proliferated on the Internet and can be used with devastating
effect. Unfortunately, most BIOS-level protection schemes are fatally weak
and cannot be tightly linked with full disk encryption.
Boot protection has the further advantage of providing an effective
deterrent to illicit network access via network-connected machines,
especially if these machines are linked as part of a VPN.
While controlling access to the computer is important, this does not by
itself protect the data stored on the disk. For example, a simple boot
floppy disk could be used to bypass boot protection. Alternatively,
removing the drive and placing it in another computer will make the file
accessible to brute-force hacking attempts. Even in those rare cases where
the drive itself is secured with a password, the data is not encrypted and
is therefore vulnerable to several types of attacks. To secure this data, it
must be encrypted. Once encrypted, the files will be inaccessible to any
unauthorized person.
Pointsec PC Security Features and Benefits
Pointsec PC secures desktop and laptop computers from unauthorized
physical access, using both boot protection and full disk encryption.
Pointsec PC provides the following security functions:
•
Strong user authentication
Preface
5
Managing Pointsec PC
•
Support for user identification using dynamic tokens, USB tokens and
smart cards
•
Secure Remote Help for users who have forgotten their passwords
•
Central configuration and administration
•
Keyboard lock and screen saver for Windows-based computers
•
Limited number of failed logon attempts with automatic locking
•
Audit logging of events such as successful and failed logon attempts
With Pointsec PC, all logical partitions/volumes are boot protected and
encrypted. The careful integration of boot protection and automatic
encryption provides a high degree of security with minimal impact on
users. Boot protection prevents subversion of the operating system or the
introduction of rogue programs, while sector-by-sector encryption makes it
impossible to copy individual files for brute force attacks. Full disk
encryption secures the data even if the disk is removed and loaded into a
controlled machine. This ensures security by allowing an organization to
determine the security level instead of leaving it up to the user to see that
the information is encrypted.
Pointsec PC uses full disk encryption to guarantee that unauthorized users
cannot access or manipulate information on a protected computer, from
either available, erased or temporary files. Pointsec PC safeguards the
operating system and the important system files (which often contain clues
to passwords for Windows), shared devices and the network.
Managing Pointsec PC
Pointsec PC administration is designed to allow central control of policy
and security settings, decentralized deployment and daily administration.
Using Pointsec PC profiles, system administrators are able to install and
configure the system, delegate authorization throughout the network,
modify the system for local conditions, and assign the properties and
authorization of individual users.
Pointsec PC allows simple but powerful local and central logging of system
information, group information and individual user account information.
Deploying Pointsec PC
The Pointsec PC program is first installed and configured on a Pointsec PC
administrator’s workstation. Once Pointsec PC has been configured on that
workstation, the system administrator can configure a Pointsec PC
6
Languages Supported in Pointsec PC
installation profile containing all the information and software necessary to
install and manage Pointsec PC on the PCs to which it is deployed on the
network.
Note - When Pointsec PC is installed on a client using deployment
software such as SMS or Tivoli, the service that runs the msi.exe must
be run as LOCAL_SYSTEM, and the service must have “Interact with
desktop” activated. If the service is run as a normal user account, the
installation will fail.
Languages Supported in Pointsec PC
Pointsec PC supports the following languages in the preboot environment,
in the Pointsec PC Management Console (PCMC), and in the tray
application:
•
English
•
French
•
German
•
Japanese
•
Italian
•
Spanish
All other languages into which Pointsec PC has been localized are
supported only in the preboot environment and in the tray application.
See Appendix E, “Language Packs” for a complete list of the languages
into which Pointsec PC has been localized.
Pointsec PC in a Common Criteria EAL-4
Environment
Pointsec PC is a flexible security product. However, in a Common Criteria
(CC) EAL-4 environment, not all possible Pointsec PC configurations are
permitted. We recommend that administrators installing, deploying and
managing Pointsec PC in a CC-validated environment do the following:
•
Pay particular attention to notes and other CC information in this guide
•
Read and comply with the requirements documented in Appendix J,
“Pointsec PC Common Criteria Configuration”
Preface
7
Pointsec PC in a Common Criteria EAL-4 Environment
8
1
Chapter
An Administration Overview
Pointsec PC should be managed using different levels of authority. It can be managed
from the Pointsec PC Management Console (PCMC) on any computer that has
Pointsec PC installed. This gives administrators control over and easy access to
higher-level functionality without being tied to any one machine.
This chapter explains different levels of authority, how to use them, how to access
administration functions from any computer, and how to establish the initial system
settings.
Administration Levels
Many businesses define only two levels of authority: a system administrator, who has
full authority, and users whose authority is limited to logging on and receiving remote
help. But you can also configure Pointsec PC to have many levels of administration: a
system administrator level and several other administrator levels. These levels allow for
centralized control of the creation of the profiles that are used to install, update, and
uninstall Pointsec PC on client computers while simultaneously allowing local control
of the deployment of those profiles.
With Pointsec PC you can implement a hierarchical system for administration. An
example of such an administration hierarchy, using a system administrator level and an
administrator level, is described below.
System Administrator
You can configure the system administrator to have the highest authorization level in
the administration of Pointsec PC.
9
Administrator
See Chapter 3, “Configuring Group and User Account Settings”, and note
the screen image of Privileged Permissions in the PCMC below, which
illustrates security-sensitive settings that you might want to restrict to
sysadmins. See also the description of authority levels in Chapter 4,
“Group Authority Levels” on page page 61.
In the example below, system administrators will, among other things, be
able to perform the following tasks in the system:
•
Create and manage profiles
•
Configure system settings
•
Add and remove administrators and user accounts
•
Configure settings for administrators and user accounts
•
Give Remote Help to users who are locked out or have forgotten their
passwords.
Figure 1-1
At least two competent individuals must be designated as system
administrators to manage Pointsec PC and the security of the information
it contains.
It is imperative that Pointsec PC system administrators receive adequate
training and are not careless, willfully negligent or hostile. Pointsec PC
system administrative personnel should follow the instructions provided in
this guide.
Pointsec PC system administrators must keep their authentication data
private.
Administrator
Administrators should be given more limited authority in relation to what
has been defined for the system administrator in the system settings.
10
User Level
An administrator can add, remove and change certain settings for specific
users. Administrators are not allowed to work with users who have higher
administration privileges than they do, nor can they raise their own
authorization level. Administrators are usually allowed to provide Remote
Help and to modify profiles.
Only users who can be trusted to follow and abide by the instructions
provided in this guide should be designated as Pointsec PC administrators.
Pointsec PC administrators must keep their authentication data private.
Note - By default, Pointsec PC administrators have the same authority
as users. The system administrator determines the amount of authority
an administrator has by configuring the authority settings in the System
Settings dialog box. For more information, see below.
User Level
Users have limited authority, according to what has been defined by the
system administrator in the system settings. Each user is assigned an
account with a unique user identity and password that together authorize
access to the entire hard disk.
Authorized Pointsec PC users must keep their authentication data private.
Typical Permissions for Roles
This section describes an example of a hierarchic authority structure to
give you an idea of how permissions can be configured to give different
specific users different levels of authority.
The following tables list Privileged Permissions, Permissions and Remote
Help settings for a possible structure with Pointsec PC user accounts,
administrators, and system administrators. This structure provides a
good level of security, but you will probably want to define your own
structure.
Table 1-1
Privileged Permissions
Privileged Permissions
User
Administrator
System Administrator
Change Permissions for User Accounts
X
Change Privileged Permissions
X
Create User Accounts
X
Create Groups
X
Create Profiles
X
Remove User Accounts
X
Chapter 1
An Administration Overview
11
Typical Permissions for Roles
Table 1-1
Privileged Permissions
Privileged Permissions
User
Administrator
System Administrator
Remove Groups
X
Remove Profiles
X
Edit System Settings
X
Table 1-2
Permissions
Permissions
User
Administrator
System Administrator
Change Password
X
Change Single Sign-On
X
View Logs
X
X
Uninstall
X
X
Provide Remote Help
X
X
Management Console Logon
X
X
Edit System Settings
X
Create Recovery Media
X
Table 1-3
Remote Help Settings
Permissions/Remote Help
User
Administrator
System Administrator
Provide ‘Reset Password’
X
X
Provide ‘One Time Logon’
X
X
Receive ‘Reset Password’
X
Receive ‘One Time Logon’
X
For more information, see “Configuring Group and User Account Settings”
on page 43.
12
Overview of the Pointsec PC Management Console (PCMC)
Overview of the Pointsec PC Management
Console (PCMC)
The Pointsec PC Management Console (PCMC) gives you quick and easy
access to all Pointsec PC functions.
To start the PCMC:
1. Click Start, navigate to the Check Point program group and select
Pointsec PC → Management Console. The Pointsec PC Management
Console (PCMC) program starts:
Figure 1-2
Note - If you start the PCMC on a computer that has a network
connection but no access to Internet, the PCMC can be slow in
starting. The PCMC’s .exe file is signed with a digital signature for
security, and when this file starts, Windows attempts to reach the
publisher’s Certificate Revocation List (CRL) to see if the .exe file’s
certificate has been revoked. If the CRL cannot be reached via the
network connection, it takes a long time for the PCMC to start.
To circumvent this delay, open Internet Explorer, select Tools →
Internet Properties or Internet Options (depending on the version).
Click the Advanced tab. In the Settings window, scroll down to the
heading Security and clear the Check for publisher’s certificate
revocation check box. Click OK.
Chapter 1
An Administration Overview
13
PCMC Dialog
PCMC Dialog
In the PCMC dialog, you can select an option either in the folder tree to
the left or by clicking the active link in the relevant dialog box image in
the pane to the right, for example, “Go to Local”.
The PCMC dialog contains the following options:
Table 1-4
PCMC Dialog
Option
Description
Local Installation
Select to manage the local installation of the
Pointsec PC.
Remote Installation
Select to manage profiles, logs, and recovery files
for remote installations.
Remote Help
Select to help locked-out users change the account
password or temporarily logon.
PCMC Menu Bar
The menu bar contains the File and Help menus. The File menu contains
the following options:
Table 1-5
File Menu Options
Option
Description
Extend Authority
Enables system administrators and administrators to use PCMC on any
computer where Pointsec PC has been installed. See “Extending
Authority” on page 14 for more information.
Import Set
Configurations...
See Chapter 6, “Working with Configuration Sets”.
Export All Set
Configurations...
See Chapter 6, “Working with Configuration Sets”.
Exit
Select to save any changes you have made and exit Pointsec Admin.
Extending Authority
The Extend Authority option enables administrators to use PCMC to access
administrator functions on any computer with Pointsec PC installed.
To extend authority:
1. From the File menu, select Extend Authority. The Extend Authority dialog
box opens:
14
PCMC Menu Bar
Figure 1-3
2. Do one of the following:
•
Enter the user account name and authenticate with an authorized
administrator password, and if you use a smart card for
authentication select Use inserted smart card. Click OK.
•
If you are locked out, click Remote Help to receive assistance
logging on.
After authentication, you can manage Pointsec PC from this computer.
Chapter 1
An Administration Overview
15
PCMC Menu Bar
16
2
Chapter
Configuring System Settings
This chapter provides a general introduction to the system settings with which you
configure Pointsec PC.
System settings are related to installation, the hardware devices used for
authentication, logon, Wake-on-LAN, required path specifications, and a number of
other aspects of the product such as Remote Help, screen savers and hibernation.
Other settings - those for Groups and User Accounts - are relevant for volume access,
logging on, authentication, permissions, Remote Help, single sign-on and password
synchronization. These settings are described in Chapter 3, “Configuring Group and
User Account Settings”.
Accessing Local Settings
Local settings are settings for the machine on which you are logged on, usually the
machine on which Pointsec PC is first installed and from which the installation of
Pointsec PC will be deployed to all clients.
The PC Management Console (PCMC), shown below, allows you to work with system,
local and remote settings. It provides wizards for defining, among other things: sets,
groups, and users accounts.
To access the local settings:
1. Start Pointsec and select one of the following:
•
Local in the folder tree to the left
•
Go To Local under Local Installation in the main panel
17
Accessing Local Settings
Figure 2-1
The Local dialog box is displayed:
Figure 2-2
18
Status Information
Status Information
The following Status information is displayed in the main panel:
Table 2-1
Status Information
Status field
Explanation
Locally installed version
The version of Pointsec PC currently installed on this machine.
Preboot User Account
The name of the user account that authenticated at preboot.
PCMC User Account
The name of the user account currently logged on to PCMC.
Windows Integrated
Logon enabled
The current value specified for the Windows Integrated Logon Enabled
setting: On or Off.
Last Recovery Update
Date and time the most recent recovery file was created.
Last Recovery File
Delivery
Date and time a recovery file was last copied to its target directory.
The target directory is the directory specified under Recovery Path in
the Install settings under System Settings.
Last Log File Update
Date and time the log file was last updated by Pointsec PC.
Last Log File Delivery
Date and time the log file was last written by Pointsec PC. The file
name of the log file is the same as the name of the machine. The log
file is written to the same directory or directories as specified in Set
Central Log Path (Install settings under System Settings).
Last Local Update
Date and time of the most recent change to a Local setting; also
contains the user account name that made the change.
Last Update Profile
Date and time the most recent update profile was downloaded and the
path, including the profile name, from which is was downloaded.
Encryption Information
The following Encryption information relevant to each volume is displayed:
Table 2-2
Encryption Information
Text
Explanation
Encrypting name nn%
Displays the progress of encryption, including the name of the
encryption algorithm and the percentage of encryption completed.
Fully encrypted name
States that the volume is fully encrypted and the name of the
algorithm used to encrypt it.
Decrypting nn%
Displays the progress of decryption as the percentage of decryption
completed.
Unencrypted
States that the volume is unencrypted.
Error
An error has occurred during encryption or decryption.
Chapter 2
Configuring System Settings
19
Editing Settings
Note - If a disk is neither encrypted nor boot protected, it is not
listed/displayed in the encryption information in the PCMC.
Editing Settings
To edit settings:
1. In the main panel under Actions, click Edit Settings. The folder tree is
displayed in the left panel.
2. Click the folder of the settings you wish to edit. See the following for
descriptions and editing details of the various system settings.
Hardware Device Settings
Hardware Devices contains the following settings:
Figure 2-3
Table 2-3
Hardware Device Settings
Setting
Description
Minimum Group
Authority Level Required
Group authority level required to edit the Hardware Devices settings.
Enable PCMCIA
Enable connection of smart card readers to a PCMCIA port.
Enable Serial
Enable connection of smart card readers to a serial port.
Enable USB
Enable connection of smart card readers to a USB port.
Enable Mouse in
Preboot
Enable mouse support in the Pointsec PC preboot environment.
Enable Low Graphics
Mode
Enable low-graphics mode in the Pointsec PC preboot environment.
Allow a Slave Hard Drive
Allow the system to use another encrypted drive as a slave drive.
Allow Hard Drive To Be
Slaved
Allow this drive to be a slave drive in other Pointsec PC systems.
20
Install Settings
Install Settings
Install contains the following settings:
Note - For a description of group settings, see Chapter 3, “Configuring
Group and User Account Settings”.
Figure 2-4
Table 2-4
Install Settings
Setting
Description
Minimum Group
Authority Level
Required
The minimum group authority level required to edit the Install settings. For
example, if you set this to 7, user accounts with the group authority levels
of 9, 8, and <=7 can edit the Install settings. For more information on
group authority levels, see Chapter 4, “Group Authority Levels” on page
17.
Organization
Name of the organization. This name is displayed in the Information about
Pointsec PC dialog box, which is accessed by right clicking on the
Pointsec PC icon in the system tray and selecting Information.
Maximum length of this value is 255 bytes. Note that all UNICODE
characters are not 1 byte in length, but can be 1, 2 or 4 bytes. Thus the
length of the value you input depends on the length of the characters in
the character set you use.
Product Owner
Owner of the Pointsec PC product. This is included in Information about
Pointsec, which is displayed by clicking on the Pointsec PC icon in the
system tray.
The maximum length of this value is 255 bytes. Note that all UNICODE
characters are not 1 byte in length, but can be 1, 2 or 4 bytes. Thus the
length of the value you input depends on the length of the characters in
the character set you use.
Chapter 2
Configuring System Settings
21
Install Settings
Table 2-4
Install Settings
Setting
Description
Select Language
Sets the language that will be used in the client preboot interface, the
client system tray, and the client single sign-on dialog (if single sign-on is
active on that client). This language must be one of the languages
installed on the machine.
If the language specified is not installed on the machine, the language
will be set to US English or, if French (Canadian) is specified and not
installed, to French. For more information on installing languages, see
Chapter D, “Language Support”on 231.
Product Serial
Number
Serial number of the Pointsec PC product.
If necessary, this can be changed by right-clicking on the serial number
and choosing Change value. A dialog opens where you can either enter
your new licence number manually under Pointsec PC Legacy serial
number/Check Point Licence or click the Browse button to import a Check
Point licence (.lic) file.
Pointsec PC supports only one single licence, not multiple licences.
This number, with its last six digits masked, is included in Information
about Pointsec, which is displayed by clicking on the Pointsec PC icon in
the system tray.
22
Install Settings
Table 2-4
Install Settings
Setting
Description
Set Update
Validation
Password
The administrator uses Set Update Validation Password to set the password
clients will use to validate update profiles they pull from a shared folder.
This password is crucial to the update or uninstall process and has a
maximum length of 31 bytes. Note that all UNICODE characters are not 1
byte in length, but can be 1, 2 or 4 bytes. Thus the length of the value
you input depends on the length of the characters in the character set you
use.
The update validation password (UVP) on the client is initially set by the
installation profile, or manually on the client machine via System
Settings/Install/Set Update Validation Password.
Example:
The UVP on the admin machine is changed to B, and the admin machine
deploys an update profile to the clients. This profile has been saved on
the admin machine after the UVP has been changed to B (Note that this
saving is necessary if the UVP in the profile is to be updated to the
current UVP of the admin machine). This deployed profile actually
contains both UVPs A and B, and when clients pull the update profile,
they accept it because it contains A and, in addition, they recognize that
the UVP has been set to B in this profile, so they change their UVPs to B.
Now, if a client changed its UVP to C and was used to deploy a UVP
(containing UVPs B and C) to all other clients, after pulling the profile the
clients would have UVP C. Once they have C, none of these clients will
accept an update profile deployed from the admin machine that still has
UVP B.
Set Log Password
The log password prevents unauthorized access to both local and non-local
logs. Note that changing the log password triggers Pointsec PC to create a
new Central Log file, which has a unique name.
The log password cannot be imported into a profile based on local
settings; therefore, the log password setting must be specified in a profile
that is ‘based on local’.
Enable Export of
Status to File
If enabled, the status information is exported in a file to the directory
specified in the Set Central Log Path setting. If no path is specified, the file
is not written. For a detailed description of the status information in the
file, see Appendix B, “Status Information When Exported to File” on page
page 221.
Chapter 2
Configuring System Settings
23
Install Settings
Table 2-4
Install Settings
Setting
Description
Set Upgrade Path
Path to the directory or directories from which the installation will
download software upgrades.
Enter the path(s) to the directory or directories where the Pointsec PC
system administrator will place the program upgrade files. Best practice is
to specify the path in UNC format: \\<server>\<share>\....
Pointsec PC downloads these software upgrades automatically in the
background at predefined intervals or the next restart. See “Working with
Installation and Update Profiles” on page 101 for more information.
Set Update Profile
Path
Path to the directory or directories from which the installation will
download update profiles.
Enter the path(s) to the directory or directories where Pointsec PC is to
look for update profiles to use when updating system and user
information. Best practice is to specify the path in UNC format:
\\<server>\<share>\....
Pointsec PC downloads these profiles according to the predefined update
interval. Default is every third hour or at the next restart, i.e. when the
Pointsec PC Tray program is loaded next. See “Working with Installation
and Update Profiles” on page 101 for more information.
Set Recovery Path
Path to the directory or directories from which the installation will store
recovery data. Best practice is to specify the path in UNC format:
\\<server>\<share>\....
Set Central Log
Path
Path to the directory or directories in which the installation will store a
copy of the local log file. Best practice is to specify the path in UNC
format: \\<server>\<share>\....
24
Logon Settings
Table 2-4
Install Settings
Setting
Description
Set PKCS#11 dll
Path
The path to the PKCS#11 dll file.
This setting is used only if you use smart cards and have specific reasons
for not using the default method of accessing smart cards. Setting a
PKCS#11 path is required if you are going to use the smart card
differentiation feature.
When smart card differentiation is in enabled, these serial numbers are
stored together with user information in a database. When a user tries to
log on with a smart card, the PKCS#11 dll collects the smart card ID and
certificate and compares these to the smart card ID and certificate
information already stored in the user account. This makes it possible to
have the same certificate on multiple smart cards while the system can
still differentiate between different users by the different smart card IDs.
Windows cannot register the PKCS#11 dll file automatically, the path to
the file has to be set manually. The dll file is distributed with your smart
card so the location depends on the smart card used, refer to your smart
card manual to find out where the dll is located.
As an example, the PKCS#11 dll file distributed with Aladdin smart cards
is found under: WINDOWS\system32\eTpkcs11.dll.
Pointsec Service
Start Account
Username
The Windows account to use when starting the Pointsec PC service.
Specify the account in the form: [Domain]\[Username]. See Chapter 10,
“Using a Service Start Account” on page 149 for more information.
Pointsec Service
Start Account
Password
Windows account password to the account that starts the Pointsec PC
service in Windows. See Chapter 10, “Using a Service Start Account” on
page 149 for more information.
Note - Pointsec PC will always use the first available path and will not
continue to look for newer files in other paths.
Pointsec PC maintains fail-safe communication with these locations by
using transactions to communicate. By definition, transactions ensure that
only correct and uninterrupted data will be stored and available.
Note - All paths should be to network shares that are located using a
secure but accessible UNC path.
Logon Settings
Logon contains the following settings:
Chapter 2
Configuring System Settings
25
Logon Settings
Figure 2-5
Table 2-5
Logon settings
Setting
Description
Minimum Group
Authority Level
Required
The minimum group authority level required to edit the Logon settings.
For example, if you set this to 7, user accounts with the group authority
levels of 9, 8, and <=7 can edit the Logon settings. For more
information on group authority levels, see Chapter 4, “Group Authority
Levels” on page 17.
Logon Verification
Set the number of seconds that the verification text for a successful
logon is displayed, or disable the display of the logon verification text.
Set Max Failed
Logons Before Reboot
Set the maximum number of failed logons allowed before a reboot is
invoked or disable this function.
This setting does not apply to smart cards: a smart card handles the
maximum number of failed logons internally, that is, the smart card
itself handles what to do when this maximum is exceeded.
The value of the Max Failed Logons Before Reboot must be set to three or
fewer in a Common Criteria validated environment.
Skip Management
Console Logon
When this setting is selected, Pointsec PC reuses the credentials
entered for preboot authentication for the logon to the Management
Console. Thus, no manual logon to the Management Console is
required. This will work only if the user account has permission to
access to the Management Console.
This setting and the Windows Integrated Logon setting (under “Logon
Settings” above) logon cannot both be enabled at the same time. If they
are, the system will deny you access to the Management Console.
26
Remote Help Settings
Table 2-5
Logon settings
Setting
Description
Allow Hibernation
and Crash Dumps
Allow the client to be put into hibernation and to write memory dumps.
This setting is enabled by default.
This setting, when selected, enables Pointsec PC protection when the
workstation is in hibernation mode. It also enables the writing of
memory dumps.
On the Pointsec PC-protected workstation, all volumes selected for
encryption must be fully encrypted before Pointsec PC will allow
hibernation.
See the current release notes for information on operating system and
hardware requirements.
When a machine is hibernating, only the Pointsec PC user account that
initiated the hibernation may logon to preboot authentication. To allow
another user account to use this machine, a Remote Help session is
required.
Consider operational security management when enabling hibernation.
As Pointsec PC supports one-time logon and remote password change in
hibernation mode, you must ensure that the user requesting this help is
legitimate. For more information, see chapter 12, “Remote Help” on
page 173 for more information.
If this setting is changed, the PC must be rebooted before the change
takes effect. A dialog box will be displayed, informing you about this.
For hibernation to function, the system disk on which Windows is
installed must be encrypted. Hibernation will not function with
boot-only protection.
Remote Help Settings
Remote Help contains the following settings:
Chapter 2
Configuring System Settings
27
Screen Saver Settings
Figure 2-6
Table 2-6
Remote Help settings
Setting
Description
Minimum Group
Authority Level
Required
The minimum group authority level required to edit the Remote Help
settings. For example, if you set this to 7, user accounts with the
group authority levels of 9, 8, and <=7 can edit the Remote Help
settings. For more information on group authority levels, see Chapter
4, “Group Authority Levels” on page 17.
Enable Remote Help
Enable Remote Help functionality? Select Yes or No. By selecting this
option, you enable users to use Remote Help on this computer.
The corresponding group and/or user account settings must also be
selected to enable providing and/or receiving Remote Help: Permissions
-> Remote Help -> Receive One-Time Password or Receive One-Time Logon
or Provide One-Time Password or Provide One-Time Logon.
For Remote Help to function, both the user account of the
Remote-Help provider and of the Remote-Help recipient must exist on
the computer. Note also that the Remote-Help provider’s group
authority level must be equal to or higher than the group authority
level of the Remote-Help recipient.
Use 20-Character
Challenge
Select to use a 20-character challenge instead of the default
10-character challenge in Remote Help sessions.
Screen Saver Settings
Screen Saver contains the following settings:
28
System Passwords Policy Settings
Figure 2-7
Table 2-7
Screen Saver settings
Setting
Description
Minimum Group Authority
Level Required
The minimum group authority level required to edit the Screen
Saver settings. For example, if you set this to 7, user accounts
with the group authority levels of 9, 8, and <=7 can edit the
Screen Saver settings. For more information on group authority
levels, see Chapter 4, “Group Authority Levels” on page 17.
Set Screen Saver Text
Specify the text that will be displayed in the Pointsec for PC
screen saver.
Allow Windows Screen Saver
Select to allow the Windows screen saver. Clear the checkbox is
you do not want the Windows screen saver to be used.
System Passwords Policy Settings
System Passwords Policy contains the following settings:
Figure 2-8
Chapter 2
Configuring System Settings
29
Wake-on-LAN Settings
Table 2-8
System Password Policy settings
Setting
Description
Minimum Group
Authority Level Required
The minimum group authority level required to edit the System
Passwords Policy settings. For example, if you set this to 7, user
accounts with the group authority levels of 9, 8, and <=7 can edit
the System Passwords Policy settings. For more information on group
authority levels, see Chapter 4, “Group Authority Levels” on page 17.
Windows Complexity
Requirements
If enabled, Pointsec PC will enforce password requirements similar to
the Windows Complexity Requirements:
•
The password must at least be six characters long.
•
The password must contain characters from at least three of the
following four categories:
•
•
English uppercase characters
•
English lowercase characters
•
Base 10 digits
•
Non-alphanumeric (for example: !, $, #, or %)
The password must not contain the username.
Require Letters and
Digits
Both letters and digits must be used in passwords if this setting is
active.
Case Sensitivity
Accept upper- and lowercase letters in passwords. If the value of this
setting is “No”, all letters are interpreted as uppercase regardless of
their case when entered.
Allow Special Characters
Allow the use of the following other special characters:; ! " # $ % &&
' ( ) * + , - . / : < = > ? @ { }.
Allow Consecutive,
Identical Characters
Allow more than two consecutive, identical characters in passwords.
Require Upper and
Lower Case
The password must contain both upper and lower case characters.
Allow Embedded Space
Characters
Passwords may contain embedded space characters.
Allow Leading or Trailing
Space Characters
Allow leading or trailing space characters or both.
Allow Password of
Adjoining Characters
Allow a password to consist of a series of characters from adjoining
keys on the keyboard.
Set Minimum Length
Set the minimum length for passwords.
Wake-on-LAN Settings
Wake-on-LAN contains the following settings:
30
Wake-on-LAN Settings
Figure 2-9
Table 2-9
Wake-on-LAN settings
Setting
Description
Minimum Group
Authority Level
Required
The minimum group authority level required to edit the Wake-on-LAN
settings. For example, if you set this to 7, user accounts with the group
authority levels of 9, 8, and <=7 can edit the Wake-on-LAN settings. For
more information on group authority levels, see Chapter 4, “Group
Authority Levels” on page 17.
Enable Wake on LAN
Enable Wake-on-LAN functionality. This setting will cause the computer
to automatically boot after the time specified under Wake On LAN Set
Start Delay, below. For more information see Chapter 13, “Pointsec PC
Utilities”.
On a machine on which Wake-on-LAN is enabled, carrying out either of
the following actions will disable Wake-on-LAN: (1) entering any
keystroke in the PPBE authentication window, or (2) successfully
logging on to the PCMC. After either of these actions, Wake-on-LAN
must again be enabled via this setting.
In a Common Criteria validated environment, this setting must be
disabled.
Set Start Delay
The delay in minutes after which a Wake-on-LAN boot starts.
Allow Windows Logon
Allow a Windows logon after a Wake-on-LAN boot.
Set Expiration Date
Set the date on which the Wake-on-LAN functionality will be disabled.
Set Max Number of
Logons Allowed
Set the maximum number of Wake-on-LAN logons allowed, if any.
Chapter 2
Configuring System Settings
31
Windows Integrated Logon Settings
Windows Integrated Logon Settings
The Windows Integrated Logon (WIL) function enables users to log on
without preboot authentication. This functionality is described in
“Pointsec PC Windows Integrated Logon (WIL)” in Chapter 13,
“Pointsec PC Utilities”.
Windows Integrated Logon (WIL) contains the following settings:
Figure 2-10
32
Windows Integrated Logon Settings
Table 2-10
Windows Integrated Logon (WIL) settings
Setting
Description
Minimum Group
Authority Level
Required
The minimum group authority level required to edit the Windows
Integrated Logon settings. For example, if you set this to 7, user
accounts with the group authority levels of 9, 8, and <=7 can edit the
Windows Integrated Logon settings. For more information on group
authority levels, see Chapter 4, “Group Authority Levels” on page 17.
Windows Integrated
Logon
Select this to enable user accounts to log on without preboot
authentication, that is, to bypass authentication at startup. Note that
this setting affects all your users. See the information on WIL in
“Pointsec PC Windows Integrated Logon (WIL)” on page 181.
In a Common Criteria validated environment, this setting must be
disabled.
If both Windows Integrated Logon and Change Credentials in the
Pointsec PS Tray (Figure 3-4 on page 46) are enabled, Change
Credentials in the Pointsec PS Tray will be disabled and grayed out in
the tray menu.
Note that this setting and the Skip Management Console Logon setting
(under “Logon Settings” above) cannot both be enabled at the same
time. If they are, the system will deny you access to the Management
Console.
Set PPBE Failure WIL
Message
The text specified in this setting is the message that will be displayed
to the user when WIL has been disabled automatically.
Enable Network
Locations Awareness
Enables or disables the Network Locations Awareness function.
Set Network Locations
Specifies the IP addresses that the Network Locations Awareness
module will ping during Windows boot.
Set Max Failed Windows
Logon Attempts
Maximum number of logon attempts in Windows before WIL is
automatically disabled. This value is reset after a successful logon has
been performed.
Display Enable WIL
Switch
Displays the 'Enable WIL' switch in the tray icon menu and in
preboot.
This setting enables the user to disable WIL if the user, for example,
is to remove the computer from the network to work from another
location, it saves the user from a reboot at the next start-up when WIL
is automatically disabled.
Chapter 2
Configuring System Settings
33
The Export to CSV File Button
Table 2-10
Windows Integrated Logon (WIL) settings
Setting
Description
Enable Hardware Hash
Specifies if a hardware hash from the BIOS ROM area together with
data from the CPU will be calculated to ensure that the hard drive has
not been tampered with.
Bypass PPBE WIL
Message
This setting will be reflected in PPBE when the user selects the 'Don’t
show this message again'-checkbox in the PPBE WIL message dialog.
This setting is useful for users who regularly disconnect their
computers from the network and do not want to see the message
explaining that WIL has been automatically disabled each time.
Set WIL User Screen
Saver Time-out
Time in minutes before the screen saver is activated for WIL users.
The Export to CSV File Button
The Export CVS File button in the Local dialog box allows you to export the
settings to a tab-separated CVS file. Note that you can also right-click a
group or user account folder and select Export to CSV to export the
settings for just that folder.
The Print Settings Button
The Print Settings button in the Local dialog box allows you to print the
settings, for a group or user account folder that is selected. Note that you
can also right-click a group or user account folder and select Print to print
the settings for just that folder.
Printing Settings
The Print Settings option in the Local dialog box allows you to print the local
settings.
Note - Before printing local settings you must have already set up the
printer or printers you want to use.
34
Printing Settings
Figure 2-11
To print local settings:
1. Click Print Settings. The Print dialog box is displayed:
Chapter 2
Configuring System Settings
35
Exporting Settings to a CSV File
Figure 2-12
2. Select a printer and click OK to print the settings.
Exporting Settings to a CSV File
The Export Settings to CVS File option in the Local dialog box allows you to
export the settings to a file as tab-separated CSV values.
Viewing the Event Log Database
The View Event Log Database option in the Local dialog box allows you to
view the event log database as necessary.
36
Viewing the Event Log Database
Figure 2-13
To view the log:
1. Click View Event Log Database. The Log Viewer dialog box is displayed:
Figure 2-14
Chapter 2
Configuring System Settings
37
Viewing the Event Log Database
Note that you can export the log by clicking on the Export button. Then
specify the name of the file that will contain the log, as well as the file
type in the Save as type drop-down box. Valid file types are XML, CSV
(Comma Separated Values) and TSV (Tab Separated Values). Then click
Save.
Each log entry contains the following elements:
Table 2-11
Log Entry Elements
Heading
Explanation
Priority
This includes both the icon that represents the type of event (Info, Warning,
Error, Success, or Failure) and the level of that type of event (Low, Normal,
High).
ID
Each event has a unique ID, and you might be requested to provide this ID
when communicating with Pointsec Support.
Timestamp
The timestamp showing when the event was recorded in the log.
Description
Text that describes the event.
To view detailed log entry information:
1. Do one of the following:
•
Double click the log entry you want to see in more detail.
•
Right click the entry you want to see in more detail and select
Details.
The Log Entry Details dialog box is displayed:
38
Filtering Log Entries
Figure 2-15
To exclude events from the display list:
1. Right click the entry you wish to exclude from the list and select Hide
this kind. All events with the same ID will be excluded from the display
list. To redisplay them, click Apply.
Filtering Log Entries
The logs can be customized to contain the information you desire. You can
select any combination of event type (Info, Warning, Error, Success, Failure)
and event level (High, Normal or Low for Warnings), and only those types and
levels selected will appear in the log. User account name, description text
and timestamp filter can also be filtered for.
Event Type
You can select the types of events to be included in the log from the list
below.
To select event types to be displayed in the log:
1. Select the checkbox of the event type(s) you want included in the log,
and click Apply.
Chapter 2
Configuring System Settings
39
Filtering Log Entries
The following types of events can be displayed:
Table 2-12
Event Types
Event type
Description
Info
An informational event.
Warning
A warning event is issued to make the administrator
aware of something.
Error
Signifies a Pointsec PC error.
Success
Signifies a successful action, for example, a successful
logon.
Failure
Signifies a unsuccessful action, for example, a failed
logon or a failed password change.
Event Level
Each event is assigned a level of either High, Normal or Low. The level is
displayed immediately to the right of the icon that represents the type of
event.
Figure 2-16
To select event levels to be displayed in the log:
1. For each type of event, select the level of event you want to appear in
the log. Click Apply.
User Account Name
To filter events according to user account name:
1. Enter the user account name in the Filter for User Name field and click
Apply. This field is not case sensitive and all input is displayed in
upper case characters.
Description Text
To filter events according to description text:
1. Enter the description text in the Filter for Description Text field and click
Apply. This field is case sensitive.
40
Exporting Logs
Timestamp Filter
To filter events according to timestamp:
1. Select Timestamp Filter. The corresponding fields of the Logs dialog box
are activated:
Figure 2-17
2. Select one of the following:
•
Before
Displays all events before the date and time you specify in the End
field. Note that you can filter for all events before a certain date
(without specifying a specific time on that day) by clearing the
time of day in the field in which the time is specified.
•
After
Displays all events after the date and time you specify in the End
field. Note that you can filter for all events after a certain date
(without specifying a specific time on that day) by clearing the
time of day in the field in which the time is specified.
•
Within Time Span
Displays all events within the dates and times you specify in the
Start and End fields. Note that you can filter for all events between
two dates (without specifying a specific time or times on one or
both days) by clearing the time of day in the field in which the
time is specified. Similarly, you can filter for events between two
times on one day.
3. Click Apply.
Exporting Logs
The log export functionality allows log content to be exported in the
following formats, which support import into other management and data
systems: Comma Separated Values (CSV), Tab Separated Values (TSV) and
XML. This includes logs from Local Settings or from a configuration set.
Export can be done on the basis of selectable criteria.
Chapter 2
Configuring System Settings
41
Exporting Logs
To export logs:
1. Select Export Local Log Database in the Local dialog box:
Figure 2-18
The Save As window is displayed:
Figure 2-19
2. Specify the name of the file that will contain the log, as well as the file
type in the Save as type drop-down box. Valid file types are XML, CSV
(Comma Separated Values) and TSV (Tab Separated Values).
3. Click Save.
42
3
Chapter
Configuring Group and User
Account Settings
This chapter provides a general introduction to the settings that can be specified for
both groups and user accounts. These settings are related to volume access, logging
on, authentication, permissions, single sign-on and password synchronization.
Each setting has a default value, but a value that has been set (specified) always
overrides a default value. Thus, for certain important settings, for example, those
related to password policy, you may want to set the values rather than relying on the
defaults.
Local Settings for Groups and User Accounts
To open the Local Settings:
1. Start Pointsec and select one of the following:
•
Local in the folder tree to the left
•
Go To Local under Local Installation in the main panel
43
Local Settings for Groups and User Accounts
Figure 3-1
2. The Local dialog box is displayed:
Figure 3-2
44
System Settings for Groups
3. Click Edit Settings and the folder tree under Local is displayed in the left
panel. This group of settings can be specified for both groups and user
accounts.
4. Do one of the following:
•
For group settings
Under Groups, expand the System folder to see the folders that
contain Group Settings.
•
For user settings
Under User Accounts, expand the tree for a user (ADMIN in the
example below) and then expand the Account Settings folder that is
displayed; you will see the folders containing the account settings.
You also see that the same settings exist for both groups and user
accounts:
Figure 3-3
System Settings for Groups
1. Click System under Groups and the following setting is displayed:
Chapter 3
Configuring Group and User Account Settings
45
System Settings for Groups
Figure 3-4
Table 3-1
System settings for groups
Setting
Description
GUID
(Globally Unique Identifier) The GUID is a unique
reference number that identifies each group and user
account. GUIDs are used internally by Pointsec PC to
guarantee each group and user account’s uniqueness.
Group Settings
1. Click Group Settings and the following settings are displayed:
Figure 3-5
Table 3-2
46
Group Settings
Setting
Description
Logon Authorized
User accounts in this group are allowed to log on.
System Settings for Groups
Table 3-2
Group Settings
Setting
Description
Set Screen Saver
Timeout
Time in minutes before the screen saver is activated.
Set Expiration
Date
The date on which this group will expire.
Set Group
Authority Level
Set the group authority level for this group. See
“Group Authority Levels” on page 61 for detailed
information on group authority levels.
Logon Settings
1. Click Logon under Group Settings and the following settings are
displayed:
Figure 3-6
Table 3-3
Logon settings
Setting
Description
Set Max Failed Logons
Set the maximum number of failed logons allowed before the account
is locked.
For smart card users, the smart card is locked when the maximum
number of failed logons configured for the individual smart card is
exceeded.
However, the Pointsec PC Set Max Failed Logons setting is not used
for smart cards. Therefore, the user account using the smart card will
not be locked even though the smart card is locked.
Chapter 3
Configuring Group and User Account Settings
47
System Settings for Groups
Table 3-3
Logon settings
Setting
Description
Set Logon Limit
Set the maximum number of successful logons allowed before the
account is locked.
Set Failed Attempts
Before Temporary
Lockout
Set the number of failed logon attempts before a temporary lockout
occurs.
Set Temporary Lockout
Time
Set the duration in minutes of a temporary lockout.
Authentication Settings
Fixed Password
Pointsec PC supports Unicode characters in passwords. See “Keyboard
Layouts” on page 237 for the keyboards (locale codes) supported and
“Language Packs” on page 233 for the languages supported.
1. Click Fixed Password and the settings are displayed:
Figure 3-7
48
System Settings for Groups
Table 3-4
Fixed Password settings
Setting
Description
Windows Complexity
Requirements
When enabled, each time the password is changed, Pointsec PC will
enforce password requirements similar to the following Windows
Complexity Requirements:
• The password must at least be six characters long.
• The password must contain characters from at least three of the
following categories:
– English uppercase characters
– English lowercase characters
– Base 10 digits
– Non-alphanumeric symbols (for example:!, $, #, or%).
• The password must not contain the username.
Uppercase and lowercase characters other than English characters can
also be used; contact Microsoft for information on exactly what can be
used.
If the new password does not meet the criteria described above, the
password change is rejected and a message communicating this is
displayed to the user.
Passwords are checked at the following times:
• When changed in Pointsec PC preboot authentication.
• At Windows logon.
• When changing password via the PCMC.
Require Letters and
Integers
Require that both letters and integers be used in passwords.
In a Common Criteria validated environment, this setting must be
enabled.
Case Sensitivity
Accept uppercase and lowercase letters in passwords. If the check box
is cleared, all letters are interpreted as uppercase regardless of their
case when entered.
Allow Special
Characters
Allow the use of the following special characters:! “# $% & ' () * +, -.
/:; < = >? @ {}
Allow Consecutive,
Identical Characters
Allow more than two consecutive, identical characters in passwords.
In a Common Criteria validated environment, this setting must be
disabled.
Chapter 3
Configuring Group and User Account Settings
49
System Settings for Groups
Table 3-4
Fixed Password settings
Setting
Description
Require Upper and
Lower Case
Require that passwords contain both uppercase and lowercase
characters.
In a Common Criteria validated environment, this setting must be
enabled.
Allow Embedded Space
Characters
Allow passwords with embedded space characters.
Allow Leading or
Trailing Space
Characters
Allow leading or trailing space characters, or both.
Allow Password of
Adjoining Characters
Allow passwords to consist of a series of characters from adjoining
keys on the keyboard.
Set Minimum Length
Set the minimum length for passwords.
In a Common Criteria validated environment, The value of this setting
must be 8.
Set Minimum Age
Set the minimum age of passwords in days, or no limitation for
password age. Minimum password age is the number of days the
password must exist before being changed.
Set Maximum Age
Set the maximum allowed age of a password in days.
If you have specified a maximum age at the group level, and later
decide you want it set at the user account level, do the following (Do
not use “Disable”, which only disables the feature):
1. Right click Set Maximum Age in Group Settings.
2. Select Reset value.
3. Click OK.
4. Specify the new maximum age for each user account.
Password History
50
Number of passwords that must be used before a previously used
password may be used again. Note that passwords created in the
PCMC are not saved in the password history.
System Settings for Groups
Note - If you specify that a group of accounts must use fixed
passwords, you must ensure that the settings for the passwords meet
strict security standards:
•
Always specify complex passwords that require letters, numbers,
special characters and spaces. Do not include repeating
characters.
•
Use a mix of uppercase and lowercase letters.
•
Use non-alphanumeric symbols such as the dollar sign ($) and
percentage symbol (%).
•
Pointsec PC supports Unicode characters in passwords. See
“Keyboard Layouts” on page 237 for the keyboards (locale
codes) supported and “Language Packs” on page 233 for the
languages supported.
•
Make sure the password does not include any word that can be
found in a dictionary – you can use parts of words.
•
Make sure the password can be remembered without having to be
written down.
•
When deploying Pointsec PC, create a policy to go with the
password, including end-user education and enforcement as well
as a procedure for action if someone forgets their password or
simply cannot get it to work.
Smart Card
1. Click Smart Card and the settings are displayed:
Figure 3-8
Chapter 3
Configuring Group and User Account Settings
51
System Settings for Groups
Table 3-1
Smart Card settings
Setting
Description
Certificate Expiration
Warning
The time in days before the certificate expires and a warning is
displayed to the user.
Certificate Expiration
Action
The action that will be taken when a certificate expires.
Certificate Revocation
Action
The action that will be taken when a certificate is revoked.
Windows Smart Card Insertion/Removal Handling
These settings make it possible to control the action taken when a smart
card-authenticated user removes the smart card.
1. Click Windows Smart Card Insertion/Removal Handling and the following
settings are displayed:
Figure 3-9
52
System Settings for Groups
Table 3-2
Windows Smart Card Insertion/Removal Handling settings
Setting
Description
Use Pointsec Token
Insertion/Removal Handling
Enables/disables the Pointsec PC
. If this feature is disabled, the Windows Token Removal Handling
feature is used instead.
Action If Smart Card Is
Removed
Action that will be taken if a smart card is removed. The following
actions can be set:
•
•
•
•
•
Do nothing - the user continues to be logged on.
Lock the workstation – the screen lock is activated and the
user needs to re-authenticate.
Log off the user – the system returns to the initial Windows
user logon screen. This log off action will be forced after 30
seconds.
Log off and shut down – the system logs off the user, closes all
open applications and saves data before shutting down the
system. The shutdown will be forced after 30 seconds.
Shut down immediately – the systems shuts down immediately
without any regard to open applications or data being
processed.
Privileged Permissions Settings
1. Click Privileged Permissions and the following settings are displayed:
Figure 3-10
Chapter 3
Configuring Group and User Account Settings
53
System Settings for Groups
Table 3-3
Privileged Permissions settings
Setting
Description
Change Permissions
Set whether or not the account(s) are allowed to change permissions.
Change Privileged
Permissions
Set whether or not the account(s) are allowed to change privileged
permissions.
Create User Accounts
Set whether or not the account(s) are allowed to:
•
Create user accounts.
•
Edit other user accounts’ names.
• Edit other user accounts’ fixed passwords.
Note that this setting does not allow these accounts to change/edit
their own names or fixed passwords; to do that the Permissions
setting, Change Credentials must be enabled. See Permissions
Settings, below.
Create Groups
Set whether or not the account(s) are allowed to create groups.
Advanced Profile
Editing
Set whether or not to allow the following:
•
Opening and editing of profiles created in versions of
Pointsec for PC prior to the current version.
•
Changing the GUID on groups and users.
Create Profiles
Set whether or not the account(s) are allowed to create profiles.
Remove User Accounts
Set whether or not the account(s) are allowed to remove user
accounts.
Remove Groups
Set whether or not the account(s) are allowed to remove groups.
Remove Profiles
Set whether or not the account(s) are allowed to remove profiles.
Edit System Settings
Set whether or not the account(s) are allowed to edit the system
configuration under System Settings.
Grants the account the authority to change the local system settings
on the computer they are logged in to. These changes can be
overridden with an update profile.
When this option is not selected, editing system settings will not be
available to the user account.
See “Working with Installation and Update Profiles” on page 101 for
more information.
Access to Local
Set whether or not the account(s) are allowed to access Local in the
Pointsec PC folder tree.
Access to Remote
Set whether or not the account(s) are allowed to access Remote in the
Pointsec PC folder tree.
Permissions Settings
1. Click Permissions and the settings are displayed:
54
System Settings for Groups
Figure 3-11
Table 3-4
Permissions settings
Setting
Description
Change Credentials
Set whether or not the account(s) are allowed to change their own
fixed passwords and/or credentials. Note that for account(s) to be able
to change other user accounts’ fixed passwords and/or user account
names, the Privileged Permissions setting Create Users must be
enabled. See Create Users under Privileged Permission settings,
above.
To create a temporary smart card user, this setting must be set to Yes.
Change Single Sign-On
Set whether or not the account(s) are allowed to change the single
sign-on settings.
When this option is selected, the account’s SSO setting can be
changed when being authenticated by Pointsec PC. For more
information on SSO, see Chapter 13, “Pointsec PC Utilities”.
View Logs
Set whether or not the account(s) are allowed to view logs.
Uninstall
Set whether or not the account(s) are allowed to uninstall
Pointsec PC.
Grants the account the authority to remove Pointsec PC from this
system. If the account does not have this privilege, an administrator
must go to the computer to remove the software.
Pointsec PC can only be removed by two user accounts that both have
this authority. A Pointsec PC user alone cannot remove Pointsec PC.
See “Removing Pointsec PC” on page 191 for more information.
Chapter 3
Configuring Group and User Account Settings
55
System Settings for Groups
Table 3-4
Permissions settings
Setting
Description
Management Console
Logon
Set whether or not the account(s) are allowed to log on to the
Management Console.
In a Common Criteria validated environment, this setting must be
disabled on all clients.
Create Recovery Media
Set whether or not the account(s) are allowed to create recovery
media.
Allow Logon to
Hibernated System
Set whether or not to allow the account(s) to log on to a system
hibernated by another account.
Change to Fixed
Password
Set whether or not the account(s) are allowed to be changed to use
fixed password authentication.
Change to Dynamic
Token
Set whether or not the account(s) are allowed to be changed to use
dynamic token authentication.
Change to Smart Card
Set whether or not the account(s) are allowed to be changed to use
smart-card authentication.
Change Credentials in
the Pointsec for PC tray
Set whether or not the account(s) are allowed to change their
credentials in the Pointsec PC tray.
When authenticating to change credentials in the Pointsec PC tray,
the Pointsec PC authentication dialog box has a Remote Help button.
This button enables only One-time logon; Remote password change is
not availble via this Remote Help button.
If both Windows Integrated Logon (see Figure 2-10 on page 32) and
Change Credentials in the Pointsec PC Tray are enabled, Change
Credentials in the Pointsec PC Tray will be grayed out and disabled in
the tray menu.
Remote Help
1. Click Remote Help and the settings are displayed:
56
System Settings for Groups
Figure 3-12
Note - For Remote Help to function, both the user account of the
Remote-Help provider and of the Remote-Help recipient must exist on
the computer. Note also that the Remote-Help provider’s group authority
level must be equal to or higher than the group authority level of the
Remote-Help recipient.
Table 3-5
Remote Help settings
Setting
Description
Provide ‘Remote
Password Change’
Set whether or not the account(s) are allowed to provide Remote
Password Change for other user accounts.
For a user account to be able to provide Remote Help, this option
must be also be selected in both the client system settings and the
user account properties.
Provide ‘One-Time
Logon’
Set whether or not the account(s) are allowed to provide One Time
Logon for other user accounts.
For a user account to be able to provide Remote Help, this option
must be also be selected in both the client system settings and the
user account properties.
Chapter 3
Configuring Group and User Account Settings
57
System Settings for Groups
Table 3-5
Remote Help settings
Setting
Description
Receive ‘Remote
Password Change’
Set whether or not the account(s) are allowed to receive Remote
Password Change.
For a user account to be able to receive Remote Help, this option
must be also be selected in both the client system settings and the
user account properties.
Receive ‘One-Time
Logon’
Set whether or not the account(s) are allowed to receive One-Time
Logon.
For a user account to be able to receive Remote Help, this option
must be also be selected in both the client system settings and the
user account properties.
Response Format
Select whether to use Numeric or Alphanumeric format for the response
in Remote Help.
Single Sign-On Settings
1. Click Single Sign-On and the settings are displayed:
Figure 3-13
Table 3-6
Single Sign-On settings
Setting
Description
Enable SSO
Set whether or not single-sign-on functionality is to be enabled for the
account(s).
Entrust SSO
Set whether or not Entrust single-sign-on functionality is to be used
by the account(s).
Smart Card Triggers
Windows SSO logon?
Set whether or not to allow using a smart card to trigger the Windows
SSO logon.
58
System Settings for Groups
Password Synchronization Settings
1. Click Password Synchronization and the settings are displayed:
Figure 3-14
Chapter 3
Configuring Group and User Account Settings
59
System Settings for Groups
Table 3-7
Password Synchronization settings
Setting
Description
Synchronize Windows
Password to Preboot
Synchronizes Pointsec PC password and Windows password by setting
the Pointsec PC password to the Windows password.
When a user changes the Windows password, Pointsec PC will prompt
for the Pointsec PC password and then synchronize it with the new
Windows password.
This setting can be enabled together with Synchronize Preboot
Password to Windows (below) so that in whichever environment the
password is changed it will be synchronized with the password in the
other environment.
Password synchronization must be inactivated in a Common Criteria
validated environment.
Synchronize Preboot
Password to Windows
Synchronizes the Pointsec PC password and the Windows password by
setting the Windows password to the Pointsec PC password.
When a user changes the Pointsec PCs password, Pointsec PC will
prompt for the Windows password and then synchronize it to the new
Pointsec PC password.
This setting can be enabled together with Synchronize Preboot
Windows to Preboot (above) so that in whichever environment the
password is changed it will be synchronized with the password in the
other environment.
Password synchronization must be inactivated in a Common Criteria
validated environment.
60
Chapter
Group Authority Levels
4
This chapter describes the Pointsec PC group authority levels.
What Is a Group Authority Level (GAL)?
Authority means, among other things, the right to carry out an action. A group
authority level (GAL) relates to which actions that user accounts in a group can carry
out.
A GAL is a mandatory setting for each group. The GAL is assigned when the group is
created, and the GAL can be changed once the group has been created. Every user
account in a group inherits the group’s GAL. But GALs cannot be assigned directly to
user accounts.
A GAL is also a mandatory setting for System Settings. When you do an master install,
the Required Group Authority Level for each System Settings folder is set to the most
secure value by default.
A GAL consists of a combination of a number and an optional operator, see the
descriptions of “Group-Authority-Level Number” and “Equal-Authority-Level Operator”,
below.
Group-Authority-Level Number
A group authority level (GAL) contains a number from zero to nine (0-9) that is set for
each group and for each System Settings folder in the Pointsec PC Management
Console (PCMC). Nine is the highest GAL, and zero is the lowest.
A user account with a given GAL level can change the settings etc. of groups with a
lower GAL: for example, user accounts that have the GAL nine, can access and edit
settings for all user accounts with a GAL of eight and lower, user accounts with a GAL
of five, can access and edit settings for all user accounts of four and lower, and so on.
Therefore, the GAL numbers are always displayed together with the less than operator:
<, for example, <9.
61
Using GALs To Create a Tiered Authority Structure
See Figure 4-1, below.
Equal-Authority-Level Operator
To enable user accounts with the same GAL to edit each other’s settings,
an equal authority level operator can be enabled by selecting the Equal
Authority Level checkbooks when assigning the GAL to a group. See
Figure 4-1, below. If this operator is enabled for, say, Group A, Group A
can edit the settings of all user accounts that have GALs equal to or lower
than Group A’s GAL. Therefore, GALs consisting of both a number and an
equal-authority-level operator are displayed together with the less than or
equal to operator: <=, for example, <=9.
Again, the user accounts of a group inherit the group authority level of
their group. Group authority level cannot be set for an individual user
account, it can be set only for a group.
See Figure 4-1, below.
Figure 4-1
Using GALs To Create a Tiered Authority Structure
Using group authority levels (GALs), you can make a tiered authority
structure to suit the security requirements of your organization. Here is an
example of such a structure:
62
Master Installation GALs
•
System group has Group Authority Level (<=9). This group
contains corporate recovery accounts based on dynamic tokens
stored in the Chief Security Officer's safe.
•
Security Officer group has Group Authority Level (<=9). A team
established by the Chief Security Officer to generate the Mandatory
Security Policy (MSP) for the enterprise and create highest level
group and account structure.
•
WebRH group has Group Authority Level (<=9). Provided by
webRH update profile importation or execution. This group is
managed in the Pointsec PC internal context and set to the
required Authority Level automatically.
•
Software Delivery Security Team group has Group Authority Level
(<=5). This group contains trusted members of the Software
Delivery team who have Security responsibility to ensure secure
update and deployment operations.
•
Workstation Support Team group has Group Authority Level (<=4).
This team is the direct, on-site support organization that provides
direct assistance to users in the organization and does not have
authority to affect the Mandatory Security Policy, nor does it make
changes to the Wake on LAN.
•
Users group has Group Authority Level (<1). This is the group for
the users normally operating the computer and who are not
authorized for any further capabilities with respect to configuration.
•
System Settings, except for Wake-On-LAN (WOL) settings, are set
to the Minimum Required Group Authority Level of 9 to protect the
Mandatory Security Settings (their default value).
•
Wake on LAN (WOL) settings are set to Minimum Required Group
Authority Level of 5 so the Software Delivery Security Team can
create Update Profiles enabling Wake on LAN for their
distributions.
Master Installation GALs
During a master installation, the GALs listed below are assigned by
default. They can of course be changed by a user account with the
required authority.
The Systems Group
When you do a master installation, Pointsec PC assigns the Systems group,
which is automatically created in a master installation, the highest GAL:
<=9.
Chapter 4
Group Authority Levels
63
Master Installation GALs
The System Settings Folders
During a master installation, the Minimum Required Group Authority Level
for each System Settings folder is by default set to 9.
Note - Note here the absence of the ‘less than’ operator and the ‘equal to’
operators. If, for example, the value displayed for a Minimum Required
Group Authority Level is 7, user accounts with the following GALs can
edit the relevant settings: <=9, <9, <=8, <8, and <=7, but a user
account with <7 cannot.
Other Groups of User Accounts
Pointsec PC assigns new groups other than the Systems group the GAL:
<1.
GALs for New Profiles (Not Based on Local
Settings or Another Profile)
The information below concerns GALs when defining a new profile.
Silent Installation, Interactive Installation, Silent Upgrade, and
Interactive Upgrade Profiles
For the profiles listed in the heading above:
•
All local System Settings are added to the profile, but their
Minimum Required Group Authority Levels are changed to the
highest level the user can change.
•
The user cannot set the Minimum Required Group Authority Level
of System Settings folders to higher than the highest GAL the user
can edit.
•
The GAL of groups in the profile cannot be set higher than the
group authority level the user can change.
Update Profiles
For update profiles:
64
•
All system settings are blank. Depending on the local system
setting Minimum Required Group Authority Level, the System
Setting folders are marked read-only. That is, if a System Setting
folder is read-only in the Local settings, the folder will also be
read-only in the profile settings.
•
The user cannot set the Minimum Required Group Authority Level
of System Settings folders to higher than the highest GAL the user
can edit.
•
The GAL of groups in the profile cannot be set higher than the GAL
the user is allowed to change.
Master Installation GALs
GALs for New Profiles Based on Local Settings
The information below concerns GALs when defining a new profile that is
based on local settings.
Silent Installation, Interactive Installation, Silent Upgrade, and
Interactive Upgrade Profiles
For the profiles listed in the heading above:
•
All local System Settings are added, with their current Minimum
Required Group Authority Level. If the user has a lower GAL, the
System Settings become read-only.
•
The user cannot set the Minimum Required Group Authority Level
of System Settings folders to higher than the highest GAL the user
can edit.
•
The GAL of groups in the profile cannot be set higher than the
group authority level the user can change.
•
All groups with a GAL that the user can change are inserted into
the new profile. But groups with a higher GAL than the user can
change are not inserted into the new profile.
Update Profiles
For update profiles based on local settings:
•
All System Settings with a Minimum Required Group Authority
Level that the current user can edit are inserted into the update
profile and can be edited by the user. The System Settings that
have a higher Minimum Required Group Authority than the user
can edit are blank in the update profile (not imported), and they
are displayed as read-only. That is, if a System Settings folder
would be read-only in the Local settings, the folder will not contain
any settings, and it will also be read-only in the update profile
settings.
•
The user cannot set the Minimum Required Group Authority Level
of System Settings folders to higher than the highest GAL the user
can edit.
•
The GAL of groups in the profile cannot be set higher than the
group authority level the user can change.
•
All groups with a GAL that the user can change are inserted into
the new profile. But groups with a higher GAL than the user can
change are not inserted into the new profile.
GALs for New Profiles Based on Another Profile
The information below concerns GALs when defining a new profile that is
based on another profile.
Chapter 4
Group Authority Levels
65
Master Installation GALs
Silent Installation, Interactive Installation, Silent Upgrade, and
Interactive Upgrade Profiles
For the profiles listed in the heading above:
•
All local System Settings are added, with their current Minimum
Required Group Authority Level. If the user has a lower GAL, the
System Settings become read-only.
•
The user cannot set the Minimum Required Group Authority Level
of System Settings folders to higher than the highest GAL the user
can edit.
•
The GAL of groups in the profile cannot be set higher than the
group authority level the user can change.
•
All groups are added with their current GALs. If the user has a
lower GAL than the group’s GAL, the group (and its users) are
displayed as read-only.
Update Profiles
For update profiles:
•
All System Settings with a Minimum Required Group Authority
Level that the current user can edit are inserted into the update
profile and can be edited by the user. The System Settings that
have a higher Minimum Required Group Authority than the user
can edit are blank in the update profile (not imported), and they
are displayed as read-only. That is, if a System Settings folder
would be read-only in the profile settings, the folder will not
contain any settings, and it will also be read-only in the update
profile settings.
•
All groups with a GAL that the user can change are copied from the
old profile and inserted into the new profile. But groups with a
higher GAL than the user can change are not inserted into the new
profile.
•
The user cannot set the Minimum Required Group Authority Level
of System Settings folders to higher than the highest GAL the user
can edit.
•
The GAL of groups in the profile cannot be set higher than the
group authority level the user can change.
GALs and Existing Profiles
The information below concerns GALs when editing existing profiles.
Opening and Editing a Pre-Pointsec PC 6.2 Profile in the 6.2
PCMC
When opening and editing pre-Pointsec PC 6.2 profiles in the 6.2 PCMC:
66
Master Installation GALs
•
The Minimum Required Group Authority Level of each System
Settings folder is set to the highest GAL the user can edit.
•
The user cannot set the Minimum Required Group Authority Level
of System Settings folders to higher than the highest GAL the user
can edit.
•
The GAL of groups in the profile cannot be set higher than the
group authority level the user can change.
•
Because pre-Pointsec PC 6.2 groups do not have a Group Authority
Levels, the groups in the profile are automatically assigned the
highest GAL the user can edit. (If the user is <6 all groups are
given GAL <=6).
•
When the profile is saved, it will be saved as a Pointsec PC 6.2
profile.
Opening and Editing Pointsec PC 6.2 Profiles
When opening and editing Pointsec PC 6.2 profiles:
•
If the user opening the profile has lower GAL than the minimum
group authority level required for a System Settings folder in the
profile, that folder is set to read-only.
•
If the user opening the profile has lower GAL than that required to
edit a group in the profile, that group is set to read-only.
•
The user cannot set the Minimum Required Group Authority Level
of System Settings folders to higher than the highest GAL the user
can edit.
•
The GAL of groups in the profile cannot be set higher than the
group authority level the user can change.
•
Edited or new groups can never be set to a higher GAL than the
GAL the user can edit.
Opening and Editing Local Settings in Pointsec PC 6.2
When opening and editing Local settings in Pointsec PC:
•
If the user opening the Local settings has a lower GAL than a
Minimum Required Group Authority Level for a System Settings
folder in the profile, that folder is set to read-only.
•
The user cannot set the Minimum Required Group Authority Level
of System Settings folders to higher than the highest GAL the user
can edit.
•
If the user opening the Local settings has a lower GAL than that
required to edit a group in the profile, that group is set to
read-only.
Chapter 4
Group Authority Levels
67
GAL Sanity Checks
•
The user cannot set the Minimum Required Group Authority Level
of System Settings folders to higher than the highest GAL the user
can edit.
•
The GAL of groups in the profile cannot be set higher than the
group authority level the user can change.
•
Edited or new groups can never be set to a higher GAL than the
GAL the user can edit.
GAL Sanity Checks
The following sanity checks are related to GALs. They are performed when
saving after editing Local settings or a profile’s settings:
•
1.Low group authority level on groups
When the group or groups with the highest GAL do not have
permission to change groups with the same GAL (see
“Equal-Authority-Level Operator” on page 62), it is possible to
create groups with settings that never can be changed. If this
occurs when editing a local profile, the sanity check prohibits
saving the profile and thus forces either a resolution of the problem
or a cancel. If this occurs when creating/editing other profiles, the
sanity check issues a warning.
•
2.No group has a high enough GAL to edit System Settings
If one or more of the System Setting folders require a higher GAL
than that of any of the groups in the profile, this sanity check is
triggered. If this occurs when editing a local profile, the sanity
check prohibits saving the profile and thus forces either a
resolution of the problem or a cancel. If this occurs when
creating/editing other profiles, the sanity check issues a warning.
•
3.No group has a Group Authority Level of <=9
When creating a installation profile (or a 4.x/5.x upgrade profile) a
warning sanity check recommends that the administrator should
define at least one administrator group with a GAL of <=9.
GALs and Permissions
GALs are a complement to the Permissions and Privileged Permissions in
the PCMC, and the three of them combine in innumerable ways. Here is a
summary of important aspects of each:
Group Authority Levels (GALs)
Group Authority Levels:
•
68
Control who affects whom and who can affect which System
Settings
GALs and Remote Help
•
Are mandatory for each group
•
Must be specified of each folder under System Settings.
•
Cannot NOT be specified for any user account
•
Are inherited by the user account from its group
Permissions and Privileged Permissions (PCMC)
Permissions and privileged permissions in the PCMC:
•
Control who can affect what
•
Are defined for each group and user account
•
Are inherited
•
Filter which settings can be configured in the PCMC
•
Filter which parts of the PCMC are enabled and which are disabled
for each user account
GALs and Remote Help
A Remote-Help provider’s group authority level must be equal to or higher
than the group authority level of the Remote-Help recipient.
Chapter 4
Group Authority Levels
69
GALs and Remote Help
70
Chapter
5
Managing Groups and User
Accounts
This chapter explains how to create and manage Pointsec PC groups and user accounts
on the computer on which you have installed Pointsec PC.
In Pointsec PC, a user account always belongs to one (and only one) group. This
means that before you create any user accounts, you must first create one or more
groups to contain user accounts.
Note - You cannot move a user account from one group to another, but must
instead delete the user account from its current group and then redefine it in the
other group.
Creating Group Accounts
Once the installation of Pointsec PC is completed and you have opened the PC
Management Console, you can see that a group called System has already been
created. And under the System group folder, there is a tree of User Accounts where you
will find the two users you defined during installation (in this example, DAPA and
ADMIN).
You can now create new group accounts if desired.
71
Creating Group Accounts
Figure 5-1
To create a new group account:
1. Right click Groups. The New Group button is displayed:
Figure 5-2
2. Click the New Group button and enter a group name in the New Group
dialog box:
Figure 5-3
3. Click OK. The new group is now listed in the tree under Groups (in this
example ABC Group).
Note that there are currently no user accounts in the User Accounts
folder in ABC Group:
72
Creating Group Accounts
Figure 5-4
4. In the Group Settings folder for the new group you have created,
configure the relevant group settings (see Chapter 3, “Configuring
Group and User Account Settings”, for details on configuring these
settings):
Figure 5-5
Table 5-1
Group Settings
Setting
Description
Logon Authorized
Allow user accounts in this group to log on.
Screen Saver Timeout
Time in minutes before the screen saver is
activated.
Expiration Date
Date this group will expire.
Expand the Group Settings folder tree for the new group, and you will see
the folders as described in Chapter 3, “Configuring Group and User
Account Settings”:
Chapter 5
Managing Groups and User Accounts
73
Default Values and How the Effective Values of Settings are Determined
Figure 5-6
Default Values and How the Effective Values of
Settings are Determined
If no value has been specified for a setting in either the group or user
account, the default value for that setting prevails; see the Default column
in the tables below.
When the values set for a group and a user account in that group differ,
Pointsec PC sets an effective value, that is, one value that is used for that
setting. The tables below list what the effective value will be. In most
cases, Pointsec PC selects the more secure value.
In the tables below, the value Nearest means that if the value is set in a
user account, that value is the effective value even if a different value is
set for this setting in the group; it if is set only in the group, that value will
be the effective value, and it if is not set in either user account or group,
the default value will be the effective value.
Table 5-2
Password effective values and default settings
Password Settings
Effective Value if Group and User
Account Differ
Default
Require Letter and Integers
Enabled
Disabled
Enable Case Sensitivity
Disabled
Disabled
Allow Special Characters
Enabled
Disabled
Allow Consecutive, Identical Characters
Disabled
Disabled
Require Upper and Lower Case
Enabled
Disabled
Allow Embedded Space Characters
Disabled
Disabled
Allow Leading or Trailing Space
Characters
Disabled
Disabled
Allow Password of Adjoining Characters
Disabled
Disabled
74
Default Values and How the Effective Values of Settings are Determined
Table 5-2
Password effective values and default settings
Password Settings
Effective Value if Group and User
Account Differ
Default
Set Minimum Length
The larger of the two values
Six characters
Set Maximum Age
The smaller of the two values
Disabled
Password History
The larger of the two values
Disabled
Table 5-3
Logon effective values and default settings
Logon Settings
Effective Value if Group and User
Account Differ
Default
Set Max Failed Logons
The smaller of the two values
Disabled
Set Logon Limit
The smaller of the two values
Disabled
Attempts Before Temporary Lockout
The smaller of the two values
Disabled
Temporary Lockout Time
The larger of the two values
Disabled
Table 5-4
Privileged Permissions effective values and default settings
Privileged Permissions Settings
Effective Value if Group and User
Account Differ
Default
Change Permissions
Disabled
Disabled
Change Privileged Permissions
Disabled
Disabled
Create User Accounts
Disabled
Disabled
Create Groups
Disabled
Disabled
Create Profiles
Disabled
Disabled
Remove User Accounts
Disabled
Disabled
Remove Groups
Disabled
Disabled
Remove Profiles
Disabled
Disabled
Edit System Settings
Disabled
Disabled
Table 5-5
Permissions effective values and default settings
Permissions Settings
Effective Value if Group and User
Account Differ
Default
Change Password
Disabled
Disabled
Change Single Sign-On
Disabled
Disabled
View Logs
Disabled
Disabled
Uninstall
Disabled
Disabled
Remote Help
Disabled
Disabled
Chapter 5
Managing Groups and User Accounts
75
Default Values and How the Effective Values of Settings are Determined
Table 5-5
Permissions effective values and default settings
Permissions Settings
Effective Value if Group and User
Account Differ
Default
Management Console Logon
Disabled
Disabled
Create Recovery Media
Disabled
Disabled
Allow Logon to Hibernated System
Enabled
Enabled
Change to Fixed Password
Disabled
Disabled
Change to Dynamic Token
Disabled
Disabled
Change to Smart Card
Disabled
Disabled
Change Credentials in the Pointsec for PC
tray
Disabled
Disabled
Table 5-6
Single Sign-On effective values and default settings
Single Sign-On Settings
Effective Value if Group and User
Account Differ
Default
Enable SSO
Disabled
Disabled
Use Entrust for SSO
Disabled
Disabled
Smart Card insertion triggers Windows
SSO logon
Nearest
Disabled
Table 5-7
Password Synchronization effective values and default settings
Password Synchronization Setting
Effective Value if Group and User
Account Differ
Default
Synchronization Mode
Nearest
Disabled
Table 5-8
Remote Help effective values and default settings
Remote Help Settings
Effective Value if Group and User
Account Differ
Default
Provide ‘Reset Password’
Disabled
Disabled
Provide ‘One-Time Logon’
Disabled
Disabled
Receive ‘Reset Password’
Disabled
Disabled
Receive ‘One-Time Logon’
Disabled
Disabled
Response Format
Nearest
Numeric
76
Adding a User Account to a Group
Adding a User Account to a Group
As discussed above, once the installation of Pointsec PC is completed and
you have opened the PC Management Console, you can see that a group
called System has already been created. Under the System group folder is a
tree of User Accounts where you will find the two user accounts you defined
during installation.
Figure 5-7
These two users are assigned what can be called ‘system administrator
privileges’, for example, all the Privileged Permissions and all the Permissions
except Create Recovery Media are set to Yes. Almost all other user accounts
you define will be assigned significantly more restricted privileges than
those of a system administrator.
To add another user account to the group:
1. Right click User Accounts and the Add User Account button becomes
active:
Figure 5-8
2. Click the Add User Account button to activate the User Account wizard:
Chapter 5
Managing Groups and User Accounts
77
Adding a User Account to a Group
Figure 5-9
Table 5-9
User Account dialog fields
Field
Description
User account
name
The name must be 1-31 characters long. Pointsec PC supports Unicode
characters in user account names. See “Keyboard Layouts” on page 237 for
the keyboards (locale codes) supported and “Language Packs” on page 233
for the languages supported.
78
Adding a User Account to a Group
Table 5-9
User Account dialog fields
Field
Description
Type of user
account
The type of user account can be:
•
•
•
Normal
A regular user account is usually created for users of the computer on
which you are working. This account can also be used as an
administrator account and be included in a profile when you deploy
Pointsec PC.
Service User
What distinguishes a service user from other users is that a service user
must use Remote Help’s Remote Password Change to gain access to the
system the first time. After access is granted via Remote Password
Change, the service user can reboot the system and log on without
requiring this type of Remote Help. But when another user logs on, the
service user account is locked, and the service user will need Remote
Help’s Remote Password Change to log on to log on again.
Temporary
A temporary account is usually created for users on the computer on
which you are working to limit the time the user can access the
computer. This account can also be used in a profile to create user
accounts when you deploy Pointsec PC.
When someone logs in using a temporary user account on a
Pointsec PC-protected computer, they are prompted for a new user
account name and password.
To create a temporary smart card user, the user account must have the user
account setting Change Credentials set to Yes. This setting is located under
Group/User Account → Permissions → Change Credentials.
If more than one temporary user account is deployed to a machine, when
the first temporary user logs on Pointsec PC will display the name of the
user currently logged onto Windows with the new Pointsec PC user account
name. But when the second (and third, etc.) temporary user logs on,
Pointsec PC displays the temporary user account name as the new user
account name. The user must enter another user account name to be able
to continue - the temporary user account name cannot be used.
Based on the new user account name and password, Pointsec PC creates a
new user account and deletes the temporary account. This makes deploying
Pointsec PC easy, as one Pointsec profile can be used for all computers and
you do not need to know exactly which user is on what computer.
For more information on profiles, see chapter 7, “Working with Installation
and Update Profiles” on page 101
Chapter 5
Managing Groups and User Accounts
79
Password Authentication
Table 5-9
User Account dialog fields
Field
Description
Authentication
method
Authentication for this user account will be done via:
•
•
•
Password
Dynamic Token
Smart Card
3. After specifying the logon name, type and password authentication
method, click OK. Note that defining a temporary user account is done
the same way as with a normal user account.
Password Authentication
4. Fill in the password details:
Figure 5-10
Table 5-10
Password fields
Field
Description
Password
The password must meet the criteria you have specified for fixed
passwords in Group Settings. Note that while you enter the password
and confirm that password in the Confirm Password text box, the text
‘Invalid Password’ is displayed to the right of the Password text box.
This text is displayed until the password meets all the criteria that
have previously been configured for passwords.
80
Dynamic Token Authentication
Table 5-10
Password fields
Field
Description
Confirm Password
Enter the password you entered in the Password text box.
Force change of
password at next logon
Selecting this option forces the user to specify a new user account
password at the next logon.
Password Rules
Length Adjoining Characters Retype Match Consecutive, Identical Characters Special Characters 5. Click Next, and after viewing the result do one of the following:
•
If you are satisfied, click Finish.
•
If you want to make changes, click Back, make the changes and
click Finish.
Use the above process to define any other user accounts that will use
password authentication.
Dynamic Token Authentication
To use dynamic token authentication:
1. Enter logon name and type of account, and select Dynamic Token:
Figure 5-11
2. Click Next.
3. Do one of the following:
•
To enter token values manually, see the procedure “Manually
Entering Token Values” on page 82.
Chapter 5
Managing Groups and User Accounts
81
Dynamic Token Authentication
•
To enter token values by importing a file, see the procedure
“Entering Token Values by Importing a File” on page 83.
Manually Entering Token Values
To enter token values manually:
1. Choose Add dynamic token by manually entering values and click Next:
Figure 5-12
2. Enter the information required:
Figure 5-13
82
Dynamic Token Authentication
Table 5-11
Dynamic Token dialog fields
Field
Description
Dynamic Token
Serial Number
Serial number, usually found on the back of the
dynamic token.
Dynamic Token Key
Enter the token key you received from Pointsec with
the token.
Challenge Length
A number from 1-8.
Response Length
A number from 1-16.
Challenge Format
Choose either Hexadecimal or Ascii.
Response Format
Choose either Friendly or Decimal.
3. Click Next and do one of the following:
•
If you are satisfied, click Finish.
•
If you want to make changes, click Back, make the changes and
click Finish.
Figure 5-14
Entering Token Values by Importing a File
1. Choose Add dynamic token by importing from file and click Next:
Chapter 5
Managing Groups and User Accounts
83
Dynamic Token Authentication
Figure 5-15
2. Navigate to the directory containing your tokens and select a file to
import:
Figure 5-16
3. Enter the password, which is the Encryption key in the key file you
intend to import. Click OK:
84
Dynamic Token Authentication
Figure 5-17
The tokens are imported:
Figure 5-18
4. Click Next and do one of the following:
•
If you are satisfied, click Finish.
•
If you want to make changes, click Back, make the changes and
click Finish.
Chapter 5
Managing Groups and User Accounts
85
Smart Card Authentication
Figure 5-19
Smart Card Authentication
A reminder: in order for smart card authentication of a user account to
function, note that you must correctly specify the type of smart card
readers you will use under Hardware Devices in System Settings. For details,
see “Logon Settings” on page 25. Furthermore, you must ensure that the
required drivers are installed for the smart cards and smart card readers
you will use. See “Smart Cards, Smart Card Readers and their Drivers” on
page 242 for details.
To choose smart card authentication:
1. Enter the logon name and type of account, and select Smart Card:
Figure 5-20
2. Click Next.
86
Smart Card Authentication
Selecting the Smart Card Certificate
To select the smart card certificate:
1. Select one of the smart card certificates listed under Issued to:
Figure 5-21
Note - Pointsec PC will not allow you to associate the same certificate
with two user accounts. When Pointsec PC detects that you are
attempting to do so it issues an error message and makes an entry in
the log, and the wizard closes. Examine the log for more information
about the error.
The wizard looks for certificates locally in Personal Store and, if
accessible, on smart cards and USB tokens, as well as in Microsoft
Active Directory.
If a certificate is stored in more than one place, it will be listed as
many times as the wizard finds it. When selecting a certificate listed
multiple times, it does not matter which of the listed instances of that
certificate you choose. Review the Location column in the list to
determine if the a certificate is listed more than once.
2. Click OK.
3. Click Finish to complete the creation of a user account that uses a
smart card for authentication:
Chapter 5
Managing Groups and User Accounts
87
Smart Card Authentication
Figure 5-22
88
6
Chapter
Working with Configuration
Sets
Configuration sets, hereafter referred to simply as sets, are used as share points from
which you can carry out your remote management. Typical remote management tasks
include installing (and uninstalling) Pointsec PC on remote clients, updating the
configuration on remote clients, providing one or more centralized points for storage of
logs, and so on.
Root Directory Path
Best practice is to use the set to provide a central configuration point for a root
directory path, as shown in the illustration below.
Figure 6-1
The root directory path points to a shared folder on a server. When you define a set,
one of the things you will do is specify the paths to the directories here. These paths
are described below.
89
Directory Paths
Directory Paths
The following directory paths should be created:
Profile Storage
The Profile Storage directory is where profiles are stored while you edit
them in the Pointsec PC Management Console (PCMC), prior to their being
published. As long as the profiles are in this directory, they cannot be
pulled by clients. It is a dedicated share for profile development.
This directory path must be specified when you define a set.
Update Profile
The Update Profile directory is where update and uninstall profiles are
placed so they can be pulled by the clients. By specifying subdirectories
for individual client computers, you can target your updates to individual
client computers.
In a profile, this path is referred to as the Update Profile Path. Set it by
editing the profile and specifying the path to use in System Settings →
Install → Set Update Profile Path.
Install
The Install directory is where you store installation packages, installation
profiles, and other configuration files that are to be used during the
installation, for example, the precheck.txt file and the files in the oemvar
folder.
Central Log
This is the directory to which clients copy their log files. In a profile, this
path is referred to as the Central Log Path. Set it by editing the profile and
specifying the path to use in System Settings → Install → Set Central Log
Path.
Recovery
The Recovery directory should be the target directory for client’s recovery
files. This is the directory in which Pointsec PC stores recovery files.
Recovery files contain information required to decrypt the
Pointsec PC-protected computer. For more information on recovery, see
Chapter 15, “Recovery, Repair and Bootable Media”.
In a profile, this path is referred to as the Recovery Path. Set by editing
the profile and specifying the path to use in System Settings → Install →
Set Recovery Path.
90
Creating a New Set
Upgrade
Place the upgrade source package and any supporting configuration files in
this directory. This is the directory from which clients will pull the upgrade
source package and other supporting configuration files. In a profile, this
path is referred to as the Upgrade Path. Set it by editing the profile and
specifying the path to use in System Settings → Install → Set Upgrade Path.
Creating a New Set
To create a new set:
1. Start the Pointsec PC Management Console (PCMC) and select Remote:
Figure 6-2
2. Click New Set and the Create New Set Wizard opens:
Chapter 6
Working with Configuration Sets
91
Creating a New Set
Figure 6-3
3. Enter a descriptive name that makes clear what the configurations and
profiles belong to.
You can select Automatically create a directory structure if you want
Pointsec PC to create folders. This requires that you have previously
configured a root directory on which the directory structure will be
created. This root directory must be a shared folder on the network, for
example:
\\<server name>\<shared folder>...
You must also have the required permissions to create the directories.
If these conditions are met, and you specify the shared folder under
Enter the root directory in which the directories will be created, the
PCMC automatically enters the following subfolders to the shared
folder and displays them in the relevant fields of the wizard:
•
<shared folder>\Profile Storage
•
<shared folder>\Update Storage
•
<shared folder>\Install
•
<shared folder>\Log
•
<shared folder>\Recovery
•
<shared folder>\Upgrade
4. Click Next:
92
Creating a New Set
Figure 6-4
5. Specify a storage path, the path to a directory that will hold the profiles
while you edit them. Best practice is to specify paths in UNC format:
\\<server>\<share>\.... The profiles you are working on will be
stored in this directory until you publish them. As long as they are in
the storage directory, you can edit them, and they cannot be pulled by
remote clients. Note that you must click Add for the path to be
included in the set.
6. When no more paths are to be added, click Next:
Figure 6-5
7. Specify an update profile path, the path to a directory from which clients
will pull update and uninstall profiles. Best practice is to specify the
path in UNC format: \\<server>\<share>\.... In the profile, this path
is referred to as the Update Profile Path. Set by editing the profile and
specifying this path in System Settings/Install/Set Update Profile Path.
Note that you must click Add for the path to be included in the set.
8. When no more paths are to be added, click Next:
Chapter 6
Working with Configuration Sets
93
Creating a New Set
Figure 6-6
9. Specify an Install path, the path to a directory containing the
Pointsec PC installation package. Best practice is to specify paths in
UNC format: \\<server>\<share>\.... Note that you must click Add
for the path to be included in the set.
10. When no more paths are to be added, click Next:
Figure 6-7
11. Specify a log path, a path to a directory into which the clients in the set
will copy thier log files. Best practice is to specify paths in UNC
format: \\<server>\<share>\.... In a profile, this path is referred to
as the Central Log Path. Set it by editing the profile and specifying a
path in System Settings → Install → Central Log Path. Note that you
must click Add for the path to be included in the set.
12. When no more paths are to be added, click Next:
94
Creating a New Set
Figure 6-8
13. Specify a recovery path, a path to a directory into which the clients in
the set will copy thier recovery files. Best practice is to specify paths
in UNC format: \\<server>\<share>\.... In the profile, this path is
referred to as the Recovery Path. Set it by editing the profile and
specifying a path in System Settings → Install → Recovery Path. Note
that you must click Add for the path to be included in the set.
14. When no more paths are to be added, click Next:
Figure 6-9
15. Specify an upgrade path, a path to a directory in which upgrade package
files are located and from which clients downoload these files. Best
practice is to specify paths in UNC format: \\<server>\<share>\....
In a profile, this path is referred to as the Upgrade Path. Set it by
editing the profile and specifying a path in System Setting → Install →
Upgrade Path. Note that you must click Add for the path to be included
in the set.
16. When no more paths are to be added, click Next:
Chapter 6
Working with Configuration Sets
95
Exporting/Importing Set Configurations
Figure 6-10
17. Create the set by clicking Finish.
Figure 6-11
The set is created. Note that the set configuration is saved when the set is
created.
Exporting/Importing Set Configurations
Set configurations can be exported from one PCMC and imported into
another PCMC. All set configurations, and individual set configurations can
be exported or imported.
96
Exporting/Importing Set Configurations
Exporting All Set Configurations
To export all set configurations, select Export All Set Configurations....in
the PCMC File menu. A browser window is displayed. Browse to the
directory in which you want so store the set configurations, and click Save.
Figure 6-12
Exporting One Set Configuration
There are two ways to export a single configuration set:
First Alternative
1. Right click a set in the PCMC folder tree and select Export Set
Configuration.... A browser window is then displayed.
2. Browse to the directory in which you want so store the set
configurations, and click Save.
Figure 6-13
Second Alternative
1. Select a set in the PCMC folder tree and then click the Export Set
Configuration button under Actions on the right-hand side of the
window; see Figure 6-14, below. A browser window is then displayed.
2. Browse to the directory in which you want so store the set
configurations, and click Save.
Chapter 6
Working with Configuration Sets
97
Exporting/Importing Set Configurations
Figure 6-14
Importing a Set Configuration
There are three ways you can import a set configuration:
First Alternative
1. Select Import Set Configuration... in the PCMC File menu. A browser
window is displayed.
2. Browse to the directory in which you want so store the set
configuration, and click Open.
Figure 6-15
Second Alternative
1. Right click Remote in the PCMC folder tree and select Import Set
Configuration...; see Figure 6-16, below. A browser window is then
displayed.
2. Browse to the directory in which you want so store the set
configuration, and click Open.
98
Exporting/Importing Set Configurations
Figure 6-16
Third Alternative
1. Click Import Set Configuration under New Configuration Set in the
PCMC Remote window; see Figure 6-17, below. A browser window is
then displayed.
2. Browse to the directory in which you want so store the set
configuration, and click Open.
Figure 6-17
Publishing Profiles Directly from the Profile List
You can publish a profile directly from the list of profiles in the PCMC.
Update and Uninstallation Profiles
To publish an update or uninstallation profile in the profile list:
1. Right click the profile, and the Update Profile paths that have been
configured in the set are displayed as selectable choices under Publish
profile to.
2. Select the configured update profile path you want, and the profile is
automatically copied to the selected path.
Chapter 6
Working with Configuration Sets
99
Exporting/Importing Set Configurations
Installation Profiles
To publish an installation profile in the profile list:
1. Right click the profile, and the Install paths that have been configured
in the set are displayed as selectable choices under Publish profile to.
2. Select the configured Install path you want, and the installation profile
is automatically copied to the selected path.
Figure 6-18
100
7
Chapter
Working with Installation and
Update Profiles
This chapter explains how to create Pointsec PC profiles that are used to:
•
Install Pointsec PC on the computers (client machines) in your networks
•
Uninstall/remove Pointsec PC from client machines
•
Manage the user accounts, groups and other settings on client machines
About Pointsec PC Profiles
Pointsec PC profiles contain user and group account information, the settings which
control which volumes are to be encrypted, who can access the drives, privilege levels
and update settings.
There are four types of Pointsec PC profiles:
•
Installation profiles
•
Update profiles
•
Uninstall profiles
•
Upgrade profiles, for information on upgrade profiles, see “The Characteristics of
an Upgrade Profile” on page 136.
Note - Spaces are not allowed in profile names. For example,
update_profile.upp is a valid profile name, but update profile.upp
is not valid.
101
Converting Pre-6.2 Profiles to 6.2 Profiles
Converting Pre-6.2 Profiles to 6.2 Profiles
Pre-6.2 profiles can be used in 6.2 only if you convert them to 6.2
profiles. To convert a pre-6.2 profile to a 6.2 profile:
1. Move the pre-6.2 profile to a 6.2 Profile Storage path.
2. Open the pre-6.2 profile in the Pointsec PC 6.2 PCMC.
3. Verify that the 6.2 serial number/license is used by checking System
Settings
4. Install → Product Serial Number.
5. Convert and save the pre-6.2 profile by clicking OK.
The converted profile can now be used in Pointsec PC 6.2.
Installation Profiles
There are two types of installation profiles:
•
Silent install
•
Interactive install
Note - Fragmented Disks
2 MB of contiguous disk space is required for Pointsec PC installation.
If this amount of continuous space is not available, the installation will
fail. In general, it is considered good practice to avoid fragmented disks
to enhance overall performance. It is also considered good practice to
defragment disks prior to installing Pointsec PC.
Note - In Common Criteria validated environments, all administration
and configuration of client installations must be done via profiles. The
only local administration allowed is the initial administration of an
administration installation, which is then used to create an initial
installation profile to be used to install the clients. All updates and
new installation profiles for both clients and administration are then
maintained via profiles, created on an administration installation.
In a Common Criteria validated environment, only silent installation
profiles should be used to deploy Pointsec PC.
Silent Installation Profiles
A silent installation profile contains the group and user account
information and system settings. When a silent installation profile is
deployed on a computer, Pointsec PC is installed on the computer without
any interaction with the user.
102
Update Profiles
Interactive Installation Profiles
An interactive installation profile contains the group and user account
information and system settings. When an interactive installation profile is
deployed on a computer, Pointsec PC is installed on the computer with
some interaction with the user.
Note - If you deploy Pointsec for PC using interactive installations, you
may want to suppress the Reboot needed dialog box, which is normally
displayed at the end of the installation dialog. To suppress this dialog
box, assign the value ReallySuppress to the MSI REBOOT property in
the following way:
setup.exe /v”REBOOT=reallySuppress”
Note that there is no space between the “v” and the first double quote
(“).
Update Profiles
An update profile contains new settings to be deployed on
Pointsec PC-protected computers. See “Creating and Deploying Update
Profiles” on page 129 for more information.
Upgrade Profiles
For information on upgrade profiles, see “The Characteristics of an
Upgrade Profile” on page 136.
Uninstall Profiles
An uninstall profile contains the settings needed to remove Pointsec PC
from a computer.
What’s in a profile?
All profiles contain system settings. Group settings and user account
settings are optional, but each user account must belong to a group.
System Information
System information includes paths to the central server where recovery
files, update profiles and software updates are stored. It also contains
settings related to, for example, installation, hardware devices,
Wake-on-LAN, and Remote Help.
Chapter 7
Working with Installation and Update Profiles
103
Creating a Profile Based on Another Profile or Local Settings
In addition to the system information described above, installation profiles
also contain information on which disk volumes are to be protected by
Pointsec PC, the type(s) of security (encryption and/or boot protection) to
be used, and the encryption algorithms to be used.
Group Information
Group information contains the system settings for local groups and their
authorization, including the user's right to receive Remote Help and
security settings such as keyboard lock. Group information also contains
the privileges for system administrators, administrators, and user accounts
at the group level.
User Account Information
User account information contains settings for individual user accounts,
including the account’s authorization for different volumes, Remote Help
and security settings such as time-out settings for the screen saver and
unlocking the keyboard lock. User account information also contains the
privileges for system administrators, administrators and user accounts.
Creating a Profile Based on Another Profile or Local
Settings
To facilitate the specification of the system settings, group settings, and
user account settings information in a new profile, you can base the new
profile on
•
An existing profile, or
•
The local settings of the computer on which you create the profile.
When you base a new profile on local settings or an existing profile, you
can select which settings you want to use (if however you do not choose to
base it on Group Settings, the User Account Settings choice will be grayed
out and cannot be selected).
Note - A new installation or upgrade profile inherits the Pointsec
PC/Check Point license number of the computer on which it is
created even if Base new profile on Existing profile or existing
settings is not selected.
104
Before Creating Profiles
Before Creating Profiles
Before you create any Pointsec PC profiles, it is a good idea to create the
directories where you will store the profiles.
Note - We recommend that you create the directories on a network share
with RWXD share permissions for all users. If you do not want to
specifically define these permissions for all users, you should use the
Pointsec Service Start service. See “General Requirements” on
page 128 for details.
This share must be secure and backed up regularly.
To create profile directories:
1. Create the following directories:
•
Storage
This is the directory that will hold profiles while you edit them. The
profiles will remain in this directory until you publish them; see
“Publish Path” on page 107. As long as they are in the storage
directory, they cannot be pulled by remote clients.
•
Update
This is the directory from which clients will pull profiles. Note that the
path to this directory must be set in the profiles that are put in this
directory. In the profile, this path is referred to as the update path, and
is set by editing the profile and setting this path in System Settings →
Install → Set Update ProfilePath.
•
Recovery
This is the directory in which Pointsec PC stores information about the
Pointsec PC-protected computers. This information is needed to
provide Remote Help; see Chapter 12, “Remote Help” for details. It is
also used to recover encrypted information in the event of an operating
system crash. For more information on recovery, see Chapter 15,
“Recovery, Repair and Bootable Media”.
Working with Profiles – an Overview
The following graphic provides an overview of working with Pointsec PC
profiles:
Chapter 7
Working with Installation and Update Profiles
105
Sets
Figure 7-1
Sets
Profiles are organized into sets. Each profile much belong to a set. Sets
are meant to help you locate and work with your profiles. For example, you
might want to have a set for each department’s profiles if they differ.
Storage Path
As you will see below, each set contains the specifications for a storage
path and a publish path. The storage path is the directory path to the
directory in which you will store profiles while you configure them prior to
deployment. Best practice is to specify the path in UNC format:
\\<server>\<share>\....
106
Deploying Pointsec PC for the First Time
Publish Path
The publish path is the directory path to the directory from which clients
will pull the profiles. Profiles are put in this directory when the
administrator has finished configuring the profile and decided that the
profile is ready to be deployed. Best practice is to specify the path in UNC
format: \\<server>\<share>\....
Deploying Pointsec PC for the First Time
Generally, when deploying Pointsec PC for the first time, you create and
save an install profile on a secure workstation. You then move the install
profile to a publish directory, a secure shared directory on the network.
Note - The users on the computers on which you wish to install
Pointsec PC must have read and execute permissions to the shared
directory.
The install profile can be started from any device that can map a drive and
run an executable file.
Updating Pointsec PC Settings
As changes in security requirements and personnel occur, you will need to
update the settings that have been deployed on Pointsec PC-protected
computers.
You do this by creating and placing an update profile in the Update
directory on the designated file server.
Note - The users on the computers on which you wish to update
security settings or make other changes must have read and execute
permissions to this directory.
Pointsec PC-protected computers regularly check this directory for new
update profiles. When they find a new update profile they download it and
implement the changes. For more information, see “Creating and
Deploying Update Profiles” on page 129.
Updating Pointsec PC Software
Whenever a new version of Pointsec PC becomes available, you can easily
deploy it to computers in your network. You simply create a software
update profile and place it in the SW_Update directory.
Note - The users on computers on which you wish to update
Pointsec PC, must have read and execute permissions to this directory.
Chapter 7
Working with Installation and Update Profiles
107
Removing Pointsec PC using a Profile
Removing Pointsec PC using a Profile
If, for any reason, you need to remove Pointsec PC from computers in your
network, you can do so by placing an uninstall profile in the Update
directory. See Chapter 14, “Removing Pointsec PC” for more information.
Note - The user accounts on computers from which you wish to remove
Pointsec PC must have read and execute permissions to this directory.
Creating and Deploying Installation Profiles
The first profile we will create and deploy is a silent install profile, the
most commonly used profile when deploying Pointsec PC for the first time.
Creating a New Set
To create a new set:
1. Start the Pointsec PC Management Console (PCMC) and select Remote:
Figure 7-2
2. Click New Set and the Create New Set Wizard opens:
108
Creating a New Set
Figure 7-3
3. Enter a descriptive name that makes clear what the configurations and
profiles belong to, for example “Set_Accounting” for a set that
contains the configuration and profiles for the accounting department,
“Set_Development”, etc. You can select Automatically create a
directory structure if you want Pointsec PC to create folders.....
Click Next:
Figure 7-4
4. Specify the storage path, the path to the directory that will hold the
profiles while you edit them. Best practice is to specify all the paths in
UNC format: \\<server>\<share>\.... The profiles you are working on
will be stored in this directory until you publish them. As long as they
are in the storage directory, you can edit them, and they cannot be
pulled by remote clients. Note that you must click Add for the path to
be included in the set.
5. After clicking Add, click Next:
Chapter 7
Working with Installation and Update Profiles
109
Creating a New Set
Figure 7-5
6. Specify the update profile path, the path to the directory from which
clients will pull update and uninstall profiles. Best practice is to
specify the path in UNC format: \\<server>\<share>\.... Note that
this path must also be set in the profiles that are put in this directory;
in the profile, this path is referred to as the update profile path, and is
set by editing the profile and setting this path in System Settings →
Install → Set Update Profile Path. Note that you must click Add for the
path to be included in the set.
7. After clicking Add, Click Next:
Figure 7-6
8. Specify the Install path, the path to the directory from which clients will
pull installation profiles. Best practice is to specify the path in UNC
format: \\<server>\<share>\.... Note that you must click Add for
the path to be included in the set.
9. After clicking Add, Click Next:
110
Creating a New Set
Figure 7-7
10. Specify the log path, the path to the directory in which the set’s log is
located and to which clients copy their log files. Best practice is to
specify the path in UNC format: \\<server>\<share>\.... Note that
this path must also be set in the profiles that are put in this directory;
in the profile, this path is referred to as the update profile path, and is
set by editing the profile and setting this path in System Settings →
Install → Central Log Path. Note that you must click Add for the path to
be included in the set.
11. After clicking Add, Click Next:
Figure 7-8
12. Specify the recovery path, the path to the directory in which the set’s
recovery files are located and to which clients copy their recovery files.
Best practice is to specify the path in UNC format:
\\<server>\<share>\.... Note that this path must also be set in the
profiles that are put in this directory; in the profile, this path is
Chapter 7
Working with Installation and Update Profiles
111
Creating a New Set
referred to as the update profile path, and is set by editing the profile
and setting this path in System Settings → Install → Recovery Path.
Note that you must click Add for the path to be included in the set.
13. After clicking Add, Click Next:
Figure 7-9
14. Specify the upgrade path, the path to the directory in which upgrade
package files are located and from which clients download these files.
Best practice is to specify the path in UNC format:
\\<server>\<share>\.... Note that this path must also be set in the
profiles that are put in this directory; in the profile, this path is
referred to as the update profile path, and is set by editing the profile
and setting this path in System Settings → Install → Upgrade Path. Note
that you must click Add for the path to be included in the set.
15. After clicking Add, Click Next:
Figure 7-10
16. Create the set by clicking Finish.
112
Creating an Installation Profile
Figure 7-11
Creating an Installation Profile
The process of creating and deploying an installation profile involves:
•
Creating the profile.
•
Adding group and user accounts.
•
Configuring the profile settings.
•
Deploying the profile to computers in the network; see “Deploying
Pointsec PC Using an Install Profile” on page 124.
Note - Before you can create any profiles, the Profile Validation
Password (Local → Edit Settings → System Settings → Install) must be
set.
To create an installation profile:
1. From the window that displays information about Set Accounting, do
one of the following:
•
Click New Profile
•
Start PCMC and click Remote and then New Profile:
Chapter 7
Working with Installation and Update Profiles
113
Creating an Installation Profile
Figure 7-12
The New Profile Wizard is displayed:
Figure 7-13
2. Click Next.
3. Select the set in which you want to include this installation profile.
Click Next:
114
Creating an Installation Profile
Figure 7-14
4. Select Installation, silent. Click Next:
Figure 7-15
5. Enter the name of the new profile (in this case, install_accounting).
Note - Spaces are not allowed in profile names. For example,
update_profile.upp is a valid profile name, but update profile.upp
is not.
6. Enter and confirm the password, which will be required when you want
to edit the profile.
Note - The password policy applied to the password specified here is
the password policy of the user account that is currently logged on and
is creating the new profile. See “Authentication Settings” on page 48
for more information on the settings that can be specified for fixed
passwords.
7. Click Next:
Chapter 7
Working with Installation and Update Profiles
115
Creating an Installation Profile
Figure 7-16
8. If you want to base the profile on the local settings of the computer on
which you are creating the profile, or on an existing profile select
Existing profile or local settings:
Figure 7-17
9. If you select to base the profile on Existing profile or local settings, you
must then either browse to an existing profile or specify which local
settings the new profile is to be based on (System, Group, or User
Account), then click Next:
116
Creating an Installation Profile
Figure 7-18
10. View the information and, if satisfied, complete the creation of the
profile by clicking Finish:
Figure 7-19
The installation profile you just created is now displayed among the
profiles under Set Accounting:
Figure 7-20
Chapter 7
Working with Installation and Update Profiles
117
Creating an Installation Profile
The System Settings in the Profile You Just
Created
The profile that was just created will contain the values for the settings
that will be set on the client machines installed with this profile.
Note - The log password cannot be imported into a profile based on
local settings; therefore, the log password setting must be specified
in a profile that is ‘based on local’. If it is not specified in, for
example, a installation profile based on local settings, the clients
that are installed using this profile will not have a log password set
until it is specifically specified on that client, either manually or via
an update profile.
Sanity Checks
When you click OK, Pointsec PC performs a number of ‘sanity checks’ on
the profile that you want to save. The Settings That Might Have Undesirable
Effects window displays the results of the sanity checks, for example:
Figure 7-21
The following ‘sanity checks’ are performed on the profile:
•
Does at least one account have access to the Management Console?
At least one user account with access to the Management Console is
required to be able to perform administration on the machine.
•
Are there any accounts in the profile for which no type of
authentication has been defined?
This warning occurs only when you create a profile ‘based on local
settings’. You must manually set the authentication:
1. Right click each user in the tree structure.
2. Select Name and Authentication.
118
Creating an Installation Profile
3. Define the authentication details.
•
Do you really want Windows Integrated Logon enabled on this
machine?
Windows Integrated Logon bypasses all preboot authentication.
•
Is at least one user account defined in this installation profile?
If no user accounts are defined in the profile, no user account will be
able to log on to the machine on which Pointsec PC is installed with
this profile.
•
Do at least two user accounts in the profile have permission to create
recovery media?
Recovery media cannot be created, and the system cannot be
recovered, unless at least two user accounts have permission to create
recovery media on the machine on which Pointsec PC is installed with
this profile.
•
Do at least two user accounts in the profile have permission to
uninstall Pointsec PC?
You will not be able to remove Pointsec PC from the machine on which
it has been installed with this profile unless the profile contains at
least two user accounts that have permission to perform uninstall.
•
Has an expiration date been set for each temp user account in the
profile?
Usually an expiration date should be defined for each temp user
account. If this is not the case, you will be warned about each temp
user account that does not have an expiration date defined.
To make changes to settings that have caused a warning in the Settings
That Might Have Undesirable Effects window:
1. Click Cancel and alter the relevant setting or settings.
Each time you click OK the sanity checks are performed, and any
warnings of problematic settings will be displayed. If none of the sanity
checks produce a warning, the profile is created.
2. If you want to accept the settings that cause the warnings, click OK in
the Settings That Might Have Undesirable Effects window, and the profile
will be created with the problematic settings.
And when the profile is created, it is prepopulated with the local System
Settings of the machine on which the profile was created. If any of these
values have not been set on the local machine, the Pointsec PC default
values will be used. It is good practice to examine the System Settings in
the profile and make any required changes.
Chapter 7
Working with Installation and Update Profiles
119
Creating an Installation Profile
Figure 7-22
Creating Groups and User Accounts in the Profile
The next step is to create groups and user accounts in the profile you have
created.
To create groups and user accounts:
1. At the profile symbol in PCMC Remote, double click the profile, create
groups, and create user accounts.
2. Define a group that contains at least two administrator user accounts.
3. Best practice: Create another group in which you define a temporary
user account. It is preferable to work with group settings rather than
with individual user account settings.
Note - There are two reasons a specific group must be created for the
temporary user:
•
The settings should be completely separate from those of the
administrator accounts.
•
This group can be used to delete user accounts created with a
temporary user account. For instructions on doing this, see
“Deleting user accounts created with a temporary user account”
on page 121.
Which Settings Should Be Defined?
4. Examine the default settings in the installation profile and decide if
they are to your satisfaction:
120
•
System Settings
See Chapter 2, “Configuring System Settings” for a description of
these settings. If not, change the settings to the desired values.
•
Group settings for the Administrator group
The permissions for this group (XREF to permissions tables) and
note that Administrators probably have stricter rules for passwords
than normal user accounts do.
•
Group settings for the group containing the temp user.
Creating an Update Profile
The profile is now ready.
Deleting user accounts created with a temporary user account
To delete user accounts created with a temporary user account:
1. Create an update profile based on the install profile containing the
temporary user account, based only on Groups.
2. Open the update profile for editing and remove all groups except the
one that contains the temporary user.
3. Mark the only remaining group for removal.
4. Save the profile by clicking OK.
5. Place this profile in the Update folder on the client machine from
which you want to remove the user account.
Note - Do not place the profile in the Publish Profile directory because
this will cause the deletion of all user accounts created with the
temporary user account.
Deploying Smart Card Drivers Together with Smart Card User
Accounts in Installation Profiles
When creating smart card user accounts via installation profiles, it is
important that the required smart card drivers exist on the machine prior
to logon. This is necessary if smart card user accounts are to be able to log
on directly at first-time authentication.
To install smart card drivers at the same time as Pointsec PC is installed:
1. Add the Driver setting to the precheck.txt file. Specify each driver file
name if more than one driver is involved, separating the file names
with semicolons (no spaces are allowed). Below is an example in which
the smart card driver files msc_p11.bin and prd_ccid.bin are specified:
Drivers=msc_p11.bin;prd_ccid.bin
Creating an Update Profile
An update profile is used to change the settings on a system that has
already been installed.
You can either create an update profile from scratch or based on an
already existing installation or update profile.
An update profile contains only the changes you want to make to the target
installation(s). For example, if you want to change only one setting, you
specify only that setting.
Chapter 7
Working with Installation and Update Profiles
121
Difference between Remove and Mark for Removal
Difference between Remove and Mark for Removal
Remove
Remove deletes all data regarding the user or group in the profile. If you
deploy this profile, it will not affect the users or groups you just removed
because there is information left in the profile regarding these users or
groups.
Mark for Removal
When marking a group or user account for removal, the group or user
remains in the profile and acts as a container for sending the information
to remove the group or user on the machine(s) the profile is deployed to.
Summary of Differences
Mark for Removal is used to remove things at remote machines; in other
words, all the information about the user or group is in the profile because
it has to be sent to the client(s) where it will remove the user or group. The
information must be sent to the client, so it is designated as “Mark for
Removal” to signify to the admin that this user or group will be removed
on the client machine(s).
Remove simply removes data from the profile, and is a way to edit the
contents of a profile. You might have five groups, and want to update a
setting for only one of the groups. In this case, you could remove the four
groups you do not want to affect, leaving only the group you want to
change in the profile.
Uninstall Profiles
A uninstall profile cannot be edited, and requires authentication by two
administrator user accounts.
The machine on which you create the uninstallation profile must contain at
least two system administrator accounts that are also on the clients you
want to uninstall. To complete the creation of the uninstall profile,
Pointsec PC prompts for the authentication of two system administrators
before the profile is created (these two system administrator accounts
must also exist on the client).
122
Ensuring that Administrator Accounts Exist on Both the Admin Machine and all Client Machines
Ensuring that Administrator Accounts Exist on Both
the Admin Machine and all Client Machines
Pointsec PC 6.0 creates unique user accounts. Even if you define a user
account with the same name on two different machines, these are actually
two different accounts in that they have the same user account name but
unique GUIDs, which means they are unique user accounts (In
Pointsec PC 6.0, a GUID is the internal user account ID).
Keeping track of which administrator user accounts are defined on which
machines can be of critical importance. This is illustrated in the following
example of a scenario involving installing Pointsec PC and subsequently
attempting to uninstall it from a machine using an uninstallation profile.
Manually Installing Pointsec PC on the Admin
Machine
Manually install Pointsec PC on what will be called the admin machine. In
the process of installing Pointsec PC you will have defined two
administrator user accounts, let us call them Admin_A and Admin_B.
To create an installation profile:
1. On the admin machine, create an installation profile, which you will
use to deploy Pointsec PC to 100 client machines.
2. In the installation profile, define two administrator user accounts,
Admin_C and Admin_D. These administrators are authorized to
authenticate the uninstallation of any of the 100 clients that will have
Pointsec PC installed on them via this installation profile.
3. Deploy the installation profile to the 100 client machines, and assume
that Pointsec PC is installed on the 100 client machines.
4. Create an uninstallation profile that you will use to remove Pointsec PC
from one machine. In the process of creating the profile, the two
administrator accounts on the admin machine, Admin_A and Admin_B,
must authenticate the uninstall profile.
5. Deploy the uninstallation profile to the machine from which you want
to uninstall Pointsec PC. You will see, however, that Pointsec PC is not
uninstalled from the machine.
Why Pointsec PC is not uninstalled
Pointsec PC is not uninstalled from the target machine because the client
machines were installed with an installation profile that included Admin_C
and Admin_D. When the target machine checked the uninstallation profile,
which was created on the admin machine, it finds that it was
authenticated by Admin_A and Admin_B, two administrators who are
unknown to the target machine (which knows of only Admin_C and
Admin_D). For this reason, the profile is not activated on the target
machine.
Chapter 7
Working with Installation and Update Profiles
123
Deploying Pointsec PC Using an Install Profile
You might think that you can define Admin_A and Admin_B on the target
machine via an update profile. But what this will result in is the creation
of two user accounts named Admin_A and Admin_B on the target machine,
but although these accounts have the same name as the accounts on the
admin machine, the accounts on the target machine had GUIDs that are
different from those of the Admin_A and Admin_B accounts on the admin
machine.
Ensuring that the Required User Accounts are on
the Machines that Require them
To get the relevant user accounts on the machines that require them:
Alternative 1
1. Install Pointsec PC on the admin machine.
2. Create the installation profile you will use to install Pointsec PC on the
client machines.
3. Create an update profile based on the installation profile used to
install on the client machines, including Admin_A and Admin_B in this
update profile. Thus, Admin_A, Admin_B, Admin_C, and Admin_D will be
on the admin machine and Admin_C and Admin_D will be on the client
machines.
4. Update the admin machine using the update profile created in the
previous step.
Alternative 2
1. Install Pointsec PC on the admin machine.
2. Create the installation profile that you will use to install Pointsec PC
on the client machines.
3. Uninstall Pointsec PC from the admin machine.
4. Use the installation profile created above to install Pointsec PC on the
admin machine after adding Admin_A and Admin_B to the profile. Now
Admin_A, Admin_B, Admin_C, and Admin_D are in the admin machine
and Admin_C and Admin_D are on the client machines.
Deploying Pointsec PC Using an Install
Profile
This section explains how to deploy Pointsec PC using a login script.
You can initiate a Pointsec PC silent install profile from any computer that
can map a drive and run an executable file.
124
Deploying in an MSI Package
To deploy Pointsec PC:
1. Copy the contents of the SetupFiles directory on the Pointsec PC CD
to the Install directory that contains the install profile.
Note - In order for installation, recovery, and updates to function
correctly, user accounts on Pointsec PC-protected computers must have
RX permissions to the entire Pointsec PC directory structure to handle
temporary information and updates.
2. Create and distribute the following login script to the computers on
which you want to install Pointsec PC:
If Not Exist %homedrive%\progra~1\Pointsec for PC\pscontrol.exe
goto Install
Exit
:Install
start \\[servername]\[installdirectory]\msiexec.exe /i "Pointsec
for PC.msi" /q
exit
The next time the users log in and the script runs, Pointsec PC will be
installed with the settings you have configured in the install profile and
the computers will be Pointsec PC protected.
Note - In order to log error information from a failed installation, the
user executing the script also needs rights to create folders and files in
the Install directory.
Local administrator permissions are required in order to install.
Deploying in an MSI Package
Note - When Pointsec PC is installed on a client using deployment
software such as SMS or Tivoli, the service that runs the msi.exe must
be run as LOCAL_SYSTEM, and the service must have “Interact with
desktop” activated. If the service is run as a normal user account, the
installation will fail.
Windows XP
If you are deploying Pointsec PC on Windows XP: the Pointsec PC MSI
package can be started using
msiexec.exe /i "Pointsec for PC.msi".
Chapter 7
Working with Installation and Update Profiles
125
Verifying a Pointsec PC Deployment
The following parameters are supported:
Table 7-1
Supported parameters
Parameter
Explanation
/i
Installation
/x
Uninstallation
/L
Logs installation information
/q
Silent installation
Note - Pointsec PC does not support any other parameters, transforms
or modifications to the .msi package!
Windows Vista
Windows Vista requires higher admin rights than Windows XP when
installing. You do not have these higher rights automatically even if you are
logged in as administrator on Vista, and therefore you cannot start the
msi-file in the same way as on Windows XP. However, these rights have
been added to the autorun.exe so if you run the autorun.exe it will
generate an msiexec command line with the correct rights.
You can use the same parameters for the autorun file as for the msi-file.
The parameters you use for the autorun file will automatically be added to
the msiexec command, for example:
the command
autorun.exe /install=q
generates the command line
msiexec /i "Pointsec for PC.msi" /q
Verifying a Pointsec PC Deployment
When you have deployed Pointsec PC on the clients, it is important to
verify that Pointsec PC has been installed and that the clients’ volumes
have been encrypted.
1. Verify the deployment by checking the text files found in the
predefined Log directory/directories on the file share(s).
One text (.txt) file for each client machine is created in the Central Log
directory if the System Settings → Install → Enable status export to file
checkbox has been selected in the profiles. The text file tells you if
Pointsec PC has been installed, which volumes have been encrypted
126
Running Pointsec PC as a Service on a PC
(provided that the client machine actually has been encrypted), and if
a recovery file has been created for the specific client machine. The
text files contain the client machine’s name in the file name, for
example:
london_office_pc_1.txt, london_office_pc_2.txt,
london_office_pc_3.txt and so on.
2. Check the recovery (.rec) files found in the predefined Recovery
directory/directories on the file share(s). The number of recovery files
should correspond to the number of clients deployed; that is, there
should be 200 recovery files in the directory/directories if Pointsec PC
was deployed to 200 clients. Each recovery file is identified with the
client machine’s name in the file name, for example:
london_office_pc_1.rec, london_office_pc_2.rec,
london_office_pc_3.rec and so on.
Running Pointsec PC as a Service on a PC
The Pointsec Service Start service allows system administrators to limit
user access to the Pointsec network share and the respective recovery,
update profile and software update directories. Authentication to the share
is made with the account assigned to the Pointsec Service Start service.
For more information, see Chapter 10, “Using a Service Start Account” on
page 149.
Note - This documentation does not cover permissions required to
install Pointsec PC from a network share.
Pointsec Service Start Service Account Specifics
The account assigned to the Pointsec Service Start service must be a
domain or Microsoft Active Directory account in order to allow the service
to authenticate across the client systems and file share properly.
It is also strongly recommended that this account be treated as a service
account, not a normal user account. Additional specific authorization and
restrictions (enforced by Group Policy Objects [GPOs] or system policies)
should be applied to the service account.
A strong and lengthy password is also recommended to secure this service
account.
Chapter 7
Working with Installation and Update Profiles
127
Pointsec Service Start Service Account Specifics
General Requirements
On the Local PC
•
The logged-on user account requires List, Read, Write, Execute, Modify
and Delete permissions to the local Pointsec program folder, generally:
C:\Program Files\Pointsec.
•
The logged-on user account requires full permissions to the Pointsec
registry items on the client PC, generally:
HKEY_LOCAL_MACHINE\SOFTWARE\Pointsec Mobile Tech\Pointsec.
•
The account configured as the Pointsec Service Start account requires
List, Read, Write, Execute and Modify permissions to the local
Pointsec program folder, generally: C:\Program Files\Pointsec.
•
The account configured as the Pointsec Service Start service must be a
member of the Administrator group on the local PC.
•
The account configured as the Pointsec Service Start service account
requires full permissions to the Pointsec registry items on the client
PC, generally: HKEY_LOCAL_MACHINE\SOFTWARE\Pointsec Mobile
Tech\Pointsec-
On the Network share
•
The user account logging on to the local client PC requires no
permissions on the network share once service is configured.
•
The account configured as Pointsec Service Start requires full control to
the network share.
What does the Pointsec Service Start Service do?
Once the Pointsec Service Start service is configured, it handles:
•
Creation of recovery file
•
Download of update profiles placed in the update path
•
Download of system upgrade package (patch files)
Limitations
Computer-specific Update Profile Folder
A computer-specific update profile folder is not created in the update
profile path, since this is not done via the Pointsec Service Start service
but by a process running in the user context (currently).
Note - If the folder is created manually, it will be used as normal.
128
Creating and Deploying Update Profiles
Software Updates
Software updates are downloaded and completed on the local PC, but the
upload of the log files from the update is not transferred, since this is not
done via the Pointsec Service Start service but by a process running in the
user context (currently).
Workaround possibility
In this scenario it is possible that a package can be written for provision
through a login script or systems management tool that executes
C:\Program Files\Pointsec\PpupdLog.exe with a Run As operation, where
the user account has the necessary rights to the Pointsec file share.
Example of Setup
The following is an example of the setup:
1. Create a domain-wide account (hereafter called ServiceAccount) that all
client PCs within the organization can use (e.g., added to the Power
Users on each machine via GPO). This account also needs to be
present on the local machines with the permissions described above.
2. Create a network share and assign full permission on the share,
including sub-folders and content to the ServiceAccount. Other
permissions can be set as desired.
3. Install Pointsec.
4. Set the Pointsec Service Start service to log on with the
ServiceAccount.
If configured correctly, the creation of recovery file, download of
update profiles and download of software upgrades is now performed
via the account assigned to the Pointsec Service Start service.
Note - If you are installing by means of an install profile, the Pointsec
Service Start service can be configured prior to rebooting the system
when completing the installation.
Doing so should avoid a possible -2 error when logging on (caused by
limited permissions for the logged-on user to the recovery folder).
Creating and Deploying Update Profiles
You can easily update security settings on Pointsec PC-protected
computers by creating and deploying an update profile. The best way to
create an update profile is to edit the original install profile and save it as
an update profile.
Chapter 7
Working with Installation and Update Profiles
129
Creating an Update Profile
Creating an Update Profile
To create an update profile:
Working with Accounts in an Update Profile
You can add, edit and delete group and user accounts on a
Pointsec PC-protected computer by configuring accounts in an update
profile.
Editing and Deleting Accounts in an Update
Profile
To edit or delete an account:
Deploying an Update Profile
Note - All computers on which you want to update Pointsec PC must
have read and execute permissions to the Update directory.
Pointsec PC-protected computers check for update profiles every three
hours, or if the computer is not connected to the network, the next time
the user next logs on to the network.
Deploying an Update Profile to a Specific
Computer
The first time a Pointsec PC-protected computer retrieves an update
profile, it creates a unique folder in the update profile path.
Whenever you need to deploy a specific update profile to the computer,
you can do so by placing the profile in this folder.
Pointsec PC uses the name of the computer as the folder name.
Pushing Update Profiles to Computers
If you want a Pointsec PC-protected computer to search for an update
profile outside the set interval, you can achieve this by using Pointsec PC’s
Push feature. This feature enables updates to be imported even if the
computer goes off-line once the update has been placed on the system.
To push an update profile:
1. On the local system, create the sub-folder Work in the Pointsec folder,
e.g. C:\Program Files\Pointsec\Work.
130
How does the Update Profile Affect a Logged-on User?
Pointsec PC checks if the Work folder is present on the local system.
If Pointsec PC finds an update or software update profile in the Work
folder, Pointsec PC verifies that the update is new, imports it and
deletes the update from C:\…\Pointsec\Work.
The import is completed within 10 seconds. Pointsec PC then
continues using the normal update interval as specified.
How does the Update Profile Affect a Logged-on
User?
If an update profile affects the logged-on user, Pointsec PC will execute
the new settings in one of two ways. Depending on the settings, they will
be implemented either immediately or the next time the user logs on after
rebooting the computer.
If the update profile contains a deletion of the logged-on user, this will be
implemented immediately and Pointsec PC will lock the keyboard and start
the screensaver so as not to allow the user access to the system.
Note - On Windows NT/2000/XP, Pointsec PC will display an additional
warning informing the user of what has happened.
Chapter 7
Working with Installation and Update Profiles
131
How does the Update Profile Affect a Logged-on User?
132
8
Chapter
Upgrading Pointsec for PC 4.x
and 5.x Installations
Upgrading is the process of replacing one version of software with a newer version of
that software.
This chapter describes how a 4.x or 5.x version of Pointsec for PC can be replaced
with Pointsec PC 6.2. Note that versions 4.x and 5.x are often called legacy versions
below.
For details on upgrading from Pointsec for PC 6.x.x to Pointsec PC 6.2, see
“Upgrading from Pointsec for PC 6.x.x to Pointsec PC” on page 145.
Overview
The (legacy) Pointsec for PC 4.x or 5.x functionality is used to perform the upgrade to
Pointsec PC 6.2. This means that the upgrade of legacy clients is performed by
distributing/deploying “upgrade packages” to the 4.x/5.x Directory path for software
upgrades or to the Pointsec/Work folder on the client computers.
Note - It is not possible to perform an update by executing the
Pointsec PC MSI package.
During the upgrade of a Pointsec for PC 4.x/5.x version to Pointsec PC 6.2 the
following things should be noted:
•
Protection of volumes is retained.
•
Legacy user/group and system settings are discarded.
•
Legacy user accounts can be kept or upgraded.
133
Overview
•
Upgraded legacy users keep their names and status. For example,
legacy accounts that are locked will be locked after upgrade.
•
User credentials are upgraded for legacy password and dynamic
token accounts. The credentials for legacy smart card accounts
cannot be upgraded, and these accounts are therefore converted
during upgrade.
•
An Upgrade profile is used to control the upgrade. Via the profile it
is possible to:
•
Configure which legacy accounts that shall be preserved during
upgrade.
•
Add new user accounts and groups.
•
Specify the System Settings, Group settings, and User Account
settings that will be set in the upgraded installation.
Remote Help
Upgraded legacy accounts can be used to provide Remote Help, but
upgraded legacy accounts that use a fixed password to authenticate must
have successfully logged on once before they will be able to provide
Remote Help on the upgraded system. Therefore, it is recommended that
you always include in the upgrade profile at least one user that is able to
provide Remote Help.
Conversion of Special Legacy Accounts
During upgrade, legacy TEMPSERVICEUSER users are converted to
“service user”-type accounts, see “Pointsec PC Service Start Account and
the Recovery File” below.
Smart Card Accounts
During upgrade, smart card accounts are either removed or converted to
temporary smart card accounts/fixed password accounts with a password
specified by the upgrade profile. If temporary smart card accounts are
used, the users must re-associate the smart card at Windows logon.
Recovery File
During the upgrade, a recovery file for the upgraded version is created and
stored in the Recovery path. If the creation of this file fails, the upgrade is
aborted.
Pointsec PC Service Start Account and the Recovery File
If a Pointsec PC service start account is configured in the upgrade profile,
it will be used to store the recovery file in the Recovery path.
134
From Which Legacy Versions Can You Upgrade?
During upgrade, the Pointsec Service Start Service in the 4.x/5.x version of
Pointsec PC, and information about the account configured to run the
service, will be removed. Consequently the 4.x/5.x version of the Pointsec
Service Start Service will not be used for recovery file handling during or
after upgrade.
From Which Legacy Versions Can You Upgrade?
You can upgrade to Pointsec PC 6.2 from the following legacy versions:
•
Pointsec for PC 4.1 sr 2.14 or later
•
Pointsec for PC 4.2 sr 1.4 or later
•
Pointsec for PC 4.3
•
Pointsec for PC 5 x.x
Requirements for Upgrading a 4.x/5.x Client
The following requirements must be met to upgrade a Pointsec for PC
4.x/5.x client:
•
Upgrade from the installed 4.x/5.x version must be supported (see
above).
•
Encryption on the client computer to be upgraded must be completed,
that is, no encryption may be in progress on that computer.
•
The currently logged in user must have access to all protected
volumes.
•
Upgrade is not supported on computers to which USB hard disk drives
or USB flash drives are attached.
The Process of Upgrading
The Pointsec PC administrator should perform the following operations to
upgrade the product on the clients:
1. Install Pointsec PC 6.2 on a machine; this is referred to as the ‘master
installation’.
The master installation is used to create upgrade profiles and to
construct an upgrade package.
2. Create the upgrade profile that will be used for this upgrade.
Before creating the upgrade profile, the central administrator must do
an inventory of the legacy accounts, legacy groups, and the legacy
settings that exist on the clients. The information collected in the
inventory will enable the central administrator to create an upgrade
profile that will upgrade the clients correctly. This inventory must be
performed manually.
Chapter 8
Upgrading Pointsec for PC 4.x and 5.x Installations
135
The Characteristics of an Upgrade Profile
3. Create the upgrade package via the upgrade wizard, which can be
accessed in the PCMC at Remote → Create 4.x/5.x Upgrade Package.
4. Deploy the upgrade package, if this has not been done via the wizard.
5. Check the progress of the upgrade on the clients by monitoring the
central log file directory for the log files from the upgraded clients.
6. Restart the upgrade on the clients on which it has failed.
Most of these steps are explained in detail below.
The Characteristics of an Upgrade Profile
Settings That Are Specific to Upgrade Profiles
Upgrade profiles are similar to installation profiles, but they are unique in
having the following settings (found under Groups → ... → Group Settings
→ Upgrade, see Figure 8-1, below):
•
Choose Upgrade Action.
•
Choose How To Convert Upgraded Legacy Smart Card Accounts.
•
Set Password for Converted Legacy Smart Card Accounts.
•
Limited Volume Access Accounts
•
Default Legacy Group
Note - Upgrade profiles do not have volume protection settings because
the protection is inherited from the legacy installation.
Upgrade Settings
Figure 8-1
136
The Characteristics of an Upgrade Profile
The following Upgrade settings are found under Group Settings:
Table 8-1
Upgrade settings
Text
Explanation
Choose Upgrade Action
This setting determines how legacy accounts matched
by the group/account will be upgraded. The following
values can be set for groups and for legacy accounts:
•
•
•
Choose How To Convert Upgraded Legacy
Smart Card Accounts
Ignore = Legacy account(s) are ignored (handled
by default group for authority level)
Upgrade = Upgrade legacy account(s) and utilize
settings for matching group.
Remove = Remove legacy account(s).
Credentials for legacy smart card accounts cannot be
upgraded, so they must be converted during upgrade.
This setting determines how to convert these
accounts. Note that this parameter has no effect
unless the parameter 'Legacy accounts handling' is set
to ‘Upgrade’.
•
•
•
Remove
Convert to temporary smart card accounts
Convert to fixed password account
Set Password for Converted Legacy Smart
Cart Accounts
Set the password for the legacy smart card accounts
that, during upgrade, will be converted to temporary
smart card accounts or password accounts.
Limited Volume Access Accounts
Specifies the action that will be taken when accounts
without access to all volumes are found.
•
•
Abort Installation
Remove legacy accounts
Default Legacy Groups
In an upgrade profile, a group can be marked as Default Legacy Group for
one or several legacy authority levels (Sysadmin, Admin, and User). This is
done by right clicking the group and selecting Default legacy group.
A legacy user is primarily upgraded according to the settings specified for
a group (in the upgrade profile) whose name is the same as the legacy
group to which the legacy user belongs. If no group name in the profile
matches the user’s legacy group name, the user is upgraded according to
the settings for a group designated the Default legacy group for the user’s
authority level. If no Default legacy group is found, the user is removed.
Chapter 8
Upgrading Pointsec for PC 4.x and 5.x Installations
137
The Characteristics of an Upgrade Profile
Legacy Accounts
Legacy accounts are added to profiles for two purposes:
1. To specify a specific upgrade action for an account in a legacy
installation.
2. To enable management on user-account level for individual upgraded
accounts.
3. You can add legacy accounts to the upgrade profile. But for legacy
accounts, you can specify only the legacy user account name, and set
the Upgrade Action (and implicitly the group membership).
The Two Types of Upgrade Profile: Silent and
Interactive
Update profiles can be either silent or interactive. You choose whether you
want to create a silent or an interactive profile in the PCMC’s New Profile
wizard. The profile type determines whether the upgrade will be interactive
or silent.
Recommendations
The following recommendations apply to upgrade profiles:
•
All legacy users can be preserved during upgrade. However, we
recommend that legacy users with the authority level User are
upgraded and that legacy users with the authority level Admin and
Sysadmin are removed and replaced with new user accounts.
With this approach, all information (including credentials) related to
the administrative accounts is available in the PCMC. This enables you
to create installation/update profiles with the same administrative
accounts and thereby unify the configuration of clients with different
backgrounds (upgraded from 4.x/5.x or the direct installation of 6.x).
Note that an upgrade profile can be based on an installation/update
profile and that you thereby can achieve this effect in reverse order.
138
•
The upgrade profile should contain at least one new account with the
authority level and permissions required to perform Remote Help for all
users.
•
The Update Profile Path, Recovery Path, Central Log Path, and
Upgrade Path specified in the upgrade profile should be different from
those used for the 4.x/5.x versions.
•
The parameter Limited volumes access should be set to Abort
installation. If the setting Remove accounts is used, the following
scenario will result in one or several volumes not being upgraded
correctly:
•
A user with access to all volumes is logged on to Pointsec PC.
•
Upgrade is performed in the Windows environment, and the
computer is restarted.
Configuring an Upgrade Profile
•
Another user with limited volume access logs into the legacy PPBE.
•
Upgrade is done on all volumes to which that user has access. The
other volumes are not accessible and therefore cannot be
upgraded.
Configuring an Upgrade Profile
An upgrade profile can be based on:
•
Local settings
•
An update profile
•
An installation profile
When you create a new upgrade profile that is not based upon local
settings or on another profile, the new upgrade profile will contain three
groups: Sysadmins, Admins, and Users. Each of these groups has the
Default legacy group setting for the corresponding legacy authority level.
Note that the default groups can be renamed and removed in the same
way any other normal group can be.
Sanity-Check Warnings Related to the
Configuration of an Upgrade Profile
In addition to the warnings relevant for installation profiles, the following
situations trigger warnings for upgrade profiles:
•
No new account has been specified in the upgrade profile.
•
No default group exists for one or more of the legacy authority
levels.
•
The group authority level for the legacy sysadmin default group is
lower than the group authority level for legacy admin default group.
•
The group authority level for the legacy admin default group is
lower than the group authority level for legacy user default group.
Errors Related to the Configuration of an Upgrade
Profile
In addition to errors relevant for installation profiles, the following
situations trigger errors for upgrade profiles:
•
The setting, Upgrade Action, has been assigned the value Ignore
for a group that is a default group for a legacy authority level.
Legacy Account Handling
How legacy accounts are upgraded is determined by the contents of the
upgrade profile and by the following four legacy parameters for the
account:
Chapter 8
Upgrading Pointsec for PC 4.x and 5.x Installations
139
Upgrade Operations
•
Legacy account name
•
Group name
•
Authentication method
•
Authority level
Analysis of Legacy Accounts
During upgrade, the upgrade profile and these parameters are analyzed to
determine whether the account will be upgraded or removed.
Remove: The account is removed and will not be present in the upgraded
Pointsec PC installation.
Upgrade: The account is retained during upgrade, and it becomes a
member of one of the groups specified in the profile. The account will
receive the settings specified for the group in the upgrade profile.
The analysis that attempts to match a legacy account to an user account in
the upgraded system is primarily based on the legacy account’s group
name and secondarily based upon its authority level.
Upgrade Operations
This section describes how specific upgrade operations can be performed
via upgrade profiles.
Upgrading All Legacy Accounts in a Legacy Group
To upgrade all the accounts in a legacy group, define the group in the
upgrade profile and set the Upgrade Action to Upgrade.
Removing All Legacy Accounts in a Legacy Group
To remove all accounts in a legacy group, define the group in the upgrade
profile and set the Upgrade Action to Remove.
Removing All Legacy Accounts
To remove all legacy accounts, set the Upgrade Action to Remove in all
groups. Note that in this case new accounts must be added via the
upgrade profile.
Removing/Upgrading a Specific Legacy Account in a Legacy Group
Create a legacy account in the upgrade profile with the same name and
group as the account and set Upgrade Action to Remove/Upgrade.
Creating the Upgrade Package
To create the upgrade package, use the upgrade wizard, which you will find
in the PCMC.
140
Upgrade Operations
1. Select Remote in the folder tree to the left:
Figure 8-2
PCMC Remote
2. Click Create Upgrade Package, and the wizard opens. Then click Next.
Figure 8-3
Input File information
Chapter 8
Upgrading Pointsec for PC 4.x and 5.x Installations
141
Upgrade Operations
The Create Upgrade Package window contains the following information:
Table 8-2
Create Upgrade Package Information
Text
Explanation
Select directory
containing the Pointsec
PC installation package
The directory that contains the installation package for version of
Pointsec PC to which the clients will be upgraded.
Use the serial number
of the local installation
Clients accept only upgrade packages that have been created with
their current serial number. If the serial number used on the local
machine is identical to the serial number used by the clients, the Use
the serial number of the local installation checkbox can be selected.
Serial number currently
used by clients
Clients accept only upgrade packages that have been created with
their current serial number. If the serial number used on the local
machine is not identical to the serial number used by the clients,
enter the serial number used by the clients in the text box.
Algorithm
Select the algorithm Blowfish/CAST or AES/3DES used by the clients
that will be upgraded.
Upgrade profile
The upgrade profile to be used in the upgrade package.
3. Click the ... button, and browse to the directory that contains the
installation package for version of Pointsec PC to which the clients will
be upgraded. Select that directory. Some of the files used in the
upgrade package are located in the Pointsec PC installation package,
that is why it needs to be selected.
4. If the serial number used on the local machine is identical to the serial
number used by the clients, select the Use the serial number of the
local installation checkbox. If the serial number used on the local
machine is not identical to the serial number used by the clients, enter
the serial number used by the clients in the Serial number currently
used by clients field.
5. Select the algorithm, Blowfish/CAST or AES/3DES, that will be used by
the clients that will be upgraded.
6. Using the ... button, browse to and select the profile to be used in the
upgrade package. Then click Next.
142
Upgrade Operations
Figure 8-4
Upgrade package summary
7. If satisfied with the package information summary, click Finish.
Figure 8-5
Upgrade package
The actual package created will be similar in structure to the package
shown above.
Deployment
The upgrade package is deployed by copying it to the 4.x/5.x Directory
path for software upgrades or to the Pointsec/Work folder on the client
computers.
Error Handling and Logging
All major upgrade actions that are performed and any error that occur
during upgrade are logged in a clear text log: Upgrade_[computername].log.
During upgrade, the file is stored in the update folder in the Program
files.../Update folder. If the upgrade fails, the file is uploaded to the
“Directory for software upgrades”. If the upgrade is successful, the files is
stored in the [Documents and Settings/All Users/Application
Data/Pointsec/Pointsec for PC...] directory. This file contains valuable
information for tracing upgrade problems.
Chapter 8
Upgrading Pointsec for PC 4.x and 5.x Installations
143
Upgrade Operations
Restarting the Upgrade
Upgrade can be restarted in two ways. The first solution is the
recommended way to restart, while the other way can be considered a
fall-back solution when the first solution does not work:
Solution 1:
•
Create a new upgrade package via the PCMC.
•
Distribute the upgrade package to the clients’ Software update
directory/work folders.
Solution 2:
•
Clear the registry values PatchLast and PatchNetLast in key
HKEY_LOCAL_MACHINE\SOFTWARE\Pointsec Mobile
Tech\Pointsec on the clients.
•
Remove the files in C:\Program Files\Pointsec\Update on the
clients.
•
Distribute the upgrade package to the clients’ Software update
directory/work folders.
Recovery
Most of the upgrade operations are performed in Windows. However, to
finalize the upgrade, the system must be restarted and the user must
authenticate once in the legacy PPBE. If the upgrade fails after restart,
recovery must be performed on the system. Depending upon the progress
of the upgrade process, recovery is performed via a recovery media for the
legacy installation or/and the upgraded installation.
If the upgrade fails after restart, and the system becomes inaccessible;
perform the following steps:
1. Create recovery media for the legacy version.
2. Create recovery media for the upgraded version (that failed).
3. Attempt recovery using the legacy recovery media on all volumes. Pay
close attention to error messages that the recovery program displays.
You can, however, ignore the “Simulated boot record differs” error
message. This message depends on how the upgrade is carried out,
and the problem can be fixed using the recovery media for the
upgraded version.
4. Attempt recovery with the recovery media for the upgraded version and
perform “Recover all”.
5. Attempt to boot the system.
144
9
Chapter
Upgrading from Pointsec for
PC 6.x.x to Pointsec PC
This chapter describes how to upgrade Pointsec for PC 6.x.x installations to
Pointsec PC.
Upgrading from 6.x.x to 6.2
You can upgrade from Pointsec for PC 6.x.x to Pointsec PC 6.2 by running
Msiexec.exe. At the same time, if you wish, you can also change the graphic images
displayed in preboot.
Before Upgrading
Permissions Required to Run Upgrade
Upgrading requires the permissions needed to install msi packages on the local
machine. By default, the Pointsec for PC.msi program installs the upgrade using the
Local System account, which has the required permissions.
Changing the Graphic Images Displayed in Preboot
Before you perform the upgrade, you can change the following from the Pointsec PC
graphic image to, for example, your company’s logo:
•
Banner displayed in preboot
•
Background image displayed in preboot
•
Preboot screen saver image
145
Performing the Upgrade
To change the graphics displayed in preboot authentication:
1. Create a folder named oemvar in the folder that contains the Pointsec
for PC.msi file:
FIGURE P-1
2. Add the relevant files (described below) to the oemvar folder. During
upgrade, the files that have been added to this folder will be registered
as the files to be displayed during preboot.
Table 9-1
Files to add to oemvar folder
Filename
Description
Specifications
Banner.jpg
Banner displayed in preboot. Jpeg
images created with Photoshop 3.0
cannot be used.
447w * 98h
Desktop.jp
g
Background image displayed in
preboot. Jpeg images created with
Photoshop 3.0 cannot be used.
800w * 600h
Scrsvr.jpg
Preboot screen saver image. Jpeg
images created with Photoshop 3.0
cannot be used.
260w * 128h
3. Perform the relevant upgrade procedure as described in “Performing
the Upgrade” on page 146.
Performing the Upgrade
Note - When upgrading, the 1_Pointsec for PC folder (from the
Pointsec PC CD-ROM) must be deployed intact; that is, it must be
deployed with its contents as is - none of the subfolders or files should
be deleted or moved. Elements can be added to 1_Pointsec for PC as
long as the original content is intact, and, for example, precheck.txt
can be edited.
146
Performing the Upgrade
Note - Do not use copy and paste to enter the text shown in the
following instructions into the command prompt as this can alter the
double quotes, which will cause the command to fail.
Automatic Reboot
It is possible to set up an automatic reboot after the upgrade’s silent
installation. Note, however, that this might come as an unpleasant surprise
to end users currently working on these machines if they are not aware
that their machines will reboot without warning.
If you wish to upgrade without automatic reboot, see the instructions
below.
Manual Reboot
During the upgrade, the following upgrade log is maintained:
C:\Documents and Settings\All Users\Application
Data\Pointsec\Pointsec for PC\Upgrade.log
When a silent installation has completed successfully, an Upgrade Done
entry is written to the upgrade log. When you see this entry in the log, the
machine can be rebooted.
By default, all users have full permissions to the directory that contains
the upgrade log. If you experience problems writing or accessing the log,
check with your administrator to determine whether the default
permissions have been changed.
Smart Card Drivers Are Updated
When an upgrade is performed, the smart card and smart card reader .inf
files in the new installation are registered. The old entries are retained
unless they are replaced by new entries in the new .inf files. Then, the
installed driver files are upgraded, but only if the checksums match those
that were updated while the drivers were being registered.
To upgrade with automatic reboot:
1. Execute Msiexec.exe as follows:
Msiexec.exe /i ”PATH_TO_MSI\Pointsec for PC.msi”
REINSTALLMODE=vomus REINSTALL=ALL /q
To upgrade with manual reboot:
1. Execute Msiexec.exe as follows:
Msiexec.exe /i ”PATH_TO_MSI\Pointsec for PC.msi”
REINSTALLMODE=vomus REINSTALL=ALL REBOOT=ReallySuppress /q
Chapter 9
Upgrading from Pointsec for PC 6.x.x to Pointsec PC
147
2. When the upgrade log shows the entry Upgrade Done, reboot the
machine.
148
10
Chapter
Using a Service Start Account
This chapter describes the Pointsec PC Service Start service. It also describes the
creation of a Windows account you assign to run the service. Together, the service and
the account allow you to strictly limit the permissions of the user accounts on client
machines while still enabling those machines to access to the file share on which
profiles, upgrades, recovery files, and log files are stored.
In a Common Criteria validated environment, users of Pointsec PC-protected
computers are allowed to have only RX permissions to the Pointsec share. This can be
accomplished by setting up a Pointsec Service Start Account in the Pointsec PC profile
deployed on computers.
This chapter provides:
•
General information on the Pointsec PC Service Start service. See “Pointsec PC
Service Start Service Program - pstartsr.exe” on page 150 for details.
•
•
Guidance in defining the Windows user account that will run the service and in
including this user account in the Power Users group. See “Defining the Windows
User Account That Will Run the Service” on page 152
•
Instructions on how to assign Log on as a service rights to this Widows user account.
Log on as a service and Manage auditing and security log rights are required for the
Windows user account to be able to run the service. See “Specifying the Service
Start Account and Password in Pointsec PC” on page 157
•
Instructions on how to specify the Windows user account in Pointsec PC so it will
be used to access the file share on which profiles, upgrades, recovery files, and
logs are stored. See “Defining the Windows User Account That Will Run the
Service” on page 152
149
Pointsec PC Service Start Service Program - pstartsr.exe
Pointsec PC Service Start Service Program pstartsr.exe
The Pointsec PC Service Start service is the pstartsr.exe program. It is
added to the Windows services when Pointsec PC is installed.
To view the service:
1. In the Start menu, right click My Computer and click Manage:
Figure 10-1
2. In the Computer Management window, click Services and Application:
Figure 10-2
3. In the same window, click Services:
150
Pointsec PC Service Start Service Program - pstartsr.exe
Figure 10-3
A list of services on the machine is displayed:
Figure 10-4
4. Right click Pointsec service start and select Properties. The Pointsec
service start Properties window is displayed:
Chapter 10
Using a Service Start Account
151
Setting up the Pointsec Service Start Account
Figure 10-5
Here you can see the service in the path to the executable listed in the
Path to executable text box. The service is PSTARTSR.EXE.
Setting up the Pointsec Service Start Account
To use the Pointsec Service Start service you must perform the following
steps, which are elaborated on the following pages:
•
Define the Windows user account and password that will run the
service.
•
Assign Log on as service and Manage auditing and security log rights to
the Windows user account that will run the service.
•
Specify the Windows account that will run the service and its password
in Pointsec PC.
Defining the Windows User Account That Will Run
the Service
To define the Windows user account that will run the service:
1. On the Control Panel, click User Accounts:
152
Setting up the Pointsec Service Start Account
Figure 10-6
2. Select the Advanced tab:
Figure 10-7
Chapter 10
Using a Service Start Account
153
Setting up the Pointsec Service Start Account
3. Click Advanced:
Figure 10-8
The Local Users and Groups window is displayed.
4. Right click Users and select New User...:
Figure 10-9
5. Enter the User name of the user account, enter a password, confirm the
password, and click Create:
154
Setting up the Pointsec Service Start Account
Figure 10-10
The Windows user account that will run the service has now been
created.
You must still assign Log on as a service rights to this user account,
and you must specify this account to Pointsec PC. Both these steps are
described below.
Assigning Log on as a service Rights to the User
Account
To assign Log on as a service rights to the user account defined via the
Control Panel:
1. On the Control Panel, click Administrative Tools.
2. In the Administrative Tools window, click Local Security Policy.
3. In the tree structure on the left side of the window, under Security
Settings/Local Policies/User Rights Assignment, click Log on as a service
and Manage auditing and security log:
Chapter 10
Using a Service Start Account
155
Setting up the Pointsec Service Start Account
Figure 10-11
4. Click Add User or Group:
Figure 10-12
156
Setting up the Pointsec Service Start Account
5. Do one of the following:
•
Enter the domain and user account name, then click OK.
•
Click Advanced, then on the Select Users or Groups window click Find
Now and select the user account you have defined to run the
service.
Figure 10-13
You still need to specify this account to Pointsec PC so it will use this
account to access the share and its directories. This is described
below.
Specifying the Service Start Account and
Password in Pointsec PC
The Windows account and password required to run the Pointsec Service
Start service must be specified for Pointsec PC in one of the following
ways:
•
PCMC
•
During a manual (local) installation
•
In an installation profile
•
On the Log on tab of the Pointsec service start Properties window
Via the PCMC
To specify the domain name and username you want to run the Pointsec
Start service account in the PCMC:
1. In PCMC, go to Local and select Edit Settings.
2. Under System Settings → Install, click Pointsec Service Start Account
Username, enter the domain and username in the Pointsec Service Start
Account Username window, and click OK:
Chapter 10
Using a Service Start Account
157
Setting up the Pointsec Service Start Account
Figure 10-14
3. To specify the password, under System Settings → Install click Pointsec
Service Start Account Password, enter the password and verify it in the
Pointsec Service Start Account Password window.
4. Click Verify and the Management Console checks whether or not you
can log on to Windows with the Windows user account and password
you have specified.
5. When you are finished, click OK.
158
Setting up the Pointsec Service Start Account
Figure 10-15
During a Manual Installation
To specify the Windows account and password during a manual
installation:
1. In the Access to network paths window, select Use a configured Windows
account for access to the network path(s):
Figure 10-16
Chapter 10
Using a Service Start Account
159
Setting up the Pointsec Service Start Account
In an Installation Profile
To specify the domain name and the username when creating or editing a
profile:
1. Under System Settings → Install, click Pointsec Service Start Account
Username, enter the domain name and the username in the Pointsec
Service Start Account Username window, and click OK:
Figure 10-17
2. To specify the password, under System Settings → Install click Pointsec
Service Start Account Password, enter the password and verify it in the
Pointsec Service Start Account Password window.
3. Click Verify and the Management Console checks whether or not you
can log on to Windows with the Windows user account and password
you have specified.
4. When you are finished, click OK:
160
Setting up the Pointsec Service Start Account
Figure 10-18
On the Log On Tab of the Pointsec Service Start Properties
Window
The Windows user account and password can be specified on the Log On
tab on the Pointsec service start Properties window. This window (but not the
Log on tab) was described above.
To specify the Windows user account and password on the Log On tab on
the Pointsec service start Properties window:
1. Select the Log On tab on the Pointsec service start Properties window.
2. Select This account: and enter a valid Windows domain and username in
the format Domain\Username, for example
Domain_A\Run_P4PC_service.
3. Enter a valid Windows password, confirm it and click OK:
Chapter 10
Using a Service Start Account
161
General Requirements
Figure 10-19
Note - If you define the Windows account and password in this way, the
account is automatically assigned Logon as service rights, which are
required to run the service. See other requirements, below.
The Windows user account can also be defined via User Accounts in the
Control Panel.
General Requirements
On the Local PC
162
•
The logged-on user account requires List, Read, Write, Execute, Modify
and Delete permissions to the local Pointsec program folder, generally:
C:\Program Files\Pointsec.
•
The logged-on user account requires full permissions to the Pointsec
registry items on the client PC, generally:
HKEY_LOCAL_MACHINE\SOFTWARE\Pointsec Mobile Tech\Pointsec.
•
The account configured as the Pointsec Service Start service requires
List, Read, Write, Execute and Modify permissions to the local
Pointsec program folder, generally: C:\Program Files\Pointsec.
•
The account configured as the Pointsec Service Start service must be a
member of the Administrator group on the local PC.
What does the Pointsec Service Start Service Do?
•
The account configured as Pointsec Service Start service requires full
permissions to the Pointsec registry items on the client PC, generally:
HKEY_LOCAL_MACHINE\SOFTWARE\Pointsec Mobile Tech\Pointsec
On the Network share
•
The user account logging on to the local client PC requires no
permissions on the network share once service is configured.
•
The account configured as Pointsec Service Start requires full control to
the network share.
What does the Pointsec Service Start Service Do?
Once the Pointsec Service Start service is configured, it handles:
•
Creation of recovery file
•
Download of update profiles placed in the update path
•
Download of system upgrade packages (patch files)
Limitations
Computer-specific Update Profile Folder
A computer-specific update profile folder is not created in the update
profile path, since this is not done via the Pointsec Service Start service
but by a process running in the user context (currently).
Note - If the folder is created manually, it will be used as normal.
Example of Setup
The following is an example of the setup:
1. Create a domain-wide account (hereafter called ServiceAccount) that all
client PCs within the organization can use (e.g., added to the Power
Users on each machine via GPO). This account also needs to be
present on the local machines with the permissions described above.
2. Create a network share and assign full permission on the share,
including sub-folders and content to the ServiceAccount. Other
permissions can be set as desired.
3. Install Pointsec PC.
4. Set the Pointsec Service Start service to log on with the
ServiceAccount.
Chapter 10
Using a Service Start Account
163
Upgrade from Pointsec 4.x/5.x Installations
If configured correctly, the creation of recovery file, download of
update profiles and download of software upgrades is now performed
via the account assigned to the Pointsec Service Start service.
Note - If you are installing by means of an install profile, the Pointsec
Service Start service can be configured prior to rebooting the system
when completing the installation.
Doing so should avoid a possible -2 error when logging on (caused by
limited permissions for the logged-on user to the recovery folder).
Upgrade from Pointsec 4.x/5.x Installations
During upgrade from Pointsec PC 4.x/5.x, the 4.x/5.x version of the
Pointsec Service Start Service is removed; and information about the
account configured to run the service is lost. The service must therefore
be reconfigured in order to function correctly.
164
Chapter
Pointsec PC Logging
Functionality
11
Pointsec PC can create and store event logs in a central log file that can be made
available to a central management point of access. Pointsec PC also maintains local
log files on each Pointsec PC-protected local machine.
Note - Ensure that you use a reliable time source to set clients’ internal clocks so
that the audit trail from multiple clients, will contain synchronized time stamps.
Pointsec PC events are logged in one or more of the following:
•
Local event database
•
Local log file
•
Central log file(s)
•
Windows Event Log (if enabled)
The Local Event Database
Pointsec PC logs information about events such as login attempts, status of encryption
and time of each update to the configuration. This information is saved as log events
in the local event database. These log events comprise an audit trail of Pointsec PC
activities on the local computer.
Pointsec PC stores up to 255 events in the local event database. This information is
scrambled and cannot be viewed in a text editor. It can, however, be viewed
immediately after preboot authentication by clicking Show Log in the Logon Successful
window:
165
The Local Log File
Figure 11-1
The contents of the local event database can also be viewed by clicking
View Local Log under Local in the PCMC; see below.
The Local Log File
The contents of the local event database are transferred to the local log
file by the PC tray application (PTray.exe) each time a user logs on to
Windows.
The local log file (Windows 2000 and XP) is stored locally in the directory
C:\Documents and Settings\All Users\Application
Data\Pointsec\Pointsec for PC. Note that the Application
Data\Pointsec\Pointsec for PC directories are hidden.
The local log file (Windows Vista) is stored locally in the directory
C:\Users\All Users\Pointsec\Pointsec for PC.
The local log filename is composed of the computer name and the file
extension .log. For example, if the computer name is DEV-PC.024, the
local log file on this computer will be DEV-PC.024.log.
The following events are logged directly to the local log file and are
therefore never found in the internal log database:
166
•
101
Account status
•
1010
Configuration setting changed
The Central Log File
•
1100
Profile setting changed
Thus, these events cannot be viewed immediately after preboot
authentication or by clicking View Local Log under Local in the PCMC.
The Central Log File
The central log file is a network folder to which local log files are copied.
The central log file is located in the directory specified in Local → System
Settings → Install → Set Central Log Path.
If the central log path has been specified, the Pointsec PC tray application
(PTray.exe) transfers the local log file to the directory in that path each
time one of the following happens:
•
A user logs on to Windows
The tray application calls the CentralLog.exe program, which copies
the local log file to the specified directory.
•
The CentralLog.exe program is executed
Each time the CentralLog.exe program executes, it first transfers all
new log events from the local log database (which contains a maximum
of 255 events) to the local log file. Then it transfers all new log events
in the local log file to the central log file, and simultaneously to the
Windows Event Log.
The interval for log transfers can be set in the UpdateInterval registry
value. See the table below for default values.
The following registry values relevant to the transfer are found in:
HKEY_LOCAL_MACHINE\SOFTWARE\Pointsec Mobile Tech\Pointsec
Table 11-1
Registry settings
Setting
Description
UpdateInterval
Time interval in minutes between each transfer. Default = 180.
ExtendedLogging
1 = Account status events will be included in the data transferred in
each execution of the program (Corresponds to CentralLog.exe /dump).
Default = 0.
0 = No account status events will be included in the data transferred in
each execution of the program. This is the default.
LogTransfer
1 = Events will also be transferred to the Windows Event Log. This is
the default.
0 = Events will not be transferred to the Windows Event Log. Default =
1.
Chapter 11
Pointsec PC Logging Functionality
167
Manually Transferring the Local Log File to the Central Log File
Note - To view the central log file, you must have system administrator
privileges or the corresponding privileges under Vista.
Manually Transferring the Local Log File to
the Central Log File
To run the CentralLog.exe program manually:
1. Do one of the following:
•
Run CentralLog.exe and transfer the local log file to the central
log file.
•
Run CentralLog.exe /dump, copy the user account status
information to the local log file, and then transfer the local log file
(which now contains the user account status) to the central log file.
The manual execution can be customized using the registry values
described above. When you run the CentralLog.exe program manually,
you might need to run it more than once depending on how much data is
to be transferred from the local log file.
Timestamps and the Windows Event Log
Note that the date and timestamp of an event viewed in the Windows
Event Viewer might differ from the date and timestamp of that event in the
local log file. This is possible because events are reported to the
Pointsec PC logs and to the Windows Event Viewer via different
independent interfaces. Events logged in preboot are not replicated in the
Windows Event Log until the next Windows session, while events logged
while operating in Windows are written directly to the Windows Event Log
and thus can have an earlier time than that of corresponding events in the
local log file.
Exporting Logs
For information on exporting logs, see Appendix H, “The pslogexp.exe Log
Export Utility”.
168
Viewing a Local Log File
Note - To view the central log file, you must have system administrator
privileges.
Viewing a Local Log File
To view local Pointsec PC log files:
1. Start the Pointsec PC Management Console (PCMC) and select Local in
the folder tree.
2. Click View Local Log Database:
Figure 11-2
The local log is displayed:
Chapter 11
Pointsec PC Logging Functionality
169
Viewing a Local Log File
Figure 11-3
In the Filter for Description Text field, you can specify the criteria that
will determine which events are displayed.
You can make various selections and review additional events that
Pointsec PC has logged. All log information is always available; these
selections merely filter what you choose to display or print.
170
Chapter
Remote Help
12
Pointsec PC users may be denied access to their workstations for a number of reasons.
For example, they might have entered an incorrect password too many times or
forgotten their password or, in a worst case scenario, a hacker may have tried to break
into their workstation.
Pointsec PC Remote Help is designed to assist users in these types of situations. All a
user has to do is call his/her designated Remote Help administrator and follow the
Remote Help procedure.
Implementing a Remote Help Procedure
Companies and organizations implement Remote Help procedures to suit their
individual needs and resources. One method of implementing Remote Help is as
follows:
•
Create designated administrator account(s) for Remote Help. The number accounts
you should create depends on your organization.
•
Once you have created the accounts, assign them to the people who will run the
Remote Help procedure.
•
Inform users who they should call when they need Remote Help.
•
For Remote Help to function, both the user account of the Remote-Help provider
and of the Remote-Help recipient must exist on the computer.
171
Types of Remote Help
•
Table 12-1
The Remote-Help provider’s group authority level must be equal to or
higher than the group authority level of the Remote-Help recipient.
Remote Help settings
Setting
Description
Provide ‘Remote
Password Change’
Set whether or not the account(s) are allowed to provide Remote
Password Change for other user accounts.
For a user account to be able to provide Remote Help, this option
must be also be selected in both the client system settings and the
user account properties.
Set whether or not the account(s) are allowed to provide One Time
Logon for other user accounts.
Provide ‘One-Time
Logon’
For a user account to be able to provide Remote Help, this option
must be also be selected in both the client system settings and the
user account properties.
Set whether or not the account(s) are allowed to receive Remote
Password Change.
Receive ‘Remote
Password Change’
For a user account to be able to receive Remote Help, this option
must be also be selected in both the client system settings and the
user account properties.
Set whether or not the account(s) are allowed to receive One-Time
Logon.
Receive ‘One-Time
Logon’
For a user account to be able to receive Remote Help, this option
must be also be selected in both the client system settings and the
user account properties.
Select whether to use Numeric or Alphanumeric format for the response
in Remote Help.
Response Format
•
Types of Remote Help
Pointsec PC provides two types of Remote Help for users who are denied
access to their workstations:
•
172
Remote Password Change
For users who use fixed passwords and have forgotten them. This type
of Remote Help is of no use to users who use either a dynamic token
or smart card/USB token for authentication.
Verifying Users
•
One-Time Logon
For users who have forgotten or lost their dynamic tokens or smart
card/USB tokens.
Note - When Remote Help is used to authenticate a Pointsec PC user
account that uses single sign-on (SSO), the recorded SSO credentials
for that user account are invalidated. This is to prevent Remote Help
administrators from leveraging SSO to ‘impersonate’ a user.
Verifying Users
Before you provide Remote Help to a user, you must be sure that the user
is actually authorized to access the workstation. You can do this in a
number of ways, for example:
•
Use predetermined questions and answers that only legitimate users
know
Keep a list of sample questions to ask, such as the user’s name and
favorite color, wife's maiden name, brand of car, etc. Some of the
questions could have randomized, fixed answers; for example, when
asked about his/her favorite pet, the user could answer clouds instead
of cat.
Store the questions and answers in a separate database that is
accessible to all Remote Help administrators.
•
Use voice verification software
Use security software to extract unique vocal characteristics of the
caller and compare them with the Pointsec PC user’s reference
voiceprint.
Providing Remote Help
The following section describes how to access the Remote Help screen and
how to help users change fixed passwords and give one-time access to
workstations.
To provide Remote Help:
1. Verify the user who needs Remote Help is legitimate. See “Verifying
Users” on page 173 for details.
2. Using an account with Remote Help privileges, start the Pointsec PC
Management Console and open the Remote Help screen:
Chapter 12
Remote Help
173
Providing Remote Help
Figure 12-1
3. Enter the following information:
Table 12-2
Remote Help screen information
Field/option
Information/action
Type of end-user assistance to be
provided
Select the type of Remote Help the user needs:
• One-Time Logon
If the user does not have access to their dynamic
token or smart card/USB token.
• Remote password change
If the user has forgotten their password.
End-User Account Name
Enter the name of the end-user account.
Helper Account Name
Enter the name of the account you are using to provide
Remote Help.
Generate Response One to end user
1. Click Generate to generate Response One.
2. Read Response One to the user who enters it in the
Response field.
3. Tell the user to press the TAB key to generate a
challenge.
174
Providing Remote Help
Table 12-2
Remote Help screen information
Field/option
Information/action
Type of helper authentication
Select the type of authentication used by the account
you are using to provide Remote Help:
• Password
For a fixed password.
• Dynamic Token
For a dynamic token or smart card/USB token.
Response One
This is the first response you read to the user.
Challenge from end user
Enter the challenge the user receives from Pointsec PC
after entering Response One and pressing the TAB key.
Helper Password
Enter the fixed password or dynamically generated
password for the account you are using to provide
Remote Help.
Generate Response Two to end user
1. Click Generate to generate Response Two.
2. Read Response Two to the user who enters it in the
Response field.
3. Tell the user to click OK.
Response Two
This is the second response you read to the user.
The user will now be forced to set a new password or will be given
one-time access to the workstation, depending on the type of Remote
Help you have provided.
Chapter 12
Remote Help
175
Providing Remote Help
176
Chapter
Pointsec PC Utilities
13
This chapter describes the various Pointsec PC administration utilities available.
Pointsec PC Password Synchronization
Using Pointsec PC’s password synchronization, you can synchronize Windows and
Pointsec PC passwords with each other. The two synchronization settings you can
choose from are:
•
The Windows password is set as the password to be used for Pointsec PC preboot
authentication. Once synchronized, changing the Windows password will
automatically change the Pointsec PC password to the new Windows password.
•
The password used for Pointsec PC preboot authentication is set as the password
to be used for Windows authentication. Once synchronized, changing the
Pointsec PC password will automatically change the Windows password to the new
Pointsec PC password.
See “Password Synchronization Settings” on page 59 for details on how this is done in
the PCMC.
Password synchronization is associated with only the first user account that is used to
log on to Windows after rebooting the workstation. Password synchronization
functionality is not supported for third-party solutions.
Note - Password synchronization must be inactivated in a Common
Criteria validated environment.
177
Synchronizing Using the Windows Password for Authentication in Pointsec PC Preboot
Synchronizing Using the Windows Password for
Authentication in Pointsec PC Preboot
To synchronize and use the Windows password for authentication in
Pointsec PC preboot, the value of the Synchronize Windows Password to
Preboot setting must be Yes. This setting can be found under Local →
Groups or User Accounts → System → Group Settings → Password
Synchronization.
Synchronization takes place the first time the user logs on to Windows (see
below), and then the passwords are checked at every subsequent logon
until the value of this setting is set to No.
Example 1 - Different Passwords
Let us look at an example: In this example User1’s Pointsec PC and
Windows passwords are different:
•
Windows password XyZ123
•
Pointsec PC password XyZ1234
Synchronize Windows Password to Preboot has been set to Yes for User1.
User1 starts the computer and logs on to Pointsec PC with XyZ1234.
Windows starts, and User1 logs on to Windows with XyZ123.
Because the passwords differ, the following window is displayed:
Figure 13-1
User1 enters the Pointsec PC password, XyZ1234, and clicks OK.
Password synchronization is confirmed:
Figure 13-2
When User1 logs on to Pointsec PC again, the password XyZ123 is used.
Until the Windows password change is changed, User1’s Windows
password, XyZ123, will be used to log on to Pointsec PC.
178
Synchronizing Using the Pointsec PC Preboot Authentication Password for Authentication in Windows
Example 2 - Identical Passwords
Let us look at another example. In this example User1’s Pointsec PC and
Windows passwords are the same, but User1 changes the Windows
password:
•
Windows password XyZ123
•
Pointsec PC password iXyZ123
Synchronize Windows Password to Preboot has been set to Yes for User1.
User1 starts the computer and logs on to Pointsec PC with XyZ123.
Windows starts, and User1 logs on to Windows with XyZ123.
User1 presses Ctrl+Alt+Delete and changes the Windows password to
AbC456.
Pointsec PC confirms that its password has been successfully changed.
The next time User1 logs on to Pointsec PC, the password AbC456 must
be used.
Synchronizing Using the Pointsec PC Preboot
Authentication Password for Authentication in
Windows
To synchronize and use the Pointsec PC password for preboot
authentication for Windows authentication, the value of the Synchronize
Preboot Password to Windows setting must be Yes. This setting can be found
under Local → Groups or User Accounts → System → Group Settings → Password
Synchronization.
Synchronization takes place the first time the user logs on to Windows (see
below), and then the passwords are checked at every subsequent logon
until the value of this setting is set to No. Once the passwords are
synchronized, changing the Pointsec PC password will automatically
change the Windows password to the new Pointsec PC password. Note that
the Synchronize Preboot Password to Windows setting applies only to password
Chapter 13
Pointsec PC Utilities
179
Windows Password Complexity Requirements
changes made in Pointsec PC preboot authentication; it does not apply to
changes to the Pointsec PC password via PCMC, the Pointsec PC tray, or
an update profile.
Note - If you must reset a user’s password and the user’s passwords are
synchronized, you must reset both passwords.
When password synchronization is deployed, Pointsec PC stores domain
and user account names. The next time a password change is
requested, the user and domain account names are compared with the
stored user and domain account names.
This means that if the user logs out of Windows and a different
Windows account is used to log on again, the passwords will not be
synchronized.
Windows Password Complexity Requirements
Pointsec PC Wake-on-LAN (WOL)
Using Wake-on-LAN (WOL) network cards with security software that
enforces authentication early in the boot process is often not possible,
since it does not allow the operating system to start.
Pointsec PC supports the use of WOL network cards and can be set to start
the system in WOL mode. This allows the operating system to start and
remote updates to be performed.
Setting up WOL
You set up WOL in the PCMC.
Note - You cannot extend authority (see “Extending Authority” on
page 14) when WOL mode is active.
The Wake-on-LAN settings are located under System Settings → Wake on
LAN:
180
WOL Logon Example
Figure 13-3
For a description of the Wake-on-LAN settings, see “Wake-on-LAN
Settings” on page 30.
WOL Logon Example
The following is an example of working with Pointsec PC WOL. In this
example, the WOL boot time delay is set to 30 seconds and the number of
permitted WOL logons is five.
1. The Pointsec PC profile is deployed to the Pointsec PC-protected
computer and the WOL settings are implemented.
2. The computer is booted in Pre-Boot Authentication and the
Pointsec PC logon dialog box is displayed for 30 seconds.
3. WOL logs on and boots the machine. The WOL logon process is now
started and WOL will log on as many times as specified in the profile.
4. The computer is rebooted and the Pointsec PC logon dialog box is
displayed for 30 seconds. WOL logs on and boots the computer.
5. The computer is rebooted and the Pointsec PC logon dialog box is
displayed for 30 seconds. WOL logs on and boots the computer.
6. The computer is rebooted and the Pointsec PC logon dialog box is
displayed for 30 seconds. WOL logs on and boots the computer.
7. The computer is rebooted and the Pointsec PC logon dialog box is
displayed for 30 seconds. WOL logs on and boots the computer.
8. The computer is rebooted. Now, all the WOL logons specified have
been used and WOL is disabled on the computer.
Note - If a user logs on to the computer when WOL is activated,
Pointsec PC will deactivate WOL and no WOL logons will be performed.
You must deploy a new profile in order to activate WOL again.
Pointsec PC Windows Integrated Logon (WIL)
The Windows Integrated Logon (WIL) function enables users to log on
without preboot authentication.
Chapter 13
Pointsec PC Utilities
181
Security Features on WIL-enabled Computers
Settings
You set up WIL in the PCMC; the WIL settings are located under System
Settings → Windows Integrated Logon.
For a description of the WIL settings, see “Windows Integrated Logon
Settings” on page 32.
Security Features on WIL-enabled Computers
To increase security when this function is enabled, a number of security
feature are available in Pointsec PC. These features ensure that:
•
The computer has not been moved from the network
•
The hard drive has not been tampered with
•
The hard drive has not been moved to another computer.
If the system detects any indications of the three issues above, WIL is
disabled automatically, the computer reboots, and the user must
authenticate in preboot.
The security features which can be enabled together with WIL are:
•
Network Locational Awareness
If this feature is enabled, the system pings a defined number of IP
addresses during boot to make sure that the client is connected to the
correct network. If these IP addresses do not answer, WIL is disabled
automatically, the computer reboots and the user must authenticate in
preboot.
Note - All of the defined IP addresses must fail to answer for WIL to be
disabled. As long as one of the IP addresses answers, WIL will continue
to be enabled.
•
Hardware Hash
If this feature is enabled, the system generates a hardware hash from,
among other things, IDs found on the hard drive and on the CPU at
every start-up. If the hash is correct, the hard drive has not been
removed and re-inserted into another computer. If the hash is found to
be incorrect, WIL is disabled automatically, the computer reboots, and
the user must authenticate in preboot.
•
Max Failed Windows Logon Attempts
When this feature is enabled, WIL is disabled automatically after the
specified number of failed logon attempts, the computer will then
reboot and the user must authenticate in preboot.
Note - The Max Failed Windows Logon Attempts feature is not
supported in Windows Vista.
182
User Perspective on WIL
User Perspective on WIL
From the user perspective it is important to remember three things:
•
If the user removes his WIL-enabled computer from the network, WIL
will be disabled at the next boot, and the user will have to log on.
•
Adding hardware devices to a WIL-enabled computer may be
considered as tampering with the computer, and WIL will then be
automatically disabled.
•
Starting Windows in safe mode is not possible if Network Locational
Awareness is enabled.
Administrator Perspective on WIL
From the administrator perspective, the following is worth noting when
working with WIL-enabled computers:
•
If you use the Hardware Hash feature, you should disable WIL before
upgrading BIOS firmware and/or replacing hardware. When enabling
WIL after the upgrade, the hardware hash will match the new
configuration.
•
If you enable the security features together with WIL, you should set
up a Pointsec PC user account which the users can log in with if WIL
is automatically disabled for some reason. An alternative is to display
an instruction under the “PPBE Failure
•
message” saying that the user should call Help Desk if they get the
Pointsec PC preboot screen due to one of the security features.
Pointsec PC in Multi-language Environments
The following sections explain the Pointsec PC language options.
Language Support
Users can select from a number of supported languages to use in the
Graphical User Interface (GUI). See Appendix E, “Language Packs” for
information on supported languages.
Changing the Language Used
To change the language used in PCMC:
1. Right-click the Pointsec PC icon in the screen tray and select Choose
Language:
Chapter 13
Pointsec PC Utilities
183
Support for Multi-language Keyboards
Figure 13-4
The language in Pointsec Admin is changed immediately. The language
used in the Pointsec tray program will change to the language you
select the next time the program is restarted.
Support for Multi-language Keyboards
See Appendix F, “Keyboard Layouts” for information on supported
keyboards.
Switching Keyboard Layouts
To switch keyboard layouts:
1. At pre-boot authentication, press left shift + alt.
2. Click the Pointsec PC icon in preboot.
Pointsec PC installs the same keyboard layouts as Windows installs.
184
Single Sign-On (SSO)
Single Sign-On (SSO)
With SSO enabled for a Pointsec PC user account, the user can log on to
Pointsec PC and automatically be authenticated by other access control
systems.
About SSO
After enabling SSO for a Pointsec PC user account on a computer,
Pointsec PC must learn the account’s network credentials. This is done at
first logon by selecting the Enable Single Sign On option on the Pointsec PC
logon screen.
At this logon, the user logs on to the network as usual. Pointsec PC then
stores this information securely and uses it on subsequent logons where
SSO has been enabled. When the option is not selected no credentials are
passed to the network, allowing for the use of a different network account.
It should be noted that when SSO has been turned off, no network
credentials will be recorded or used, and the previous credentials will
continue to be stored. When SSO is then turned back on, those previous
credentials will be used again. After SSO has been turned back on, there
is a Record New Credentials option available on the SSO screen. By
selecting this option, the user can enter new network credentials at the
logon. This can be used for any changes, such as a different domain or
NDS Tree.
Note - When Remote Help is used to authenticate a user account that
uses single sign-on (SSO), the recorded SSO credentials for that user
account are invalidated. This is to prevent a Remote Help administrator
from leveraging SSO to ‘impersonate’ a user.
SSO and Password Changes
Periodically, it will be necessary to change the account’s network
password. Pointsec PC will look for Change Password dialog boxes to record
the changes. When a Change Password dialog box is opened, Pointsec PC
will input the old password into the corresponding field and then record
what is entered into the new password field. At the next reboot, SSO will
work as usual, as the new password has already been stored.
Entrust SSO
After implementing Entrust SSO on a computer, Pointsec PC must learn
the Entrust profile name. This is used to signify the name of the Entrust
account that will be used.
A requirement of the Entrust SSO implementation is that the Pointsec PC
password and the Entrust password be the same.
Chapter 13
Pointsec PC Utilities
185
Entrust Profile Revocation
Once SSO has been implemented, an Enable Single Sign On option is
displayed on the Pointsec PC logon screen. Selecting this option will use
the stored Entrust profile to log on to Entrust. When the option is not
selected, Entrust logon is manual.
It should be noted that when SSO has been turned off, no Entrust
credentials will be recorded or used and the previous credentials will
continue to be stored. When SSO is then turned back on, those previous
credentials will be used again. After SSO has been turned back on, there
is a Record New Credentials option on the SSO screen. By selecting this
option, the user can enter a new Entrust profile at the logon.
Note - The user will also need to request help for Entrust before logging
on. Otherwise, the account will be locked again.
Note - If there is any conflict between the Entrust and Pointsec PC user
password settings, SSO will not work. The Pointsec PC password must
be exactly the same as the Entrust password for Pointsec PC/Entrust
SSO to work.
Entrust Profile Revocation
Entrust SSO will lock a Pointsec PC user account if the corresponding
Entrust profile has been revoked. In this case, when the computer boots,
the profile will be checked before the Windows logon is activated. If the
Entrust user has been revoked the Pointsec PC user will be locked, and the
computer will be automatically rebooted. At this point, the user will not be
able to access the computer without Remote Help.
To ensure that Pointsec PC acts on the revocation, you need to configure
the Active Directory (AD) server as described below. Use the ADSIEdit
extension to the Microsoft Management Console (MMC) (For more
information, see
http://computerperformance.co.uk/w2k3/utilities/adsi_edit.htm).
Once the active directory server has been configured, Pointsec will be
notified of the revocation of Entrust profiles. When Pointsec PC encounters
such a notification of revocation, when the user account authenticates to
Pointsec PC the following occurs:
186
•
The message “Your Pointsec account has been locked due to a
revoked Entrust profile” is displayed
•
Authentication to Windows is denied
•
The event is logged.
Entrust Profile Revocation
Configuring the Active Directory Server
To configure the active directory server, follow the three steps described
below:
•
“Setting the dsHeuristic Attribute” on page 187
•
“Setting up ANONYMOUS LOGON” on page 188
•
“Enabling Issue Updated CRLs on the Entrust Server” on page 188
Setting the dsHeuristic Attribute
First, set the dsHeuristic attribute by following these directions:
1. Connect to Configuration.
2. Browse to CN=Configuration → CN=Services → CN=Windows NT →
CN=Directory Service.
3. Select Properties for CN=Directory Service.
4. Set the dsHeuristic attribute to 0000002 (Allow anonymous clients to
perform any operation that is permitted by the access control list
[ACL]). For more information, see
http://support.microsoft.com/default.aspx?scid=kb;en-us;326690.
Figure 13-5
Chapter 13
Pointsec PC Utilities
187
Entrust Profile Revocation
Setting up ANONYMOUS LOGON
Next, do the following to set up anonymous logon:
1. Connect to Configuration.
2. Browse to CN=Configuration → CN=Services → CN=Public Key Services →
CN=AIA.
3. Select Propterties for CN=AIA.
4. Select the Security tab.
5. Add ANONYMOUS LOGON and go to its Advanced properties.
6. Edit Permission Entries, making sure that the following are checked: List
Contents, Read All Properties, Read Permissions.
7. Apply to This object and all child objects.
Figure 13-6
Enabling Issue Updated CRLs on the Entrust Server
Finally, enable Issue Updated CRLs in the Entrust Security Manager
Administration.
188
Windows Smart Card
Windows Smart Card
Pointsec PC supports SSO for accounts that use Windows smart cards for
authentication. Once enabled for the Pointsec user account, all the user
has to do is enter their smart card PIN when prompted. Pointsec PC stores
the PIN securely and allows the user access to the computer once the user
has been successfully authenticated by Pointsec PC.
Enabling SSO
Single Sign-On (SSO) is a useful tool when users need to remember many
passwords, but it can be a security hole. If a Pointsec PC password is
compromised, SSO will allow access to the network resources associated
with the user account.
Note - SSO should never be enabled for Pointsec PC administrators or
Pointsec PC system administrators due to their domain administration
accounts and/or their high privilege access to domain resources.
Pointsec PC Single Sign-On settings are found under Group Settings and
under Account Settings:
Figure 13-7
Chapter 13
Pointsec PC Utilities
189
Enabling SSO
To enable SSO:
1. In the Single Sign-On area, select from the following options:
Table 13-1
Option
Description
Enable SSO
SSO is enabled with Windows. User names and passwords will be stored
and passed on to the network logon prompt.
Once the account user has been successfully authenticated by
Pointsec PC, he/she will not need to be authenticated by Windows.
Entrust SSO
SSO is enabled with Entrust.
Pointsec PC saves the path to the Entrust profile used. The password
used is the Pointsec PC password, and must be the same as the Entrust
password for Entrust SSO to work.
Once the account user has been successfully authenticated by
Pointsec PC, he/she will not need to be authenticated by Entrust.
Smart Card Triggers
Windows SSO Logon
SSO is enabled for accounts that use Windows smart card
authentication.
The first time the user logs on, Pointsec PC prompts for the Windows
smart card PIN and stores it securely. All the account user needs to do
at the next logon is to be successfully authenticated by Pointsec PC.
2. Close PCMC for the settings to take effect.
The next time the user account logs on, Pointsec PC informs the user
that it will record the user's account name and password for future
authentication. Now, the user only needs to enter his/her Pointsec PC
details when starting up the PC.
190
Chapter
Removing Pointsec PC
14
You can remove Pointsec PC by:
•
Creating and deploying an uninstall profile, which allows for easy removal from
many computers; see “Uninstall Profiles” on page 191
•
Using Add/Remove Programs; see “Windows Add/Remove Programs” on page 194
•
Allowing a user to remove Pointsec PC and decrypt their computer using Remote
Help; see Chapter 12, “Remote Help”.
Uninstall Profiles
The following sections explain how to create and deploy an uninstall profile.
Creating an Uninstall Profile
An uninstall profile enables you to remotely remove Pointsec PC from multiple
machines within your organization without having to visit each machine.
You can use an uninstall profile in a variety of scenarios, for example:
•
an employee is no longer with the company
•
a machine needs to change its operating system from Windows 98 to Windows
2000
•
an employee is traveling to a country where strong disk encryption is illegal
To create an uninstall profile:
1. Open PCMC and click the Remote button.
2. Click New Profile to launch the profile wizard, click Next and select Set Accounting,
and click Next:
191
Creating an Uninstall Profile
Figure 14-1
3. Select Uninstall, click Next and enter the profile name. Click Next and
then Finish.
4. Enter the user account name and password of the first user account
that is authorized to uninstall Pointsec PC and click OK:
Figure 14-2
5. Enter the user account name and password of the second user account
that is authorized to uninstall Pointsec PC and click OK:
192
Configuring Uninstall Profiles
Figure 14-3
The uninstallation profile is created:
Figure 14-4
Configuring Uninstall Profiles
Deploying an Uninstall Profile
Note - If you want to deploy an uninstall profile directly after installing
Pointsec PC, check first that the installation and encryption process is
complete. An uninstall profile can only be deployed when Pointsec PC
is fully installed on the computer.
The logged-on user account on the computer from which you want to
remove Pointsec PC must have read and execute permissions to the
Publish directory.
The logged-on account must also have access to all volumes on the
computer in order to remove Pointsec PC.
Once you have configured the uninstall profile, you are ready to deploy it.
Chapter 14
Removing Pointsec PC
193
Windows Add/Remove Programs
To deploy an uninstall profile:
1. Simply move the uninstall profile from wherever it is stored to the
Publish directory you have specified.
Note - When the PC has finished the decryption process, it will no
longer be protected.
Windows Add/Remove Programs
You can use Windows Add/Remove Programs to remove Pointsec PC.
When Windows Add/Remove is used, one Pointsec PC administrator or
system administrator and one Pointsec PC user (who could also be an
administrator), both with the right to remove Pointsec PC, must be
authenticated before the removal process can start. This ensures that users
cannot remove Pointsec PC.
To remove Pointsec PC using the Windows Add/Remove Program:
1. On the Windows Add/Remove Programs menu, select Pointsec PC and
click Add/Remove. The following dialog box opens:
Figure 14-5
2. Click Yes and the following dialog box opens. Enter the user account
name and password of the first user account that is authorized to
uninstall Pointsec PC and click Next:
Figure 14-6
194
Windows Add/Remove Programs
3. Enter the user account name and password of the second user account
that is authorized to uninstall Pointsec PC:
Figure 14-7
4. Click Next. The following dialog box opens, displaying the volumes
protected by Pointsec PC:
Figure 14-8
5. Select a volume from which you want to remove Pointsec PC and click
the > button to move it to the Volumes to Uninstall window. Repeat this
procedure until the required volumes are in the list for uninstallation.
6. Click Next.
Note - Select all volumes to decrypt. Leaving one volume encrypted
might leave some information inaccessible. Also, if any volumes are to
be left encrypted, the volume containing the operating system must
also remain encrypted.
7. When the message stating that the computer must be restarted for the
process to be completed is displayed, click OK.
Chapter 14
Removing Pointsec PC
195
Windows Add/Remove Programs
When the computer has restarted and logon is successful, background
decryption will start in Windows. When this is completed and the
computer has been restarted, boot protection and Pointsec Admin will
be removed.
196
15
Chapter
Recovery, Repair and Bootable
Media
This chapter discusses recovering information that is encrypted, repairing master boot
records and reviewing hard disk information. It also explains how to boot from media
other than floppy disks.
The Pointsec PC Recovery File
Pointsec PC stores the recovery file locally in the directory C:\Documents and
Settings\All Users\Application Data\Pointsec. By default, all users have full
permissions to this directory. If you experience problems writing or accessing the
recovery file, ensure that the default permissions have not been changed. Pointsec PC
transfers the recovery file from C:\Documents and Settings\All Users\Application
Data\Pointsec to the directory specified in the PCMC under Local → Edit Settings →
Pointsec PC → System Settings → Install → Set Recovery Path.
If the Recovery File Path is not Found
If no valid recovery path can be found when Pointsec PC is trying to write to the
recovery file, the following error message will be displayed:
“The path to the recovery file is not accessible. This is OK if you are working off line
and it will reset when connected to your regular network. Otherwise, please contact
your administrator or technical support for more information.”
197
Recovery and the Pointsec PC Version on the Client
If you receive this message, encryption will not start until Pointsec PC has
ascertained that it will be possible to carry out a recovery later. Until then,
the PC will be left unprotected.
Recovery and the Pointsec PC Version on the
Client
In most cases, the administrator (or other user account performing
recovery) has the same version of Pointsec PC as the version installed on
the client to be recovered. When this is the case, recovery can be
performed via two methods, described below.
Otherwise, when creating recovery media, for example when performing
‘stand-alone’ recovery, ensure that you use the Volume Recovery Utility for
the version of Pointsec PC that is installed on the client you want to
recover. All versions of the utility are available in the 1_Pointsec for
PC\Tools\Reco_img directory on the installation CD-ROM. In this directory
you will find a folder for each release; each folder contains the correct
utility and files for creation of recovery media for that release.
Recovery via the Start menu
To perform recovery via the Start menu:
1. From the Start menu, select Pointsec.
2. Select Pointsec PC and then Create Recovery Disk.
Recovery from the PCMC
See “Creating a Recovery Disk from the PCMC” on page 199 for details.
Note - In Vista, you will not be able to open the recovery file, from
which you create recovery media, if the Recovery Path specified in the
Set is specified as a mapped network drive, and you are trying to create
the media from the PCMC. The Recovery Path should be specified in
UNC format: \<server>\<share>\.... Alternatively, execute Create
Recovery Media from the Start menu.
198
Creating a Recovery Disk from the PCMC
Creating a Recovery Disk from the PCMC
Using the Recovery Utility, you can create a recovery disk containing
recovery, review and repair options on a floppy disk or removable media.
Note - The removable media option is only available if the Recovery
Utility detects that supported removable media is available on the
system.
Note - If you must perform a forced removal of Pointsec PC before
encryption has started, create a generic recovery floppy disk by
executing reco_img.exe, which is in the Tools directory.
To create a recovery disk:
1. On the Pointsec PC system administrator’s workstation, click Remote.
2. Under Recovery, click Create Recovery Media:
Figure 15-1
The Recovery wizard opens:
Chapter 15
Recovery, Repair and Bootable Media
199
Creating a Recovery Disk from the PCMC
Figure 15-2
3. Choose either Find recovery file via a configuration set or Browse file system
for recovery file. In the example below we select the former:
Figure 15-3
4. Select the set that contains the recovery file from Available Configuration
Sets, and click Next:
Figure 15-4
5. Select the recovery file from Available Recovery Files, and click Next:
200
Creating a Recovery CD-ROM
Figure 15-5
6. Click Finish to launch the recovery tool for the recovery file displayed in
the Finish Recovery Wizard:
Figure 15-6
Note - Whatever medium you choose for the recovery disk, it must be
properly formatted. Any information saved on the medium will be
destroyed.
It is also possible to use a recovery disk, from a floppy or removable
media, to create a CD-ROM containing many recovery and repair
options. For details, see “Creating a Recovery CD-ROM” on page 201.
Creating a Recovery CD-ROM
If a computer can only boot from a CD-ROM, you can write its recovery
disk to a CD-ROM using standard CD burning software.
Note - When running the recovery program any changes you make to
settings, for example language and keyboard settings, will not be saved
on the CD-ROM.
Chapter 15
Recovery, Repair and Bootable Media
201
Recovering Information
To create a recovery CD-ROM:
1. For the workstation that needs recovery or repair, create a recovery disk
on a floppy disk or removable media. See “Creating a Recovery Disk
from the PCMC” on page 199 for instructions.
2. Using CD burning software, create a bootable CD-ROM based on the
recovery disk. Refer to your CD burning software’s documentation for
information on creating a bootable CD-ROM.
3. Ensure that the workstation is configured to boot from the CD drive.
Insert the CD-ROM and reboot the workstation to access the recovery
and repair information on the CD-ROM
Note - CD-ROMs containing recovery information must be handled
securely. Only create them when required and ensure that they are
securely destroyed when no longer needed.
Recovering Information
Occasionally you might need to recover information that is stored
encrypted. This requires authentication similar to that required in normal
preboot.
Note - When using a USB device to store the recovery disk, the USB
device may be recognized as the first physical device. If this happens,
the recovery program will consider the device to be the first hard disk
and display the encrypted volumes (in the PVR file) as non-encrypted.
To work around this, use option 8 in the Recovery menu to choose the
correct physical device.
Note - Floppy disks and other removable media containing recovery
information must be handled securely. Only create them when required
and ensure that they are securely destroyed when no longer needed.
Using Slave Drive Functionality to Recover
Information
There are circumstances under which you need to access information on
the hard disk of a Pointsec PC-protected machine and do not want to
access this information by performing a recovery, for example if you need
to access a disk for forensic reasons or because a failure of the operating
system makes it impossible to retrieve data on a disk. In such cases you
can use Pointsec PC’s slave drive functionality.
A slave drive is a hard drive taken from one machine and installed (with
the jumpers correctly set) on another machine, the master machine.
202
Using Slave Drive Functionality to Recover Information
The slave drive functionality enables you to take a hard drive from a
Pointsec PC-protected machine and, on another Pointsec PC-protected
machine, unlock it in preboot and then access the information on that disk
in Windows.
Slave drive functionality requires that both the slave drive and the master
machine have been encrypted with the same algorithm.
The machine from which the hard drive is taken must have the Allow the
Hard Drive To Be Slaved setting set to Yes, and the master machine must
have the Allow Slave Hard Drive setting set to Yes. These settings can be
seen in the following screen image:
Figure 15-7
Accessing a Slave Drive
The following is a typical example of how to access a slave drive:
1. As administrator, attach to your computer (now the master computer)
an encrypted drive from a client that allows slaving. Before
authenticating, be sure that the BIOS has located the slave drive. If it
has not, you will not be able to continue.
2. Start the master computer with the attached slave drive and complete
the Pointsec PC preboot authentication.
Immediately after the successful preboot authentication, a slaving
authentication window is displayed. The authentication window and its
background are in grayscale to distinguish it from the other
authentication windows. The slave drive authentication uses the user
account name and fixed password, dynamic token or smart card
required by the slave drive. The slave drive authentication window is
displayed for approximately 30 seconds, after which it disappears if no
action has been taken. After each action, for example, a keystroke, the
timer is reset and starts counting down again.
Note - Press Esc at any time to exit authentication.
3. After successful logon to the slave drive, proceed or cancel. The logon
to the slave drive is logged on the master machine.
Chapter 15
Recovery, Repair and Bootable Media
203
Using Slave Drive Functionality to Recover Information
If you do not cancel, Windows starts and the drive is mounted as a
Windows drive. It can now be accessed in Windows.
Authenticating
Authentication with fixed passwords and dynamic tokens is supported.
Authentication with smart cards is also supported, but the master machine
must contain the smart card drivers required to authenticate the slave
drive.
Compatibility of Drives
Because of differences in the way different BIOSs handle disks,
Pointsec PC slave-drive functionality currently supports only slave drives of
the same drive type as that of the master machine (IDE, SATA or SCSI).
Slave Drive Integrity
Settings and user accounts, etc., on the slave drive cannot be changed
locally. Changes to settings and user accounts on the local machine via
profiles will not affect the slave drive.
Wake-on-LAN
Wake-on-LAN is supported on the master machine, but you will not be able
to access the slave drive via Wake-on-LAN.
Windows Integrated Logon
When a slave drive is connected to a master machine, authentication on
the master machine is required even though Windows Integrated Logon is
enabled in the Pointsec PC settings for this machine. Authentication on
the slave drive is always required. If the slave drive is removed from the
master machine and Windows Integrated Logon is enabled on that
machine, Windows Integrated Logon will again be active.
Remote Help
One-time Logon
One-time logon is supported on both the master machine and the slave
drive, but the user account and password of both the slave drive user and
the helper must be on the slave drive for one-time logon to work.
Remote Password Change
Remote password change is supported on the master machine but not on
the slave drive.
204
Booting from Alternative Media
Recovery
The slave drive must be removed before performing recovery on the master
machine.
Hibernation
Hibernation is supported on the master machine, but you must
authenticate on the slave drive. The slave drive may not be attached to a
hibernated machine. If a slave drive is to be connected to a master
machine, the master machine must be shut down instead of hibernated.
Uninstalling
Do not uninstall Pointsec PC from a master machine; remove the slave
drive before uninstalling.
Booting from Alternative Media
Using Pointsec PC’s alternative boot media menu, you can boot from
media other than floppy disks. This is useful if, for example, the PC you
are working on does not have a floppy disk drive.
Accessing the Alternative Boot Media Menu
The options displayed in the alternative boot menu depend on what the
BIOS of the machine supports and the hardware that is currently installed.
Therefore, the fact that an option is listed does not mean it is supported
by Pointsec PC.
To access the alternative boot media menu:
1. When the PC reboots and the User Identification dialog box is displayed,
press CTRL + F10.
Chapter 15
Recovery, Repair and Bootable Media
205
Accessing the Alternative Boot Media Menu
2. Enter your user account name and password, and press Enter.
Pointsec PC displays the Alternative Boot Menu. Depending on the
PC’s BIOS and hardware some or all of the following options, or other
options, are displayed:
Table 15-1
Examples of Alternative Boot Menu options
Number
Option
Boot using:
0
Floppy
Standard floppy.
This option is always displayed, even if no floppy disk drive is
available.
1
Harddrive
Integrated Drive Electronics (IDE) hard disk – not SCSI.
2
CD/DVD-R
OM
CD/DVD-ROM.
3
[network
adaptor]
Network adaptor, which can launch the Preboot Execution
Environment (PXE). This enables the computer to boot via a
network resource without requiring an installed operating system.
4
BIOS IPL
devices
Initial Program Load (IPL) device. This can be virtually any
device that has the ability to load and execute an operating
system. This includes floppy drives, hard drives and CD-ROM
drives.
5
Windows
PE
Microsoft Windows Preinstallation Environment (PE).
This option is always displayed last, and it is displayed even if
Windows PE is not available.
3. Enter the option number of the media you want to boot from and press
Enter. Pointsec PC boots using the media you have selected.
206
Appendix
Being Authenticated by
Pointsec PC
A
Being Authenticated by Pointsec PC
Being Authenticated by Pointsec PC
This appendix discusses how end-users use fixed passwords, dynamic
tokens and smart cards/USB tokens to authenticate themselves in order to
access their Pointsec PC-protected computer.
Note - Pointsec PC administrators should distribute this information, as
deemed appropriate, to end-users before users access their
Pointsec PC-protected computers for the first time.
About Authentication
Being authenticated means being verified by Pointsec PC as someone who
is authorized to use a specific computer. When you switch on or restart a
Pointsec PC-protected computer, the User Identification dialog box opens:
207
Navigating
Figure A-1
Here you must enter a valid username and password. Pointsec PC verifies
that you are authorized to access the computer and allows the computer to
start.
Navigating
You can use a mouse to navigate in the Pointsec PC user identification
boxes and select options.
You can also move around in the dialog boxes by pressing TAB and ENTER,
and you can select options using the space bar.
Ensuring that your Computer has not been Tampered
with
Before authenticating yourself, you should always press CTRL+ALT+DEL to
restart your computer. This guarantees that your computer is tamper-free
and that your username and password cannot be hijacked.
Being Authenticated for the First Time
The following sections explain how to access a Pointsec PC-protected
computer as a new user.
The first time Pointsec PC authenticates you, you must use a temporary
username and password. Once you have successfully entered the name and
password, Pointsec PC prompts you to change them to the username and
password you will use in the future.
208
Using a Fixed Password
Using a Fixed Password
A fixed password is a private string of characters, known only to you and
Pointsec PC, which you use each time you want to access the computer.
Note - Your Pointsec PC administrator will tell you which username and
password to use the first time you access the Pointsec PC-protected
computer.
To authenticate yourself using a fixed password:
1. Start your Pointsec PC-protected computer. The User Identification
dialog box opens:
Figure A-2
2. To ensure that your computer has not been tampered with, press
CTRL+ALT+DEL. Your computer restarts and Pointsec PC re-displays the
User Identification dialog box.
3. In the Username field, enter the username you received from your
administrator and press the TAB key to move to the Password field:
Figure A-3
4. Enter the password you received from your administrator and click OK.
Pointsec PC confirms that you have entered a valid username and
password:
Appendix A
Being Authenticated by Pointsec PC
209
Using a Fixed Password
Figure A-4
5. Click OK to close the message box. The following dialog box opens:
Figure A-5
6. Enter your username and click OK. The following dialog box opens:
Figure A-6
7. Enter and confirm the password you want to use and click OK.
Pointsec PC confirms that you have successfully accessed the
computer for the first time using your Pointsec credentials:
Figure A-7
8. Click Continue to close the dialog box. Pointsec PC now allows Windows
to start.
210
Using a Dynamic Token
Using a Dynamic Token
A dynamic token is a password you generate using a password token every
time you want to be authenticated by Pointsec PC.
Note - Your Pointsec PC administrator will provide you with a dynamic
token, the information you need to use it, and a username.
To authenticate yourself using a dynamic token:
1. Start your Pointsec PC-protected computer. The User Identification
dialog box opens:
Figure A-8
1. To ensure that your computer has not been tampered with, press
CTRL+ALT+DEL. Your computer restarts and Pointsec PC re-displays the
User Identification dialog box.
2. In the Username field, enter the username you received from your
administrator and press TAB.
Pointsec PC recognizes that you will be using a dynamic token to
authenticate yourself and displays the following dialog box:
Figure A-9
3. In the dynamic token, enter the Pointsec PC challenge to generate a
response. Enter the response in the Response field and click OK.
Appendix A
Being Authenticated by Pointsec PC
211
Using a Smart Card/USB Token
Pointsec PC confirms that you have successfully accessed the
computer for the first time using your Pointsec credentials:
Figure A-10
4. Click Continue to close the dialog box. Pointsec PC now allows your
computer to start.
Using a Smart Card/USB Token
Smart cards and USB tokens store passwords. To be authenticated by
Pointsec PC, you must connect the card or token to the computer and
enter a valid card or token PIN.
Note - Your Pointsec PC administrator will supply you with your smart
card/USB token, the information you need to use it and a temporary
username and password to use the first time you access the
Pointsec PC-protected computer.
Ensure that your smart card/USB token is connected to your computer
before you start to authenticate yourself.
To authenticate yourself using a smart card/USB token:
1. Start your Pointsec PC-protected computer. The User Identification
dialog box opens:
Figure A-11
2. To ensure that your computer has not been tampered with, press
CTRL+ALT+DEL. Your computer restarts and Pointsec PC re-displays the
User Identification dialog box.
212
Using a Smart Card/USB Token
3. In the User account name field, enter the temporary user account name
you received from your administrator and press the TAB key to move to
the Password field:
Figure A-12
4. Enter the password you received from your administrator and click OK.
Pointsec PC confirms that you have entered a valid user account name
and password:
Figure A-13
5. Click OK to close the message box. The following dialog box that opens:
Figure A-14
6. Enter your new user account name and click OK.
7. Pointsec PC recognizes that you have a user account that uses a smart
card for authentication. It confirms that this is the first time you are
logging on with the new user account name. The following dialog box is
displayed:
Appendix A
Being Authenticated by Pointsec PC
213
Using a Smart Card/USB Token
Figure A-15
8. Click Continue. The following dialog box is displayed:
Figure A-16
9. Select the certificate you want to use and click OK. Pointsec PC
confirms your selection of a certificate:
214
Using a Smart Card/USB Token
Figure A-17
10. Click OK. The following dialog box is displayed:
Figure A-18
11. Enter your PIN and click OK.
Appendix A
Being Authenticated by Pointsec PC
215
Synchronizing Passwords
Figure A-19
Note - Regardless of the keyboard layout used, we recommend that you
use smart card PINs that are comprised only of ASCII characters:
!"#$%&'()*+,-./ 0123456789:;<=>?@
ABCDEFGHIJKLMNOPQRSTUVWXYZ
[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
The space character is also an ASCII character.
12. Pointsec PC communicates with the smart card and performs
authentication:
Figure A-20
13. Click OK.
Synchronizing Passwords
If your Pointsec PC password is synchronized with your Windows password,
you can use your Windows password to authenticate yourself to
Pointsec PC.
To synchronize passwords:
1. Authenticate yourself as usual to Pointsec PC and Windows. The
following dialog box opens:
216
What if I forget my password?
Figure A-21
2. Enter your Pointsec PC password and click OK. The following dialog box
opens:
Figure A-22
3. Click OK. From now on, use your Windows password when
authenticating yourself to Pointsec PC.
Note - Whenever you change your Pointsec PC password or your
Windows password, Pointsec PC automatically synchronizes the
passwords again.
What if I forget my password?
If you forget your password, you can use Pointsec PC's Remote Password
Change option.
To change your password:
1. Start your Pointsec PC-protected computer. The User Identification
dialog box opens:
Figure A-23
2. Enter your username and select Remote Help. The following dialog box
opens:
Appendix A
Being Authenticated by Pointsec PC
217
What if I don't have access to my token/smart card?
Figure A-24
3. Call your Pointsec PC administrator or helpdesk to guide you through
the password change process.
What if I don't have access to my token/smart
card?
If you do not have access to your dynamic token or smart card, you can
use Pointsec PC's One-time logon option.
To use the One-time logon option:
1. Start your Pointsec PC-protected computer. The User Identification
dialog box opens:
Figure A-25
1. Enter your username and select Remote Help. The following dialog box
opens:
218
Pointsec PC Single Sign-on (SSO)
Figure A-26
2. Call your Pointsec PC administrator or helpdesk to guide you through
the one-time logon process.
Pointsec PC Single Sign-on (SSO)
SSO automatically logs you onto Windows once you have been
authenticated by Pointsec PC.
Note - Your Pointsec PC administrator decides if you will have access to
SSO.
To enable SSO:
1. Authenticate yourself as usual, for example:
Figure A-27
Tip - If you do not want to use SSO, deselect the SSO Active option.
Appendix A
Being Authenticated by Pointsec PC
219
Pointsec PC Single Sign-on (SSO)
2. Click OK.
220
Appendix
Status Information When
Exported to File
B
PS Control Command Line Utility
The information reflecting the status of an installation can be exported to
a file. The fields in such a file whose meanings might not be clear are
described in the table below. A sample status export file is also listed
below, see “Sample Export Status File” on page 222.
Table B-1
Item
Explanation
Autologon
0 = Windows Integrated Logon is not enabled.
1 = Windows Integrated Logon is enabled.
Disk Number
A zero-based index of the hard drives on this
computer.
Volume Number
A zero-based index of the volumes on this computer.
Source
Algorithm
The algorithm that is currently in use. It can one of
the following values:
• AES
• 3DES
• Blowfish 56/256 bits
• CAST
• None
• Invalid Key
221
Table B-1
Destination
Algorithm
If this algorithm is different from the source
algorithm, the driver is currently encrypting/decrypting
in the background. It can one of the following values:
• AES
• 3DES
• Blowfish 56/256 bits
• CAST
• None
• Invalid Key
Volume State
Indicates the state of the volume or the encryption
action currently being carried out. It can have one of
the following values:
• 0 = Unencrypted
• 1 = Encrypting
• 2 = Decrypting
• 3 = Encrypted
• 4 = Reencrypting
• 255 = Missing
Current State
Value
Indicates the current state of the volume encryption;
it can have one of the following values:
• 0-100 = % completed
• 101 = Internal error
• 102 = Internal error
• 255 = Completed
Sample Export Status File
Status
-----Misc
---System ID:b3b393261b4906bac15c29077ad1793c
Version:6.2.0
Driver:5.0 sr1.1
Update Password:0
Wake On LAN:0
Autologon:0
User:ADMIN
Management Console User:
222
Config
-----Last Local Configuration Change:
Last Profile Configuration Change:
Recovery
-------Last Recovery File Update:2007-05-30 12:32:13+02:00
Last Recovery File Delivery:2007-05-30 12:32:13+02:00
Logfile
------Last Log File Update:2007-05-30 12:32:13+02:00
Last Log File Delivery:2007-05-30 12:32:13+02:00
Encryption
---------Disk Number:0
Volume Number:0
Source Algorithm:AES
Destination Algorithm:AES
Volume State:3
Current State Value:255
Disk Number:1
Volume Number:1
Source Algorithm:AES
Destination Algorithm:AES
Volume State:3
Current State Value:255
Disk Number:1
Volume Number:2
Source Algorithm:AES
Destination Algorithm:AES
Volume State:3
Current State Value:255
Appendix B
Status Information When Exported to File
223
224
C
Appendix
Pointsec PC Permissions
Pointsec PC Permissions
This appendix describes the permissions Pointsec PC requires.Permissions
Overview
Table C-1
Permissions
Directory/
Application
Admin
Install
dir
Registry
Recovery
dir
Profile
dir
\System
32
Update
dir
Install
Yes
-
-
-
-
-
-
Remove
Yes
-
-
-
-
-
-
Uninstall profile
No
R,L,X,D,
M,C,W
R
-
(R,L,D,
M,C,W)1
-
-
PCMC
No
R,L,X
R
-
-
-
-
Create recovery
disk(s)
No
R,L,X
-
-
-
-
-
Tray (Px2)
No
R,L,X,(D
,M,C,W)
F3
-
-
-
-
2
Recovery
No
R,L,X,D,
M,C,W
R
R,L,X,D,
M,C,W
-
-
-
Central log
No
R,L,X,D,
M,C,W
R
R,L,X,D,
M,C,W
-
-
-
PCMCUtil
No
-
R
-
R,L,(D,
M,C,W)4
-
-
PS Control
No
-
-
-
-
R,L,X,D,
M,C,W
-
R=Read, W=Write, L=List, X=Execute, M=Modify, D=Delete, C=Create.
A dash (-) means Not Applicable.
225
1
Required to publish profiles.
2
Required for Profile.dat.
3
Full access is required because the language setting for the Pointsec PC
Management Console (PCMC) is stored in the registry.
4
D,M,C and W are required for the creation of the Px2 directory.
Install
Install corresponds to performing an installation of Pointsec PC. This
requires that the user be logged in with Administrator permissions.
Remove
Remove corresponds to removing the Pointsec PC application via the
Windows Add/Remove Programs tool. This requires that the user be logged
in with Administrator permissions.
Uninstall Profile
Uninstall profile corresponds to removing the Pointsec PC protection of
volumes. In the Windows environment this process is handled by P95tray.
PCMC
PCMC corresponds to the executable file PointsecForPC. The application
normally does not require any permissions for the Profile directory, however
in order to publish profiles it requires the permissions specified in the
table above.
Create Recovery Disk(s)
Create recovery disk(s) corresponds to the executable file UseRec.
Tray (Px2)
Tray corresponds to the executable P95tray, which uses two other
executables for performing some actions. The required permissions for
these executables are presented in their own chapters.
Tray Recovery
Tray Recovery corresponds to the actions performed by the executable
CreRec. The permissions listed above are required by CreRec for the
C:\Documents and Settings\All Users\Application Data\Pointsec
directory and for the directory specified in the PCMC (under Local → Edit
Settings → Pointsec for PC → System Settings → Install → Set Recovery Path)
because CreRec writes the recovery file to these directories. If these
permissions are not granted, recovery file functionality will not work
properly.
226
Permissions: With Pointsec PC Service Start
Note that, by default, all users have full permissions for C:\Documents and
Settings\All Users\Application Data\Pointsec. If you experience
problems writing or accessing the recovery file, ensure that the default
permissions have not been changed.
Central Log
Central Log corresponds to the actions performed by the executable
CentralLog. CentralLog requires the permissions shown in the Pointsec install
dir and the Recovery dir since it writes log files to these directories. If these
permissions are not granted, the remote logging and Event viewer will not
receive new log events.
PCMCUtil
PCMCUtil corresponds to the actions performed by the tray using the DLL
PCMCUtil.dll. The DLL requires the shown permissions in the Profile
directory since it writes recovery and log files the directory.
PS Control
PS Control corresponds to the actions performed by the executable
pscontrol. The executable requires the shown permissions in the Pointsec
install dir and the System32 directory in order to install Windows language
files.
Permissions: With Pointsec PC Service Start
Recommended Users
The table below describes which users are recommended to run
applications and perform specific tasks. X(O) denotes that this is the only
possible solution, and X(P) denotes that it is controlled by P4PC.
Table C-2
Recommended users for Service Start
User/Application
Administrator
Install
X(O)
Remove
X(O)
X
X
X(P)
Tray
Recovery
X(P)
Central log
X(P)
PS Control
User
X(P)
Uninstall profile
PCMC
Service Account
X
Appendix C
Pointsec PC Permissions
227
Required Permissions
Required Permissions
The table below describes the required permissions for the recommended
setup above. Note that the Service account must be a member of the
Administrator group in order to run Service Start.
Table C-3
Required permissions for Service Start
Application/Directory
Admin
Normal User
Computer Admin
X
N
R,L,X,D,M,C,W
Pointsec Install directory
R,L,X,(D,M,C,W)
2
Service Account
X
1
R,L,X,D,M,C,W
Pointsec Registry
F
F
F
Recovery directory
R,L,X
R,L,X
R,L,X,D,M,C,W
Profile directory
N
N
R,L,X
System32
R,L,X,D,M,C,W
R,L,X
R,L,X
Update directory
N
N
R,L,X,C
1These
permissions are required in order for Recovery and Log files to be
handled correctly (Profile.dat and possibly more files).
2Full
control is required for updating the Language setting in the registry.
Permissions: Without Pointsec PC Service
Start
If Pointsec Service Start is not used, the normal user requires the same
access permissions the Service account has (apart from being a member of
the Administrator group). In this case, all applications normally run via the
service are executed by the normal user.
Permissions: Remote Desktop
The permissions needed by Remote Desktop users on a
Pointsec PC-installed machine are those required by a locally logged-on
user: full permissions for Program Files → Pointsec and Pointsec PC registry
keys.
228
Windows User Account Registry Permissions
Windows User Account Registry Permissions
To install, upgrade, change language, and import profiles on a Windows
PC, a user account needs the following registry permissions: Query value,
Set value, Create subkey, Enumerate subkey, Notify, Create link, and Read
control.
In order to uninstall on a Windows PC, a user account needs the above
registry permissions plus Delete.
Appendix C
Pointsec PC Permissions
229
Windows User Account Registry Permissions
230
Appendix
Language Support
D
Language Packs
This appendix describes the language support provided in Pointsec PC.
Languages in Pointsec PC are divided into the following two groups:
•
Tier1 languages:
English (UK and US), French, German, Japanese, Italian, and
Spanish.
•
Tier 2 languages:
Chinese Simplified, Chinese Traditional, Czech, Danish, Dutch,
Estonian, Finnish, French Canadian, Greek, Hungarian, Icelandic,
Italian, Korean, Latvian, Lithuanian, Norwegian, Polish, Portuguese
(Brazilian), Portuguese (Iberian), Slovakian, Swedish, and Thai.
The two groups have different levels of supprort in Pointsec PC.
Support for Tier 1 Languages
Tier 1 languages are supported in the:
•
Pointsec PC Management Console (PCMC)
•
Windows envirionment: the logon dialog and the Pointsec PC tray
application)
•
Pointsec PC Preboot Environment (PPBE).
The language must be installed and specified in the PCMC (System
Settings → Install → Select Language) or selected in the tray.
Support for Tier 2 Languages
Tier 2 languages are supported only in the:
231
Support for Tier 2 Languages
•
Windows envirionment (the logon dialog and the Pointsec PC tray
application)
•
Pointsec PC Preboot Environment (PPBE).
They are not supported in in the Pointsec PC Management Console
(PCMC).
The language must be installed and specified in the PCMC (System
Settings → Install → Select Language) or selected in the tray.
Which Language Is Displayed in the PCMC When Using a Tier 2
Language?
When using a tier 2 language, the language displayed in the PCMC is US
English, with the following exception: if French (Canadian) is used, French
is displayed in the PCMC.
232
Appendix
Language Packs
E
Language Packs
The language packs listed in this appendix are delivered with Pointsec PC.
The default language pack is compliant with legacy releases of
Pointsec for PC. Language packs can be installed either before or after
installation.
For Language Pack - 4 Asia and Pacific (APAC) to function correctly, the
required Windows language support must be installed. Other languages, for
example Greek, can also require the installation of Windows language
support, depending on which version of Windows is installed.
Installing Language Packs
Language packs other than the default pack can be installed either before
or after the installation of Pointsec PC.
Before Installation of Pointsec PC
To install language packs before installing Pointsec PC:
1. Open the Language Pack folder.
2. Copy the LANGUAGE.LNG and the Plang32.lng file for the language
pack(s) you want to the directory that contains the Pointsec for
PC.msi file.
3. Proceed with the Pointsec PC installation.
233
After Installation of Pointsec PC
After Installation of Pointsec PC
The PS Control command line utility is used for installing language packs
other than the default pack after the installation of Pointsec PC. The PS
Control program, pscontrol.exe, is found in the Pointsec PC folder, which
is located in the Pointsec folder under Program Files. For more information
on the PS Control program and details on using it to install language
packs, see Appendix G, “PS Control Command Line Utility”.
Language Packs
The tables below list the language packs delivered with Pointsec PC.
Legacy Language Pack (Default)
Table E-1
Legacy language pack
Languages in the Legacy (Default) Language Pack
English - US
English - UK
Swedish
German
Spanish
French
Japanese
Slovak
2 - Americas
Table E-2
Americas language pack
Languages in Language Pack 2 - Americas
English - US
English - UK
Canadian French
Spanish
234
3 - Scandinavian and Baltic
Table E-2
Americas language pack
Languages in Language Pack 2 - Americas
Brazilian Portuguese
Iberian Portuguese
Dutch
3 - Scandinavian and Baltic
Table E-3
Scandinavian and Baltic language pack
Languages in Language Pack 3 - Scandinavia and Baltic
English - US
Swedish
Finnish
Norwegian
Danish
Icelandic
Estonian
Latvian
Lithuanian
4 - Asia and Pacific (APAC)
Note that the relevant APAC language resources must be available in
Windows for an APAC language to function correctly in the Management
Console.
Table E-4
Asia and Pacific (APAC) language pack
Languages in Language Pack 4 - Asia and Pacific (APAC)
English - US
English - UK
Japanese
Simplified Chinese
Traditional Chinese
Korean
Thai
Appendix E
Language Packs
235
5 - Europe 1
5 - Europe 1
Table E-5
Europe 1 language pack
Languages in Language Pack 5 - Europe 1
English - US
English - UK
German
French
Spanish
Italian
Greek
Dutch
Iberian Portuguese
6 - Europe 2
Table E-6
Europe 2 language pack
Languages in Language Pack 6 - Europe 2
English - US
English - UK
Czech
Hungarian
Polish
Slovak
German
7 -All
Table E-7
All language pack
Languages in Language Pack 7 - All
All languages in the above packages
236
F
Appendix
Keyboard Layouts
Keyboard Layouts
This appendix presents the keyboard layouts supported by Pointsec PC.
Supported Keyboard Layouts
Pointsec PC supports the following keyboard layouts:
Table F-1
Supported keyboard layouts
Keyboard Layout
Locale Code
English (Canada)
0x1009
English (Ireland)
0x1809
English (United Kingdom)
0x0809
English (United States)
0x0409
French (Belgium)
0x080c
Danish (Denmark)
0x0406
Dutch (Belgium)
0x0813
Dutch (Netherlands)
0x0413
Estonian (Estonia)
0x0425
Finnish (Finland)
0x040b
French (France)
0x040c
French (Switzerland)
0x100c
German (Germany)
0x0407
German (Switzerland)
0x0807
Greek (Greece)
0x0408
Icelandic (Iceland)
0x040f
237
Supported Keyboard Layouts
Table F-1
Supported keyboard layouts
Keyboard Layout
Locale Code
Italian (Italy)
0x0410
Japanese (Japan) (Only Latin letters and
symbols are supported)
0x0411
Latvian (Latvia)
0x0426
Lithuanian (Lithuania)
0x0427
Norwegian (Bokmål) (Norway)
0x0414
Portuguese (Brazil)
0x0416
Portuguese (Portugal)
0x0816
Slovak (Slovakia)
0x041b
Spanish (Spain)
0x040a
Swedish (Sweden)
0x041d
Note - The keyboard layouts available in Windows can also be selected
in the Pointsec PC preboot environment by pressing ALT+Shift.
238
Appendix
PS Control Command Line
Utility
G
PS Control Command Line Utility
The PS Control command line utility is meant for administrators. An
administrator uses the utility to develop a script (for example, a .bat file)
that carries out certain tasks on a machine. The script can also be
deployed to carry out tasks on remote machines when users log on.
The PS Control command line utility can be used to manage drivers related
to smart cards, export the status information of a machine and install
language packs.
The PS Control program file, pscontrol.exe, is found in the Pointsec PC
folder, which is located in the Pointsec folder under Program Files.
Using the PS Control Utility
The PS Control utility is command based. Each command carries out only
one specific task, and only one command can be executed per call. The
format of the command is as follows:
pscontrol [option] <command>
where option and command can be any of those in the respective table
below.
239
Options
Options
PS Control offers the following options:
Table G-1
PS Control utility options
Option
Description
-l
Write a log to <filename>.
-v
Be verbose.
Commands
The following commands can be executed using PS Control:
Table G-2
PS Control utility commands
Command
Description
install-driver
Installs the driver whose filename is specified in the command. The
driver must be registered in the Pointsec PC registry before it can be
installed.
remove-driver
Removes the driver whose filename is specified in the command. The
driver must be unregistered before it can be removed.
list-drivers
Displays a list of currently installed drivers on this machine.
register-prd
Registers the smart card reader driver whose .inf file is specified as the
filename in the command. The driver must be registered in the
Pointsec PC registry before it can be installed.
register-ptd
Registers the smart card driver whose .inf file is specified as the filename
in the command. The driver must be registered in the Pointsec PC
registry before it can be installed.
unregister-prd
Unregisters the smart card reader driver whose .inf file is specified as the
filename in the command.
unregister-ptd
Unregisters the smart card driver whose .inf file is specified as the
filename in the command.
extract-prd
Extracts the contents of the smart card reader driver registry and writes
this information to the filename specified in the command.
extract-ptd
Extracts the contents of the smart card driver registry and writes this
information to the filename specified in the command.
install-pb-language
Installs the preboot language file (LANGUAGE.LNG) whose filename is
specified in the command.
install-win-language
Installs the Windows language file (Plang32.lng) whose filename is
specified in the command.
export-status
Exports the status of the machine to <filename>. The file is in XML
format.
240
Error Codes
Error Codes
The error codes in the table below are returned by the PS Control utility so
a script can determine whether it has completed successfully.
Table G-3
PS Control utility error codes
Error
Code
Description
0
Operation successful.
1
An incorrect argument was specified in the pscontrol
command.
2
Incorrect filename specified. Issued if the file cannot be
opened, if the file does not exist in the registry (when
installing a driver), or if the file format is incorrect.
3
A Pointsec PC installation cannot be found on this
machine.
4
The operation terminated unexpectedly. This can happen
when a read/write to the Pointsec PC system area fails,
which indicates an error in the local installation of
Pointsec PC or a corrupt local installation.
Examples of Using the PS Control Utility
Registering Drivers
C:\Program Files\Pointsec\Pointsec for PC>pscontrol -v
register-ptd D:\Modules\ptd.inf
Connected to Pointsec 6.0.0 (2005-12-14 19:21:55 Build 1018).
Replacing section "RSA SecureID 800".
Replacing section "RSA Smart Card 5200".
Replacing section "RSA Smart Card 6100(eGate)".
Replacing section "Schlumberger Cyberflex e-Gate".
Replacing section "Schlumberger Cyberflex e-Gate 32K".
Replacing section "Schlumberger Cyberflex 32K".
Replacing section "Schlumberger Cyberflex 8K".
Replacing section "Aladdin eToken".
Installing a Driver
C:\Program Files\Pointsec\Pointsec for PC>pscontrol -v
install-driver D:\Modules\msc_p11.bin
Appendix G
PS Control Command Line Utility
241
Smart Cards, Smart Card Readers and their Drivers
Connected to Pointsec 6.0.0 (2005-12-14 19:21:55 Build 1018).
Writing 285274 bytes...
Exporting Status Information
C:\Program Files\Pointsec\Pointsec for PC>pscontrol.exe
export-status mystatus.xml
Executing query – STATUS
Creating output status file as ‘mystatus.xml’
SUCCESS: Export complete
Smart Cards, Smart Card Readers and their
Drivers
Pointsec PC 6.x supports authentication using smart cards. To authenticate
a user via a smart card, Pointsec PC must be able to communicate with
both the smart card and the smart card reader. This requires one driver for
communicating with the card and another driver for communicating with
the card reader. Note that smart cards that function as a combined card
and card reader unit (for example, the RSA SecureID 800) still require two
drivers, one for the card and one for the reader. Note also that some
drivers support more than one smart card or smart card reader.
Because smart cards from different manufacturers, and even different
models of smart cards from the same manufacturer, communicate
differently, Pointsec PC provides a variety of drivers. Pointsec PC
maintains a registry of the supported smart cards and smart card readers
(There are smart cards on the market that Pointsec PC does not support,
and no drivers for these smart cards are provided).
You use the PS Control command line utility to register smart cards and
smart card readers in the Pointsec PC registry and to unregister smart
cards and smart card readers in that registry. The utility also enables you
to install drivers on the Pointsec PC system after they have been
registered. Note that a driver must be registered before it can be installed.
This enables you to use smart cards and smart card readers that are
supported after the release of Pointsec PC.
242
Managing Smart Cards, Smart Card Readers and Drivers
Managing Smart Cards, Smart Card Readers and
Drivers
Drivers supported by Pointsec PC at the time of delivery are provided on
the Pointsec PC CD. The drivers required to communicate with the smart
cards and smart card readers your enterprise uses must be installed on the
machines that will use this smart card authentication. The installation is
usually done by a script that executes PS Control commands.
Similarly, you can also remove a driver or unregister a driver via a script, as
well as list all the currently installed drivers, using PS Control.
Registering a Driver
To register a driver you must have an .inf file, which is usually delivered
together with the driver. The .inf file contains information about the driver
or drivers, for example identifying the driver or drivers and the hardware it
or they communicate with.
Note - The drivers on the Pointsec PC installation CD have already been
registered. Registration is required only for drivers that have not been
released together with the Pointsec PC package.
See “Registering Drivers” on page 241 for an example of using the PS
Control utility to register a driver.
Installing a Driver
See “Installing a Driver” on page 241 for an example of using the PS
Control utility to install a driver.
Removing a Driver
Exporting a Machine’s Status Information
The PS Control utility can be used to export status information about a
specific machine. The information is exported in an XML file, which can
be input to a program that processes the status information.
See the following table for a description of tags in an export status file,
and see “Exporting Status Information” on page 242 for an example of
using the PS Control utility to export status information.
Appendix G
PS Control Command Line Utility
243
Export Status File
Export Status File
Description of Tags
The following table contains a description of the most significant tags in
the Export Status file. See “Sample Export Status File” on page 246 for
an example of the file.
Table G-4
Significant tags in the Export Status file
Tag
Description of Tag Contents
VERSION
The version of Pointsec PC currently installed on the machine.
UPDPWD
Specifies if the update validation password has been set. 0 = No, 1 = Yes.
WAKEONLA
N
Specifies whether Wake-on-LAN is enabled. 0 = No, 1 = Yes.
AUTOLOGON
Specifies whether Windows Integrated Logon is enabled. 0 = No, 1 = Yes.
USER
User account name of the user account currently logged on to this machine.
This information is Base64 encoded.
LOCAL
Date, time, and user account name of the user account that last updated the
configuration of Pointsec PC on this machine. The date, time, and user
account name are in the following format:
yyyy-mm-dd hh:mm:ss - USERACCOUNTNAME.
This information is Base64 encoded.
PROFILE
User account name of the person who created or edited the profile that last
updated this machine. This information is Base64 encoded.
RECOVERY
UPDATE
Date and time when recovery information was last updated. This information is
Base64 encoded.
RECOVERY
DELIVERY
Date and time when recovery information was last sent to the directory defined
in the specified recovery path. This information is Base64 encoded.
LOGFILE
UPDATE
Date and time when log information was last updated. This information is
Base64 encoded.
LOGFILE
DELIVERY
Date and time when log information was last sent to the directory defined in
the specified log path. This information is Base64 encoded.
DISKNR
Number of the hard disk drive. Numbering begins with zero.
VOLNR
Volume number of the hard disk. Numbering begins with zero.
244
Export Status File
Table G-4
Significant tags in the Export Status file
Tag
Description of Tag Contents
ALGO1
Current algorithm in use. The tag can have one of the following values:
AES
• 3DES
• Blowfish 56/256 bits
• CAST
• None
• Invalid Key
See also the description of ALGO2, below.
ALGO2
The target algorithm. During encryption, this is the algorithm being used to
encrypt the volume. During decryption, the value will be None. When encryption
is completed, the values of ALGO1 and ALGO2 are identical.
The tag can have one of the following values:
• AES
• 3DES
• Blowfish 56/256 bits
• CAST
• None
• Invalid Key
STATE
State of encryption of this volume (VOLNR) on the disk. Can be one of the
following values:
• 0 = Clear
• 1 = Encrypting
• 2 = Decrypting
• 3 = Encrypted
• 4 = Re-encrypting
• 255 = Missing
VALUE
Value may have one of the following values:
• 0-100 = % of encryption completed
• 101 = Internal error
• 102 = Internal error
• 255 = Encryption completed
Note that 255 can also mean “processing completed” when both ALGO1
and ALGO2 are None, as there has been no encryption and this fact has
been registered.
Appendix G
PS Control Command Line Utility
245
Export Status File
Sample Export Status File
The following is an example of an export status file:
<?xml version="1.0" encoding="UTF-8"?>
<RETURN>
<STATUS>
<MISC>
<VERSION>6.1.3 (2006-11-06 09:17:12 Build 1113)</VERSION>
<DRIVER>5.0 sr1.1</DRIVER>
<UPDPWD>1</UPDPWD>
<WAKEONLAN>0</WAKEONLAN>
<AUTOLOGON>0</AUTOLOGON>
<USER>QURNSU4=</USER>
<MCUSER/>
</MISC>
<CONFIG>
<LOCAL>MjAwNi0xMS0xNiAxNDo1NDoxMCswMjowMCAtIFN5c3RlbVxBRE1JTg==</
LOCAL>
<PROFILE>MjAwNi0xMS0xNiAxNDo...DXFdPUktcdXBkLnVwcA==</PROFILE>
</CONFIG>
<RECOVERY>
<UPDATE>MjAwNi0xMS0xNiAxNDo1NTozNg==</UPDATE>
<DELIVERY>MjAwNi0xMS0xNiAxNDo1NTozNg==</DELIVERY>
</RECOVERY>
<LOGFILE>
<UPDATE>MjAwNi0xMS0xNiAxNDo1NTozNg==</UPDATE>
<DELIVERY>MjAwNi0xMS0xNiAxNDo1NTozNg==</DELIVERY>
</LOGFILE>
<ENCRYPTION>
<VOL>
<DISKNR>0</DISKNR>
246
Installing Language Packs
<VOLNR>0</VOLNR>
<ALGO1>AES</ALGO1>
<ALGO2>AES</ALGO2>
<STATE>3</STATE>
<VALUE>255</VALUE>
</VOL>
<VOL>
<DISKNR>0</DISKNR>
<VOLNR>1</VOLNR>
<ALGO1>None</ALGO1>
<ALGO2>AES</ALGO2>
<STATE>1</STATE>
<VALUE>36</VALUE>
</VOL>
<VOL>
<DISKNR>0</DISKNR>
<VOLNR>2</VOLNR>
<ALGO1>None</ALGO1>
<ALGO2>None</ALGO2>
<STATE>0</STATE>
<VALUE>255</VALUE>
</VOL>
</ENCRYPTION>
</STATUS>
</RETURN>
Installing Language Packs
The PS Control utility can also be used to install language packs. Both the
preboot language file and the Windows language file must be installed for
each pack.
Appendix G
PS Control Command Line Utility
247
Installing Language Packs
Take special care to use the command that corresponds to the respective
file (install-pb-language for the preboot language file and install-win-language
for the Windows language file).
To install a language pack:
1. Issue an install-pb-language command in pscontrol.exe, specifying the
file name of the preboot language file (LANGUAGE.LNG) for the language
pack you want to install. If this file is not in the same folder as the
pscontrol.exe program, the entire directory path to the file must be
specified.
2. Issue an install-win-language command in pscontrol.exe, specifying the
file name of the Windows language file (Plang32.lng) for the language
pack you want to install. If this file is not in the same folder as the
pscontrol.exe program, the entire directory path to the file must be
specified.
248
H
Appendix
The pslogexp.exe Log Export
Utility
The pslogexp.exe Log Export Utility
The pslogexp.exe utility is meant for administrators; Read and Execute
permissions are required to run it. This utility must be executed on a
machine running Pointsec for PC 6.1.x or later.
An administrator can use pslogexp.exe to export the local log or the logfile
to console or to redirect the data to a file. Available formats are CSV
(Comma Separated Values), TSV (Tab Separated Values) or XML.
The utility can be used in a script.
pslogexp.exe Utility Syntax and Commands
The syntax and commands for pslogexp.exe are described in this section.
Syntax
The syntax for using pslogexp.exe is as follows:
pslogexp.exe [/?] [commands] [filename]
Description:
Export the log file or local log to console
in the specified format.
Use '>' to redirect to file.
249
Commands
Commands
The following commands are available:
Table H-1
pslogexp.exe commands
Command
Description
csv
Export the log data as comma separated values (default).
tsv
Export the log data as tab separated values.
xml
Export the log data in XML format.
local
Export the local machine’s log data.
heads
Include headings in the log data that is exported. The following headings
are included: Version, Type, Level, Category, Event ID, Source ID, Date and Time, Host,
Heading, Body, Caller, Target, Param3, Param4.
Headings are available only in CSV and TSV data.
?
Help for the pslogexp.exe utility.
The following table contains information on filenames:
Table H-2
Filename information
Filename
Description
filename
On a local machine, the filename will be logfile.log, where logfile is the
computer name of the local machine, for example MYCOMPUTER.
On a remote machine, the filename will be the full path name of the file
to which you will export the log, for example \\Share\COMPUTER02.log.
Examples of Using the pslogexp.exe Utility
Exporting the Local Log
Below is an example of exporting the local log database to a file:
pslogexp.exe /tsv /heads /local >local.tsv
pslogexp.exe /xml /local >local.xml
Note the use of > to redirect the data to the file local.tsv.
Exporting the (remote) logfile
Below is an example of exporting the log files to a file:
pslogexp.exe /tsv /heads "MYCOMPUTER.log" >logfile.tsv
pslogexp.exe /xml "\\Share\COMPUTER02.log" >logfile.xml
pslogexp.exe /xml "c:\logs\MYLOG.log" >logfile.xml
250
Correct Display of National Characters in Exported Files
Note the use of > to redirect the data to the file logfile.tsv.
Correct Display of National Characters in
Exported Files
To ensure the correct display of national characters in the exported logs,
display the CSV or TSV file in Excel after specifying the following settings
(in Excel):
1. In the File drop down menu, select Open.
2. Select the exported CSV or TSV formatted log file and click Open.
3. When the text import guide is displayed, select the Origin:
65001: Unicode (UTF-8)
4. Click OK.
Chapter H
The pslogexp.exe Log Export Utility
251
Correct Display of National Characters in Exported Files
252
Appendix
Pointsec PC and IBM RRU
I
Pointsec PC and IBM RRU
This appendix contains the information you will need for accessing the
IBM Rapid Restore Ultra (RRU) on a system with Pointsec PC installed.
Installing the InstallRRU.msi Package
Before you can access RRU functionality on a system with Pointsec PC
installed, you need to install the InstallRRU.msi package.
Note - Before you install the InstallRRU.msi add-on package, ensure that
you have installed ISScript.msi Version 11 on the computer. Otherwise,
InstallRRU.msi will not work correctly.
To install the InstallRRU.msi package:
1. Locate the InstallRRU.msi add-on package in the 1_Pointsec for
PC\Tools\WinPE directory on your Pointsec PC CD.
2. Install the package.
RRU Functionality on a Pointsec PC Machine
Accessing
After installing the InstallRRU.msi add-on package, you can access RRU
functionality.
253
Using
To restore a backup via RRU, do not access RRU through Windows but
instead as described in the procedure below.
To access RRU functionality for restoring a backup:
1. Log on to the Pointsec PC preboot environment.
2. Immediately after you have logged on to Pointsec PC and before
Windows starts to load, press F11. This will boot the machine into the
RRU partition.
3. Select the backup you want to restore in RRU and continue.
Using
When using RRU on a Pointsec PC machine, never attempt to restore to an
RRU image taken prior to the installation of Pointsec PC.
254
J
Appendix
Pointsec PC Common Criteria
Configuration
Pointsec PC Common Criteria Configuration
Common Criteria (CC) defines a broad, flexible set of requirements for
security products, focusing on development best practices and assurances
that advertised features have been implemented securely. With a CC EAL4
validated product, you are assured that the product is designed according
to strict security engineering standards and quality control.
The CC is a set of functional and assurance IT security requirements that
were developed to provide a common baseline against which IT products
and systems could be tested and evaluated. The results of these
comprehensive security tests are compiled to produce a composite security
score or evaluation level for any given security product. The CC evaluation
methodology can be used for both hardware and software security
products.
Initially supported by the United States, United Kingdom, Germany,
France, Canada and the Netherlands, the CC has since been recognized by
many other countries. Evaluations consider not only the product itself, but
the intended environment for use and the policies and procedures that will
be enforced. The CC has also been codified as ISO standard 15408.
Pointsec Mobile Technologies provides world-class security software for the
protection of personal computers, smart phones and PDAs. A commitment
to achieve CC EAL4 validation is part of the ongoing process of providing
the highest quality security products to our most important security
partners, our customers.
In This Appendix
Common Criteria EAL4 Configuration Requirements
page 256
255
Common Criteria EAL4 Configuration Requirements
Common Criteria EAL4 Configuration
Requirements
The validation of Pointsec PC is done in a specific secure configuration. To
use Pointsec PC as a validated product, this configuration must be used on
the installed computer. To properly implement a CC EAL4 validated
configuration of Pointsec PC, specific settings must be configured in the
profile that will be deployed.
Cryptographic Algorithms and Key Sizes
The algorithms and key sizes allowed in a CC configuration are:
•
3DES 168-bit
•
AES 256-bit
All Partitions Encrypted, Boot Protection Enabled
To ensure that the system is secure, all partitions must be encrypted
and preboot protection must be enabled.
In an Installation Profile
Use the Select Volume Protection setting under System Settings/Install to:
•
specify the algorithm to be used
•
select Encryption for all the volumes, and
•
select Preboot Auth. (preboot authentication) for all volumes.
In a Master Installation
Select Boot protection and Encryption, then choose the required
algorithm in the Protect volumes InstallShield Wizard window.
No Delete Access to the Pointsec File Share
Users of Pointsec PC-protected computers may have only RX
permissions to the Pointsec share. This is accomplished by setting up
a Pointsec Service Start Account in the Pointsec PC profile deployed
on computers. See Chapter 10, “Using a Service Start Account” for
instructions.
Wake on LAN
The setting Enable Wake on LAN must be disabled. This setting is found
under System Settings → Wake on LAN. Wake-on-LAN is a feature in
many computers today whereby the computer can be automatically
256
Windows Integrated Logon
started when it receives a specific signal from the network. The
administrator can then perform maintenance on the computer without
having to visit its physical location.
Windows Integrated Logon
The setting Windows Integrated Logon must be disabled. This setting is
found under System Settings → Windows Integrated Logon. Windows
Integrated Logon enables to user to bypass preboot authentication at
startup.
User Level Privileges
The user account authority level must not have any administrative
privileges, and must not have more than the privileges View Logs and
Uninstall. These settings are located under System → Group Settings →
Permissions for groups and under System → Account Settings →
Permissions for user accounts.
The View Logs privilege is only necessary if normal users are allowed to
view the logs of the system in question. The Uninstall setting will allow
a user to uninstall the Pointsec PC software from the computer if, and
only if, the uninstallation is performed together with an administrator
(or another user) who has Uninstall authority.
Local Administration Disabled
The local administration program must be disabled for all clients, that
is, machines not used for system administration and administration,
e.g. creating profiles, updating profiles and providing remote help. The
setting Management Console Logon must be disabled on all clients. These
settings are located under System → Group Settings → Permissions for
groups and under System → Account Settings → Permissions for user
accounts.
Administration and Configuration via Profiles
All administration and configuration of client installations must be
performed via profiles. The only local administration allowed is the first
initial administration of an administration installation that is used to
create an initial installation profile to be used to install the clients. All
updates and new installation profiles for both clients and
administration are then maintained via profiles, created on an
administration installation.
Appendix J
Pointsec PC Common Criteria Configuration
257
Software Upgrade between Common Criteria Versions Only
Software Upgrade between Common Criteria Versions
Only
Only upgrading between CC-certified versions of Pointsec PC is
allowed.
Password Requirements
If fixed passwords are used for authentication, they should match the
strength requirements of the information they are protecting. The
required configuration is:
•
Minimum length of 8 characters
•
Numbers and letters
•
Both uppercase and lowercase letters
•
No more than two consecutive identical characters
The following configuration is recommended, but not required:
•
Disallow 6 previous passwords
•
Expiration of 90 days
These recommendations do not apply to users using dynamic tokens or
smart cards for authentication.
Password Synchronization Requirements
Password synchronization must be inactivated in a CC-validated
environment.
Maximum Failed Logons before Reboot
The value of Max Failed Logons Before Reboot must be set to three or
fewer in a CC-validated environment.
258
Appendix
Importing Encryption Keys
K
Importing Encryption Keys
In Pointsec PC, partition keys (used for encryption of volumes) and the
material used for protecting them are normally generated using an internal
random number generator. However, externally generated keys (random
data) can also be imported for use as partition keys and data used to
protect partition keys.
This appendix includes an explanation of the key import directory structure
and the settings that must be specified in the precheck.txt file. It also
describes end-user interactions related to key import that might be
required during Pointsec PC installation.
Preparing to Use Imported Encryption Keys
Key Import Directory Structure
The system administrator must prepare a key import directory structure
that contains the keys that will be imported, among other things. This
directory must have the following structure:
•
Keys folder
Contains the keys. The keys must be stored in PKIF format.
The files must have a filename with the format KEYnnnn.DAT, where
the first key file is KEY0001.DAT, the second is KEY0002.DAT, and so
on.
•
FLOPKEY.DAT file
A transport key used to ensure the integrity of the key files.
259
precheck.txt File
•
Optional PWD.DAT file
Contains the password that has been used to protect the key files.
If this password is provided in a PWD.DAT file in this directory
structure, it does not have to be entered by the user. If it is not
provided in a PWD.DAT file, the user will be prompted to enter the
password when it is time for the system to use the key file to
encrypt a partition.
precheck.txt File
precheck.txt contains settings for the Pointsec PC installation, including
two settings that are relevant to importing keys. The precheck.txt file is
located in the same folder as the Pointsec PC.msi file.
The settings relevant to key import are described below - for a full
description of the precheck.txt file, see the Pointsec PC Installation
Guide.
precheck.txt Settings for Encryption Key Import
The following table describes the settings relevant to encryption key import
that you can configure in precheck.txt:
260
Administrator Checklist for Importing Encryption Keys
Table K-1
precheck.txt key import settings
Setting
Description
KeyImportDirectory=
Path to the key import directory.
Specifying a path for this setting activates encryption key import. If
this path is not supplied, key import will not be activated.
Best practice is to specify the path in UNC format:
\\<server>\<share>\....
KeyImportMethod=
Specify how the imported random data will be processed when used
to make keys:
• Combine (Default)
Partition keys are generated by combining the imported random
data with random data generated by Pointsec PC.
Data used to protect partition keys is generated by combining
partition keys with random data generated by Pointsec PC.
• Direct
The imported random data is used ‘as is’ as a partition key.
Data used to protect partition keys is generated by combining
partition keys with random data generated by Pointsec PC.
You cannot use the key import directory’s PWD.DAT file when
using this method.
Administrator Checklist for Importing
Encryption Keys
The following list consists of administrator actions related to importing
encryption keys, focusing on tasks the administrator will want to ensure
have been completed before implementing the import of encryption keys:
•
Be familiar with the tool used to generate random data to be used
for encryption keys.
•
Ensure that the password used to protect the key files is provided.
The password must consist of uppercase ASCII characters, and can
be from 0 to 31 characters long. The length 0 corresponds to an
empty password.
•
If the password protecting the key files is to be provided
automatically during installation, ensure that the password is
stored in a PWD.DAT file and that this file is stored correctly in the
key import directory. Note that an empty password can be provided
in the same way (empty PWD.DAT file).
Appendix K
Importing Encryption Keys
261
End-user Interaction During Installation
•
Calculate the number of key files required for each installation (the
number of volumes that will be encrypted + the number of smart
card user accounts that will be added during installation).
•
Specify the required precheck.txt settings to enable encryption
key import.
•
Ensure that the KeyImportDirectory setting correctly specifies the
path to the key import directory.
End-user Interaction During Installation
The following list explains the end-user interaction required if a password
used to protect the key files is not provided in a PWD.DAT file in the key
import directory.
262
•
If smart card user accounts are being added during installation, the
end user must enter a password to unlock the key file. Five
attempts are allowed.
•
The first time the Pointsec PC preboot environment starts, the end
user will be prompted to supply the password required to unlock
the key files. The end user has five attempts in which to supply the
correct password. If the password authentication fails, a dialog
informs the user that the authentication has failed, that the
computer is unprotected, and that Pointsec PC must be uninstalled
manually via Add/Remove Programs.
•
If a PWD.DAT file is used during installation, error information might
be displayed to the end user. End users should contact the
administrator if they are unsure about how they should respond to
this information.
Appendix
Glossary
L
Glossary
Numeric
2-factor authentication
The password to a token used with the token. In
other words: 2-factor authentication is something you know, used together
with something you have. Access is granted only when you use the two
together.
A
Access control The process of preventing unauthorized access to
computers, programs, processes, or systems. Pointsec for PC access
control includes preventing logged-on users from accessing files, devices,
etc. for which they have no authorization.
AES (Advanced Encryption Standard) A method of encryption selected by
NIST as a replacement for DES and 3DES. AES supports key lengths of
128-bit, 192-bit and 256-bit. AES provides high security with fast
performance across multiple platforms.
Algorithm
In Pointsec products, an algorithm is a mathematical
procedure that manipulates data to encrypt and decrypt it.
Authentication The process of verifying identity or authorization.
Pointsec for PC provides boot protection by enforcing authentication in
Pre-Boot Authentication before the Windows operating system starts.
263
C
Cipher
A cryptographic algorithm.
Ciphertext
Encrypted data.
Cryptography
The study and use of methods designed to make
information unintelligible.
D
DES (Data Encryption Standard) A widely used method of data
encryption.
Dynamic token
A device which generates one-time passwords based on a
challenge/response procedure.
E
Encryption The transformation of plaintext into a less readable form
(called ciphertext) through a mathematical process. A ciphertext may be
read by anyone who has the key to decrypt (undoes the encryption) it.
F
FIPS
Federal Information Processing Standards. See NIST.
K
Key A string of bits used with an algorithm to encrypt and decrypt data.
Given an algorithm, the key determines the mapping of the plaintext to
ciphertext.
Key file In Pointsec for PC, encryption keys are stored in a key file. The
keys are themselves strongly encrypted, i.e. you must enter a password to
access the key file, but you do not then need to enter each key as it is
used.
Key space
The name given to the range of possible values for a key. The
key space is the number of bits needed to count every distinct key. The
longer the key length (in bits), the greater the key space.
264
L
Lockout A method to stop an unauthorized attempt to gain access to the
computer. For example, a three try limit when entering a password. After
three attempts, the system locks out the user.
N
NIST
(National Institute of Standards and Technology) The institute
produces security and cryptography related standards and publishes them
as FIPS documents.
P
Password
A protected/private string of characters, known only to the
authorized user(s) and the system, used to authenticate a user as
authorized to access a computer or data.
Plaintext
Data that has not been encrypted, or ciphertext that has been
decrypted.
S
Security Policy A system of password policies, account lockout policies,
logging policies, administrator and user rights and other policies designed
to protect your system.
Single Sign-on
(SSO) The ability to log on to multiple computers or
servers in a single action by entering a single password.
Smart card
A device which contains the credentials for authentication to
any device that is smart card-enabled.
Strong encryption
A term given to describe a cryptographic system that
uses a key so long that, in practice, it becomes impossible to break the
system within a meaningful time frame.
T
Triple DES (3-DES) Encryption A method of data encryption which uses
three encryption keys and runs DES three times Triple-DES is substantially
stronger than DES.
Appendix L
Glossary
265
U
User name / user ID
system.
266
A unique name by which each user is known to the
THIRD PARTY TRADEMARKS AND COPYRIGHTS
Entrust is a registered trademark of Entrust Technologies, Inc. in the United States and other countries. Entrust’s logos and Entrust product and service
names are also trademarks of Entrust Technologies, Inc. Entrust Technologies Limited is a wholly owned subsidiary of Entrust Technologies, Inc. FireWall-1
and SecuRemote incorporate certificate management technology from Entrust.
Verisign is a trademark of Verisign Inc.
The following statements refer to those portions of the software copyrighted by University of Michigan. Portions of the software copyright © 1992-1996
Regents of the University of Michigan. All rights reserved. Redistribution and use in source and binary forms are permitted provided that this notice is
preserved and that due credit is given to the University of Michigan at Ann Arbor. The name of the University may not be used to endorse or promote
products derived from this software without specific prior written permission. This software is provided “as is” without express or implied warranty.
Copyright © Sax Software (terminal emulation only).
The following statements refer to those portions of the software copyrighted by Carnegie Mellon University.
Copyright 1997 by Carnegie Mellon University. All Rights Reserved.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the
above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that
the name of CMU not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission.CMU
DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN
NO EVENT SHALL CMU BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
The following statements refer to those portions of the software copyrighted by The Open Group.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE OPEN GROUP
BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT
OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
The following statements refer to those portions of the software copyrighted by The OpenSSL Project. This product includes software developed by the
OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/).
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
The following statements refer to those portions of the software copyrighted by Eric Young. THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright © 1998 The Open Group.
The following statements refer to those portions of the software copyrighted by Jean-loup Gailly and Mark Adler Copyright (C) 1995-2002 Jean-loup Gailly
and Mark Adler. This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising
from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and
redistribute it freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an
acknowledgment in the product documentation would be appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.
3. This notice may not be removed or altered from any source distribution.
The following statements refer to those portions of the software copyrighted by the Gnu Public License. This program is free software; you can redistribute
it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at
your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied
warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.You should have
received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge,
MA 02139, USA.
The following statements refer to those portions of the software copyrighted by Thai Open Source Software Center Ltd and Clark Cooper Copyright (c) 2001,
2002 Expat maintainers. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files
(the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute,
sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The
above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS
IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR
267
ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
GDChart is free for use in your applications and for chart generation. YOU MAY NOT re-distribute or represent the code as your own. Any re-distributions of
the code MUST reference the author, and include any and all original documentation. Copyright. Bruce Verderaime. 1998, 1999, 2000, 2001. Portions
copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Cold Spring Harbor Laboratory. Funded under Grant P41-RR02188 by the National
Institutes of Health. Portions copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Boutell.Com, Inc. Portions relating to GD2 format copyright 1999,
2000, 2001, 2002 Philip Warner. Portions relating to PNG copyright 1999, 2000, 2001, 2002 Greg Roelofs. Portions relating to gdttf.c copyright 1999,
2000, 2001, 2002 John Ellson ([email protected]). Portions relating to gdft.c copyright 2001, 2002 John Ellson ([email protected]). Portions relating
to JPEG and to color quantization copyright 2000, 2001, 2002, Doug Becker and copyright (C) 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002,
Thomas G. Lane. This software is based in part on the work of the Independent JPEG Group. See the file README-JPEG.TXT for more information.
Portions relating to WBMP copyright 2000, 2001, 2002 Maurice Szmurlo and Johan Van den Brande. Permission has been granted to copy, distribute and
modify gd in any context without fee, including a commercial application, provided that this notice is present in user-accessible supporting documentation.
This does not affect your ownership of the derived work itself, and the intent is to assure proper credit for the authors of gd, not to interfere with your
productive use of gd. If you have questions, ask. "Derived works" includes all programs that utilize the library. Credit must be given in user-accessible
documentation. This software is provided "AS IS." The copyright holders disclaim all warranties, either express or implied, including but not limited to
implied warranties of merchantability and fitness for a particular purpose, with respect to this code and accompanying documentation. Although their code
does not appear in gd 2.0.4, the authors wish to thank David Koblas, David Rowley, and Hutchison Avenue Software Corporation for their prior
contributions.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of
the License at http://www.apache.org/licenses/LICENSE-2.0
The curl license
COPYRIGHT AND PERMISSION NOTICE
Copyright (c) 1996 - 2004, Daniel Stenberg, <[email protected]>.All rights reserved.
Permission to use, copy, modify, and distribute this software for any purpose
with or without fee is hereby granted, provided that the above copyright
notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT
SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF
CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in
this Software without prior written authorization of the copyright holder.
The PHP License, version 3.0
Copyright (c) 1999 - 2004 The PHP Group. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/
or other materials provided with the distribution.
3. The name "PHP" must not be used to endorse or promote products derived from this software without prior written permission. For written permission,
please contact [email protected].
4. Products derived from this software may not be called "PHP", nor may "PHP" appear in their name, without prior written permission from
[email protected]. You may indicate that your software works in conjunction with PHP by saying "Foo for PHP" instead of calling it "PHP Foo" or "phpfoo"
5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number.
Once covered code has been published under a particular version of the license, you may always continue to use it under the terms of that version. You
may also choose to use such covered code under the terms of any subsequent version of the license published by the PHP Group. No one other than the
PHP Group has the right to modify the terms applicable to covered code created under this License.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
"This product includes PHP, freely available from <http://www.php.net/>".
THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE PHP DEVELOPMENT TEAM OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
268
This software consists of voluntary contributions made by many individuals on behalf of the PHP Group. The PHP Group can be contacted via Email at
[email protected].
For more information on the PHP Group and the PHP project, please see <http://www.php.net>. This product includes the Zend Engine, freely available at
<http://www.zend.com>.
This product includes software written by Tim Hudson ([email protected]).
Copyright (c) 2003, Itai Tzur <[email protected]>
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistribution of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Neither the name of Itai Tzur nor the names of other contributors may be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in
the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the
Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this
permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Copyright © 2003, 2004 NextHop Technologies, Inc. All rights reserved.
Confidential Copyright Notice
Except as stated herein, none of the material provided as a part of this document may be copied, reproduced, distrib-uted, republished, downloaded,
displayed, posted or transmitted in any form or by any means, including, but not lim-ited to, electronic, mechanical, photocopying, recording, or otherwise,
without the prior written permission of NextHop Technologies, Inc. Permission is granted to display, copy, distribute and download the materials in this document for personal, non-commercial use only, provided you do not modify the materials and that you retain all copy-right and other proprietary notices
contained in the materials unless otherwise stated. No material contained in this document may be "mirrored" on any server without written permission of
NextHop. Any unauthorized use of any material contained in this document may violate copyright laws, trademark laws, the laws of privacy and publicity,
and communications regulations and statutes. Permission terminates automatically if any of these terms or condi-tions are breached. Upon termination,
any downloaded and printed materials must be immediately destroyed.
Trademark Notice
The trademarks, service marks, and logos (the "Trademarks") used and displayed in this document are registered and unregistered Trademarks of
NextHop in the US and/or other countries. The names of actual companies and products mentioned herein may be Trademarks of their respective owners.
Nothing in this document should be construed as granting, by implication, estoppel, or otherwise, any license or right to use any Trademark displayed in
the document. The owners aggressively enforce their intellectual property rights to the fullest extent of the law. The Trademarks may not be used in any
way, including in advertising or publicity pertaining to distribution of, or access to, materials in
this document, including use, without prior, written permission. Use of Trademarks as a "hot" link to any website is prohibited unless establishment of such
a link is approved in advance in writing. Any questions concerning the use of these Trademarks should be referred to NextHop at U.S. +1 734 222 1600.
U.S. Government Restricted Rights
The material in document is provided with "RESTRICTED RIGHTS." Software and accompanying documentation are provided to the U.S. government
("Government") in a transaction subject to the Federal Acquisition Regulations with Restricted Rights. The Government's rights to use, modify, reproduce,
release, perform, display or disclose are
restricted by paragraph (b)(3) of the Rights in Noncommercial Computer Software and Noncommercial Computer Soft-ware Documentation clause at
DFAR 252.227-7014 (Jun 1995), and the other restrictions and terms in paragraph (g)(3)(i) of Rights in Data-General clause at FAR 52.227-14,
Alternative III (Jun 87) and paragraph (c)(2) of the Commer-cial
Computer Software-Restricted Rights clause at FAR 52.227-19 (Jun 1987).
269
Use of the material in this document by the Government constitutes acknowledgment of NextHop's proprietary rights in them, or that of the original creator.
The Contractor/Licensor is NextHop located at 1911 Landings Drive, Mountain View, California 94043. Use, duplication, or disclosure by the Government
is subject to restrictions as set forth in applicable laws and regulations.
Disclaimer Warranty Disclaimer Warranty Disclaimer Warranty Disclaimer Warranty
THE MATERIAL IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTIES OF ANY KIND EITHER EXPRESS OR IMPLIED. TO THE FULLEST
EXTENT POSSIBLE PURSUANT TO THE APPLICABLE LAW, NEXTHOP DISCLAIMS ALL WARRANTIES,
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE, NON INFRINGEMENT OR OTHER VIOLATION OF RIGHTS. NEITHER NEXTHOP NOR ANY OTHER PROVIDER OR DEVELOPER OF
MATERIAL CONTAINED IN THIS DOCUMENT WARRANTS OR MAKES ANY REPRESEN-TATIONS REGARDING THE USE, VALIDITY, ACCURACY, OR
RELIABILITY OF, OR THE RESULTS OF THE USE OF, OR OTHERWISE RESPECTING, THE MATERIAL IN THIS DOCUMENT.
Limitation of Liability
UNDER NO CIRCUMSTANCES SHALL NEXTHOP BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES,
INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR PROFIT, ARISING OUT OF THE USE, OR THE INABILITY TO USE, THE MATERIAL IN THIS
DOCUMENT, EVEN IF NEXTHOP OR A NEXTHOP AUTHORIZED REPRESENTATIVE HAS ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IF YOUR
USE OF MATERIAL FROM THIS DOCUMENT RESULTS IN THE NEED FOR SERVICING, REPAIR OR CORRECTION OF EQUIPMENT OR DATA, YOU
ASSUME ANY COSTS THEREOF. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES,
SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT FULLY APPLY TO YOU.
Copyright © ComponentOne, LLC 1991-2002. All Rights Reserved.
BIND: ISC Bind (Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC"))
Copyright 1997-2001, Theo de Raadt: the OpenBSD 2.9 Release
PCRE LICENCE
PCRE is a library of functions to support regular expressions whose syntax and semantics are as close as possible to those of the Perl 5 language. Release
5 of PCRE is distributed under the terms of the "BSD" licence, as specified below. The documentation for PCRE, supplied in the "doc" directory, is
distributed under the same terms as the software itself.
Written by: Philip Hazel <[email protected]>
University of Cambridge Computing Service, Cambridge, England. Phone:
+44 1223 334714.
Copyright (c) 1997-2004 University of Cambridge All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or
other materials provided with the distribution.
* Neither the name of the University of Cambridge nor the names of its contributors may be used to endorse or promote products derived from this
software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
270
Index
A
Access to Local setting 54
Access to Remote setting 54
Account Settings 45
accounts 71
delete 130
edit 130
group 71
service 127
administering 259
administration
levels 9
administrators 10
algorithms 256
Allow 20
Allow a Slave Hard Drive 20
Allow Consecutive, Identical
Characters
default and effective value 74
Allow Consecutive, Identical
Characters setting 30, 49
Allow Embedded Space Characters
default and effective value 74
Allow Embedded Space Characters
setting 30, 50
Allow Hard Drive To Be Slaved
setting 20
Allow Hibernation and Crash
Dumps setting 27
Allow Leading or Trailing Space
Characters
default and effective value 74
Allow Leading or Trailing Space
Characters setting 30, 50
Allow Logon to Hibernated System
default and effective value 76
Allow Logon to Hibernated System
setting 56
Allow Password of Adjoining
Characters
default and effective value 74
Allow Password of Adjoining
Characters setting 30, 50
Allow Special Characters
default and effective value 74
Allow Special Characters
setting 30, 49
Allow Windows Logon setting 31
Allow Windows Screen Saver
setting 29
July 2007
asdf 43
Attempts Before Temporary
Lockout
default and effective value 75
authenticating 207
dynamic token 211
first time 208
fixed password 209
smart card/USB token 212
Authentication Settings-Fixed
Password 48
Authentication Settings-Smart Card
Windows Smart Card Insertion/
Removal Handling 52
automatic reboot 147
B
background image 145
preboot 145
banner 145
preboot 145
Banner.jpg 146
boot protection 5
bootable
CD-ROM 201
media menu 205
Bypass PPBE WIL Message
setting 34
C
Case Sensitivity setting 30, 49
central log 170
certificate
smart card 87
Change Credentials in the Pointsec
for PC tray
default and effective value 76
Change Credentials in the Pointsec
for PC Tray setting 56
Change Password
default and effective value 75
Change Password setting 55
Change Permissions
default and effective value 75
Change Permissions setting 54
Change Privileged Permissions
default and effective value 75
Change Priviliged Permissions
setting 54
Change Single Sign-On
default and effective value 75
Change Single Sign-on setting 55
Change to Dynamic Token
default and effective value 76
Change to Dynamic Token
setting 56
Change to Fixed Password
default and effective value 76
Change to Fixed Password
setting 56
Change to Smart Card
default and effective value 76
Change to Smart Card setting 56
Common Criteria
configuration
recommendations 258
configuration
requirements 256
max failed logons before
reboot 258
password synchronization 258
configuring system settings
system settings
configuring 17
contact information 3
Creat Groups
default and effective value 75
Create Groups setting 54
Create Profiles
default and effective value 75
Create Recovery Media
default and effective value 76
Create Recovery Media setting 56
Create User Accounts
default and effective value 75
Create User Accounts setting 54
creating
update profiles 129, 164
D
default
Allow Consecutive, Identical
Characters 74
Allow Embedded Space
Characters 74
Allow Leading or Trailing
Space Characters 74
271
Allow Logon to Hibernated
System 76
Allow Password of Adjoining
Characters 74
Allow Special Characters 74
Attempts Before Temporary
Lockout 75
Change Credentials in the
Pointsec for PC tray 76
Change Password 75
Change Permissions 75
Change Privileged
Permissions 75
Change Single Sign-On 75
Change to Dynamic Token 76
Change to Fixed Password 76
Change to Smart Card 76
Create Groups 75
Create Profiles 75
Create Recovery Media 76
Create User Accounts 75
Edit System Settings 75
Enable Case Sensitivity 74
Enable SSO 76
Mangement Console Logon 76
Password History 75
Provide ’One-Time Logon’ 76
Provide ’Reset Password’ 76
Receive ’One-Time Logon’ 76
Receive ’Reset Password’ 76
Remote Help 75
Remove Groups 75
Remove Profiles 75
Remove User Accounts 75
Require Letters and
Integers 74
Require Upper and Lower
Case 74
Response Format’ 76
Set Logon Limit 75
Set Max Failed Logons 75
Set Maximum Age 75
Set Minimum Length 75
Smart Card insertion triggers
Windows SSO logon 76
Synchronization Mode 76
Temporary Lockout Time 75
Uninstall 75
Use Entrust for SSO 76
View Logs 75
defaults
Logon Settings 75
Password Settings 74
Password Synchronization
Settings 76
Permissions Settings 75
Privileged Permissions
Settings 75
Remote Help Settings 76
Single Sign-On Settings 76
deploying Pointsec for PC 107
Desktop.jpg 146
272
Display Enable WIL Switch
setting 33
drivers
smart card 121
dynamic token 211
Challenge Format 83
Challenge Length 83
importing values 83
Response Format 83
Response Length 83
dynamic token authentication
new user account 81
Dynamic Token Key 83
Dynamic Token Serial Number 81,
83
E
Edit System Settings
default and effective value 75
Edit System Settings setting 54
effective values
settings 74
Enable Case Sensitivity
default and effective value 74
Enable Export of Status to File
setting 23
Enable Hardware Hash setting 34
Enable Low Graphics Mode
setting 20
Enable Mouse in Preboot
setting 20
Enable Network Locational
Awareness setting 33
Enable PCMCIA setting 20
Enable Remote Help setting 28
Enable Serial setting 20
Enable SSO
default and effective value 76
Enable SSO setting 58
Enable Wake on LAN setting 31
encryption
algorithms 256
file and full disk 5
Entrust SSO setting 58
error message
recovery file path not
accessible 197
Expiration Date
setting 47
Expiration Date setting 73
exporting logs with
pslogexp.exs 249
extend authority 14
F
fixed password 209
security standards for 51
Fixed Password settings 49
force change of password at next
logon 81
G
graphic images displayed in
preboot 145
group
adding user account to 77
new 72
Group Settings 45, 73
Authentication Settings-Fixed
Password 48
Logon 47
group settings 43
GUID Setting 46
GUID setting 46
H
hibernation 27
I
I 247
IBM Rapid Restore Ultra 253
install profile
silent 108
install profiles
deploying 108, 124
interactive install 103
silent install 102
Install settings 21
installation profile
creating 113
installation profiles 101
creating 108
deploying 108
smart card drivers 121
K
keyboard layouts 184
supported 237
switching 184
L
N
language files
Windows 227
language packages 233
default 234
language packs
installing 247
language support 231
languages 183
changing 183
installing using PS
Control 248
keyboard layouts 184
Select Language setting 22
languages supported 7
local log 145, 165
Local Settings 43
Authentication Settings-Smart
Card Windows Smart Card
Insertion/Removal
Handling 52
localization 7
Log 23
Log Password setting 23
Log Path 24
logging 145, 165
central 170
local 145, 165
Logon Authorized setting 46
Logon Settings 47
defaults and effective
values 75
Logon Verification setting 26
logs
exporting with
pslogexp.exe 249
new account wizard 77
normal user account
user account
normal 79
M
Management Console Logon
default and effective value 76
Management Console Logon
setting 56
managing Pointsec PC 6
manual reboot 147
Minimum 20, 21, 26, 28, 29, 30,
31, 33
Minimum Group Authority Level
Required setting 20, 21, 26,
28, 29, 30, 31, 33
Msiexec.exe 147
O
oemvar 146
one-time logon 173, 218
Organization setting 21
P
password
forgotten 217
password authentication
new user account 80, 81
Password History
default and effective value 75
Password History setting 50
Password Settings
defaults and effective
values 74
Password Synchronization Settings
defaults and effective
values 76
Password Synchronization
settings 59
passwords
synchronizing 177
PC security overview 3
PCMC 9
Local Installation 14
overview 13
Remote Help 14
Remote Installation 14
permission settings 11
Permissions
Remote Help 12
permissions
required by Remote
Desktop 228
Permissions (settings) 12
Permissions Settings
defaults and effective
values 75
Permissions settings 54
Pointsec for PC
add/remove 194
administering 9, 89
recovery 197
removing 133, 191
updating settings 107
updating software 107
utilities 177
Pointsec for PC Management
Console, see PCMC
Pointsec PC
environment requirements 6
Pointsec Service Start service 127
preboot
background image 145
banner 145
graphic images 145
screen saver image 145
precheck.txt file 121
Privileged Permissions
(settings) 11
Privileged Permissions Settings
defaults and effective
values 75
Privileged Permissions settings 53
Product 21
Product Owner setting 21
Product Serial Number setting 22
profiles 61, 101, 149
graphical overview 105
group information 104
installation
interactive 103
silent 102
publish directory 105
recommendations 105
sets 106
storage directory 105
system information 103
System Settings 118
uninstall 103, 108
update 103
update directory 105
user information 104
Provide ’One- Time Logon’
setting 57, 172
Provide ’One-Time Logon’
default and effective value 76
Provide ’Remote Password Change’
setting 57, 172
Provide ’Reset Password’
default and effective value 76
PS Control command line
utility 239
commands 240
error codes 241
examples 241
exporting status
information 243
installing language packs 247
options 240
smart cards, smart card
readers, drivers 242
pscontrol.exe 239
pslogexp.exe utility 249
publish directory for profiles 105
publish path 107
273
R
Rapid Restore Ultra (RRU) 253
reboot
manual 147
reboot, automatic 147
Receive ’One-Time Logon’
default and effective value 76
Receive ’One-Time Logon’
setting 58, 172
Receive ’Remote Password Change’
setting 58, 172
Receive ’Reset Password’
default and effective value 76
recovering information from a slave
drive 202
recovery 197
CD-ROM 201
floppy disk 199
removable media 199
recovery and decryption 202
recovery directory 105
recovery disk 197
creating 199
recovery files
path
not accessible 197
Remote Desktop 228, 229
Remote Help 14, 171
default and effective value 75
one-time login 173
permissions 12
providing 173
remote password change 172
types 172
verifying users 173
Remote Help Settings
defaults and effective
values 76
Remote Help settings 56
remote password change 172, 217
remove
Windows add/remove 194
Remove Groups
default and effective value 75
Remove Groups setting 54
Remove Profiles
default and effective value 75
Remove Profiles setting 54
Remove User Accounts
default and effective value 75
Remove User Accounts setting 54
removing Pointsec for PC 108
Require Letters and Digits
setting 30
Require Letters and Integers
default and effective value 74
274
Require Letters and Integers
setting 49
Require Upper and Lower Case
default and effective value 74
Require Upper and Lower Case
setting 30
requirements
Pointsec for PC environment 6
Response Format
default and effective value 76
Response Format setting 58, 172
S
screen saver 145
screen saver image
preboot 145
Screen Saver Timeout setting 47,
73
Scrsvr.jpg 146
security standards for fixed
passwords 51
Select Language setting 22
service user account 79
set
creating 91, 108
Set Expiration Date (WOL)
setting 31
Set Failed Attempts Before
Temporary Lockout setting 48
Set Group Authority Level
setting 47
Set Log Path setting 24
Set Logon Limit
default and effective value 75
Set Logon Limit setting 48
Set Max Failed Logon setting 47
Set Max Failed Logons
default and effective value 75
Set Max Failed Logons Before
Reboot setting 26
Set Max Failed Windows Logon
Attempts setting 33
Set Max Number of Logons Allowed
(WOL) setting 31
Set Maximum Age
default and effective value 75
Set Maximum Age setting 50
Set Minimum Age setting 50
Set Minimum Length
default and effective value 75
Set Minimum Length setting 30,
50
Set Network Locations setting 33
Set PKCS#11 dll Path setting 25
Set PPBE Failure WIL Message
setting 33
Set Profile Path setting 24
Set Profile Validation Password
setting 23
Set Recovery Path setting 24
Set Screen Saver Text setting 29
Set Start Delay (WOL) setting 31
Set Upgrade Path setting 24
Set WIL User Screen Saver Timeout
setting 34
sets 106
setting
Access to Local 54
Access to Remote 54
Allow Consecutive, Identical
Characters 30, 49
Allow Embedded Space
Characters 30, 50
Allow Hard Drive To Be
Slaved 20
Allow Hibernation and Crash
Dumps 27
Allow Leading or Trailing
Space Characters 30, 50
Allow Logon to Hibernated
System 56
Allow Password of Adjoining
Characters 30, 50
Allow Special Characters 30,
49
Allow Windows Logon 31
Allow Windows Screen
Saver 29
Bypass PPBE WIL
Message 34
Case Sensitivity 30, 49
Change Credentials in the
Pointsec for PC Tray 56
Change Password 55
Change Permissions 54
Change Priviliged
Permissions 54
Change Single Sign-on 55
Change to Dynamic Token 56
Change to Fixed Password 56
Change to Smart Card 56
Create Groups 54
Create Profiles
Create Profiles setting 54
Create Recovery Media 56
Create User Accounts 54
default values 74
Display Enable WIL Switch 33
Edit System Settings 54
Enable Export of Status to
File 23
Enable Hardware Hash 34
Enable Low Graphics
Mode 20
Enable Mouse in Preboot 20
Enable Network Locational
Awareness 33
Enable PCMCIA 20
Enable Remote Help 28
Enable Serial 20
Enable SSO 58
Enable Wake on LAN 31
Entrust SSO 58
Expiration Date 47, 73
Fixed Password 49
GUID 46
Log Password 23
Logon Authorized 46
Logon Authorized
setting 73
Logon Verification 26
Management Console
Logon 56
Minimum Group Authority
Level Required 20, 21, 26,
28, 29, 30, 31, 33
Organization 21
Password History 50
Product Owner 21
Product Serial Number 22
Provide ’One- Time Logon’ 57,
172
Provide ’Remote Password
Change’ 57, 172
Receive ’One-Time Logon’ 58,
172
Receive ’Remote Password
Change’ 58, 172
Remove Groups 54
Remove Profiles 54
Remove User Accounts 54
Require Letters and Digits 30
Require Letters and
Integers 49
Require Upper and Lower
Case 30
Require Upper and Lower
Case setting 50
Response Format 58, 172
Screen Saver Timeout 47, 73
Select Language 22
Set Expiration Date (WOL) 31
Set Failed Attempts Before
Temporary Lockout 48
Set Group Authority Level 47
Set Log Path 24
Set Logon Limit 48
Set Max Failed Logons 47
Set Max Failed Logons Before
Reboot 26
Set Max Failed Windows Logon
Attempts 33
Set Max Number of Logons
Allowed (WOL) 31
Set Maximum Age 50
Set Minimum Age 50
Set Minimum Length 30, 50
Set Network Locations 33
Set PKCS#11 dll Path 25
Set PPBE Failure WIL
Message 33
Set Profile Path 24
Set Profile Validation
Password 23
Set Recovery Path 24
Set Screen Saver Text 29
Set Start Delay (WOL) 31
Set Upgrade Path 24
Set WIL User Screen Saver
Timeout 34
Skip Management Console
Logon 26
Smart Card Triggers Windows
SSO Logon 58
Synchronize Windows
Passwords to Preboot 60
Temporary Lockout Time 48
Uninstall 55
USB 20
Use 20-Character
Challenge 28
View Logs 55
Windows Complexity
Requirements 49
Windows Integreted Logon 33
settings 43
default values 74
effective values 74
group 43
Install 21
Logon 47
Password Synchronization 59
Permissions 54
Privileged Permissions 53
Remote Help 56
Single Sign-On 58
user account 43
Single Sign-On settings 58
Sinle Sign-On Settings
defaults and effective
values 76
Skip Management Console Logon
setting 26
slave drives 202
Smart 242
smart card
lost 218
registering with PS
Control 242
unregistering with PS
Control 242
smart card authentication
new user account 86
smart card certificate 87
smart card driver
installing with PS Control 242
registering with PS
Control 242
unregistering with PS
Control 242
smart card drivers
in installation profiles 121
Smart Card insertion triggers
Windows SSO logon
default and effective value 76
Smart Card Triggers Windows SSO
Logon setting 58
smart card/USB token 212
SSO 185, 219
about 185
changing passwords 185
enabling 189
Entrust 185
Windows smart card 189
SSynchronize Windows Passwords
to Preboot setting 60
status Information 243
storage directory for profiles 105
storage path 93, 106, 109
Synchronization Mode
default and effective value 76
synchronizing users 130
system administrator 9
system settings 17, 43
accessing 17, 43
T
Temporary Lockout Time
default and effective value 75
Temporary Lockout Time setting 48
temporary user account 79
troubleshooting 221, 225, 231,
233, 237, 239, 249, 253, 255
type
user account 79
U
Uninstall 75
default and effective value 75
uninstall profiles 101, 103, 191
creating 191
deploying 193
Uninstall setting 55
update directory for profiles 105
update profiles 101, 103, 129,
164
creating 130
deploying 130
updating Pointsec for PC
software 107
upgrade log 147
USB setting 20
275
USB token
lost 218
Use 20-Character Challenge
setting 28
Use Entrust for SSO
default and effective value 76
user account
adding to group 77
authenitcation method 79
authentication method 80
Dynamic Token Key 83
Dynamic Token Serial
Number 81, 83
force change of password at
next logon 81
service 79
temporary 79
type of 79
user account name 78
user account name
user account 78
user account settings 43
user accounts 13
smart card 121
synchronizing 130
utilities
language support 183
SSO 185
V
View Logs
default and effective value 75
View Logs setting 55
W
Wake on LAN (WOL)
example 181
setting-up 180
Windows
language files 227
Windows Complexity Requirements
setting 49
Windows Integreted Logo
setting 33
276