SECUDRIVE USB Office

Size: px
Start display at page:

Download "SECUDRIVE USB Office"

Transcription

1 SECUDRIVE USB Office User Guide Doc Ver Brainzsquare, Inc.

2 Table of Contents 1. Overview Features Product Glossary How to use SECUDRIVE USB Office Running the Login Program Manually Agreeing to the End User License Agreement (EULA) Setting up the Password and Logging In User Info Auto-notification DRM Policy Management Setting Setup Complete Features of USB Office Login How to Use the Vaccine Program SECUDRIVE USB CAD Menu USB Settings Tab DRM Settings Tab Unlocking the USB Flash Drive Running the Product with Administrator Privileges in Windows Vista / How to uninstall SECUDRIVE Agent

3 1. Overview Portable USB drives are very efficient tools for carrying data. Data saved on the USB drive however, is vulnerable to being copied to the local PC or other removable storage devices by unauthorized personnel. SECUDRIVE USB Office is a secure USB flash drive equipped with Digital Rights Management (DRM) technology in order to avoid this problem. Copying, copy & paste, clipboard copy, screen capture, and even printing are all prevented for the data stored on the USB. All of the saved data is automatically encrypted by the embedded AES 256-bit crypto chip. Detailed event logs are also gathered for further management and auditing purposes. Features 1.1 Login: To use the USB flash drive, a user must login by inputting the correct password.a user without the correct password will not be able to access the data in the device. The device will be locked and made unavailable after ten consecutive failed password attempts. So even if the USB flash drive is lost, data will be protected from unauthorized personnel. Prevent Copy & Paste: Data stored in the USB flash drive is prevented from being copied to the local disk or other removable disks. Prevent Save As: Saving a file that is originally stored in SECUDRIVE USB Office to a local PC with another name by using the Save As function is blocked. Prevent clipboard copy & paste: Data stored in the device is prevented from being copied using clipboard copy & paste, meaning that the user cannot copy data to a clipboard and paste it in a location outside of the USB or to another application. Clipboard copying is allowed within the same application as to not hinder work efficiency, but the location where the content is copied will now be copy protected and will have to be saved to the USB. Print protection and watermark printing: Data stored in the USB flash drive can be restricted from printing or allowed to perform watermark printing instead. Screen capture prevention: Attempts to capture the screen with capture tools and the print screen key are blocked and will instead show a green screen in their recording or a message saying that the print screen key cannot be used. Prevent file transfer over the network: Data stored in the device is prevented from being 3

4 transferred over the network through attachments or messengers. Sett a valid period and maximum usage: The USB flash drive can be set to only work until a specified date or a maximum number of logins. Once it exceeds one of the limits, the user can no longer log into the device and the USB stick will no longer be available. Product SECUDRIVE USB Office flash drive 1.2 SECUDRIVE USB Office master token **The master token is an optional product and can be purchased seperately. 1.3 Glossary The terms used throughout this manual have the following meanings: USB: SECUDRIVE USB Office flash drive Administrator: Personnel in charge of setting DRM policy for the device User: End user of SECUDRIVE USB Office Policy setup PC: The designated PC where DRM policy can be set for the device. Or the PC where the master token is connected. For both cases, the product runs in administrator mode User PC: User s PC where SECUDRIVE USB Office is connected Secure zone: Secure storage area of SECUDRIVE USB Office where data is saved. A user can only access this area by executing the login program and inputting the correct password. CD area: CD drive that is shown when SECUDRIVE USB Office is connected to the PC. The CD area contains the login program for accessing the secure zone. DRM: Acronym for Digital Rights Management which is the control to restrict the user s ability to copy, screen capture, or print. 4

5 2. How to use SECUDRIVE USB Office 2.1 Running the Login Program Manually The license agreement or the login window will automatically be displayed when SECUDRIVE USB Office is connected to the PC. If either the license agreement or the login window does not appear, you should manually run the login program. Right click on the SECUDRIVE CD area as depicted below and select Open. Run the Login.exe to manually launch the login program. 2.2 Agreeing to the End User License Agreement (EULA) When using the product for the first time, you must agree to the terms by reading the agreement and selecting I accept the agreement and then click OK. 5

6 Setting up the Password and Logging In At your first use of the product, you should set up your login password to access the secure zone. The password must be more than 6 alphanumeric characters User Info Fill out the user information for the USB. You can choose to show this information at login by checking the check box near the bottom. Click Next to continue. This section is optional so click Next if you want to skip this section. 6

7 Auto-notification Choose whether or not you wish to have automatic notifications for the latest updates for USB Office. Click Next to continue DRM Policy Management Setting After setting the password, click OK and the DRM Policy Management window will be displayed. You can choose to make the PC able to set DRM policy or, if you purchased a master token, you can set the token for setting up DRM Policy. 7

8 Use this PC for DRM policy management: DRM policy setup and management is only available on the PC where the USB flash drive is currently connected to. Setup or change will not be possible on other PCs. Use Token for DRM policy management: DRM policy setup and management is available on any PC where the master token is connected. Note that on the DRM policy setup PC, copy protection features are disabled. 2.7 Setup Complete If you want to change any of these settings at a later time, right click on the SECUDRIVE icon in Windows Task bar after logging into the USB. Note that DRM Policy will only be accessible on either the designated DRM policy setup PC or when the optional token is connected. Otherwise, the DRM Policy option will not be available. Click Next to continue. 2.8 Features of USB Office To change the auto lock and DRM policy settings, right-click on the SECUDRIVE icon in the windows task bar. 8

9 Click Finish to proceed to login. 2.9 Login The login window will be displayed as follows: Enter the configured password and click OK to login. To execute the device in read-only mode, check Login as read-only before loggin. After 10 failed password attempts the USB flash drive is locked and no longer available. 9

10 The locked device can be unlocked on the policy setup PC or with the master token. When you have successfully logged in, you will see a removable disk called SECUDRIVE. This is the secure zone where the data will be stored and encrypted by the AES 256-bit crypto chip. Once logged in, the program will be displayed as an icon in the system tray as follows. How to Use the Vaccine Program 2.10 When using the product for the first time, accept the terms of the license agreement of the vaccine program and click Activate. Click Finish to complete installation. 10

11 Once installed, the vaccine program will initiate when the user logs into the USB flash drive and the Trend Micro icon will be displayed in the system tray. The program terminates when logging out of the USB flash drive. The vaccine program runs for 1 year from the date of agreement. After 1 year, it will stop operation. To continue Trend Micro USB Security service, the user must purchase the license update tool and extend the period. License renewal is only available less than 30 days of expiration. You will see the Restore folder and the Trend Micro folder in the secure zone of the USB flash drive. These folders are used by the vaccine program. 11

12 SECUDRIVE USB Office Menu Right click the tray icon and you will see the menu as follows Shortcut to Secure Zone: Access the secure storage area of the USB flash drive Change Password: Change the login password Auto Lock: Automatically lock the device when keyboard and mouse are not in use for a designated time. DRM Policy Settings: Set or modify DRM security policy (Copy Protection, print protection, capture protection, validity settings, etc.) Information: Either enter/edit the user information or view SECUDRIVE information. Help: Display the user guide of the product. You will need a PDF viewer on your PC to open the file. Close: Close the program and log out of the USB so you can safely disconnect the device from the PC. [Change Password] Right click on the tray icon and select Change Password. Enter both the current password and a new password and then click OK. 12

13 [Auto Lock] Right click on the tray icon and select Auto Lock. If keyboard and mouse are not in use for a designated time period, the user will be forcibly logged out of the USB. It is set to Never by default so select your own time period if you wish to use this feature and click OK. 13

14 [DRM Policy Settings] Right click on the tray icon and select DRM Policy Settings. This option will only be available on the DRM Policy Setup PC or when the master token is connected when logging in. The DRM Policy Settings window will be displayed as follows This window has two tabs for security policy settings: USB Settings and DRM Settings. USB Settings Tab [Secure Zone Access] Read-only: Set the USB flash drive to read-only. When logging in again after setting this option, the device works as read-only even in the policy setup PC. Read/Write: The USB drive runs in read/write mode. These settings will be applied on the next login. 14

15 [PIN Code Authentication] You can set a pin code for the master token. This means that in order to be able to acces the DRM Policy settings, the correct pin code must be entered when connecting the master token. Only when you select Use token for DRM policy management in the initial setup of the product, can you use the Pin Code Authentication feature. If you set Pin Code Authentication to ON, you will be prompted to set the pin code in the following window. If the master token already has a pin code, you must enter the current pin code when setting the Pin Code Authentication to ON. Next, Click Change Pin Code in order to change the current pin code. If your master token does 15

16 not already have a pin code Change Pin Code button will not be available. So if Pin Code Authentication is set ON, You must enter the correct pin code to be able to edit DRM Policy when you connect the USB flash drive with the master token. [User Rights ] Cannot change password: A user cannot change the password of the USB flash drive that has been configured by the administrator. When this option is checked, the Change Password option will not be displayed in the tray icon menu when logged in as a user. Cannot modify user information: A user cannot change the user information of the USB flash drive that has been configured by the administrator. When this option is checked, the User Information option will not be displayed in the tray icon menu when logged in as a user. Cannot change auto lock settings: A user cannot change the auto lock setting of the USB flash drive that has been configured by the administrator. When this option is checked, the Auto Lock option will not show in the tray icon menu when logged in as a user. [Log Collection] Latest 10,000 units: It gathers a total of 10,000 log entries. Once it exceeds the limit, older logs will be deleted and replaced with the most recent ones. Max 10,000 units: As many as 10,000 log entries will be collected. Once it exceeds the limit, the USB flash drive is forced to log out and becomes unavailable for use. To use the product again, the stored logs should be deleted on the policy setup PC. No log: No log entries will be recorded for the USB. 16

17 View: View the USBs stored logs. Delete : Click Delete and all of the stored logs will be deleted. [USB Validity Settings] Valid period: Set up valid period of the USB flash drive. When it exceeds the limit, the device is locked and will no longer be available. To use the product again, Valid period should be disabled or reset to a later date on the policy setup PC. Time sync with: By using this option the USB will then check the valid period based on the internet time server which provides a standard time. The connected PC must have access to the internet and be able to communicate with the internet time server. If not, the user will be either not be able to log into the USB or logged out of the USB if they are already logged in.. Maximum login: Set a maximum login count for the USB flash drive. Once it exceeds the limit, the device is locked and becomes unavailable. To use the product again, Maximum login should be disabled or reset on the policy setup PC or with the master token. 17

18 2.13 DRM Settings Tab Press the DRM Settings tab at the top to modify DRM policy. 18

19 [DRM Settings] [Apply Data Leakage prevention] Prevent copying files out of the secure zone of the USB flash drive. Note that copying functions will still work for files within the USB flash drive as to not impede on any work that needs to be done to the files. If it is set ON, the file saved in the USB flash drive is prevented from being copied out of the device using Copy &Paste, or the Save As function. Also, if a user tries save the content outside of the USB drive by copying the content of a file to the clipboard and pasting it, copying will be prevented. Please note that you will have to select at LEAST one application from the application list on the right. [Screen Capture Prevention] Prevent screen capture by capture tools or the PrintScreen Key. [Print Protection] Prevent printing of files in the USB flash drive. [Watermark Printing] This feature is only available when Print Protection is not selected. Use watermark when printing a file. Click Settings and you can set watermark options. 19

20 [Application List] On the right hand side of the window, there is a list of compatible applications. These applications are the only ones that can access the data on the USB. Applications outside this list will be blocked from opening or accessing the data on the USB. You must select at least one application from this list. For example, if you only select Adobe Photoshop from the Secure Process List, only Adobe Photoshop will be able to access the files in the secure zone of the USB flash drive. 20

21 For selected applications that can access the secure zone, network connection is blocked by default. You can make exceptions and allow network access for designated processes by changing the Allowed IP, Allowed Port, or Allowed URL. 21

22 After selecting an item(s) on the list, click by Allowed IP, Allowed Port, or Allowed URL to change the secure network settings as follows. No item is set (All network settings are NULL ): All network paths are blocked. Settings on IP and Port: Access is only available through the port of the registered IP. Settings on URL and Port: Access is only available through the port of the registered URL. Settings on IP only without Port: Access is available through all ports of the registered IP. Settings on URL only without Port: Access is available through all ports of the registered URL. Settings on Port only without IP or URL: Access is available through the registered port of any IP and URL. Allow entire network access: Access is available through all ports, IPs, and URLs. IP x x x x Port x x x URL x x x x Network Access status All access blocked Access available through port of designated IP Access available through port of designated URL All Ports will have access through designated IPs All Ports will have access through designated URLs All of IPs and URLs will be have access through designated port 22

23 Allowed IP Settings: Enable access by specified IPs. Type in the IP and click Add to add to the Allowed IP List. Allowed Port Settings: Enable access by specified Ports. Type in the Port number and click Add to add to the Allowed Port List. Allowed URL Settings: Enable access by specified URLs. Type in the URL and click Add to add to the Allowed URL List. 23

24 [User Information] Right click the tray icon and select Information User Information. In the window below, fill in the user information items and click OK when finished. If you have checked View user information before login, you can view user information in the login window.. 24

25 [About SECUDRIVE] Right click the tray icon and select Information About SECUDRIVE. You can view hardware and software information of the USB flash drive. 25

26 [Close] In order to log out of the USB, right click the tray icon and select Close. When you close the program, you will be logged out of the secure zone and you will be able to safely remove the USB flash drive from the PC Unlocking the USB Flash Drive The USB drive can be locked if an incorrect password is entered ten times consecutively. Once it is locked, it will show the following message when trying to log back into the device. When you log into the device on the policy setup PC or with the master token, the following message will be displayed. 26

27 Click Yes and the device will be unlocked and the login window will appear If the device is locked due to 10 consecutive failed login attempts, you can unlock it on the policy setup PC. If Valid period or Maximum login has exceeded the limit, you must login on the policy setup PC and disable the options in DRM Policy Settings or reset the number of maximum logins or the valide period to be able to use the product again. Running the Product with Administrator Privileges in Windows Vista / 7 When using the product as a user for the first time, the user will need to run the login program as an administrator. To do this, right click CD area of SECUDRIVE USB Office and click Open. 27

28 Right click on Login.exe and select Run as administrator. When you run Login.exe with administrator privileges, the SECUDRIVE Agent installation message will be displayed as follows. This agent is necessary for all SECUDRIVE USBs and needs to be installed on the PC to use the product. Click Yes to continue installation. 3. How to uninstall SECUDRIVE Agent For the installed SECUDRIVE Agent program, you can uninstall it by executing Uninstall.exe in C:\Program Files\SECUDRIVE Agent or in C:\Program Files (x86)\secudrive Agent. You can also manually uninstall it in the Windows Add/Remove Programs menu. 28

ModeChanger

ModeChanger 35020808-02 2015.11 ModeChanger ModeChanger is a software utility that can switch the drive between normal mode and encrypted mode. Operating in encrypted mode will help protect your data. While the drive

More information

CESecure Quick Start Guide

CESecure Quick Start Guide CESecure Quick Start Guide Using CESecure Software CESecure software is pre-installed on CMS Products Flash or Hard Drives and does not require installation. The CESecure software moves with the encryption

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

HyperPKI Manager User Guide For the HYP2003 PKI Token (Windows Version)

HyperPKI Manager User Guide For the HYP2003 PKI Token (Windows Version) HyperPKI Manager User Guide For the HYP2003 PKI Token (Windows Version) 4/19/2017 HSTE-NB0031-RV 1.0 HYPERSECU INFORMATION SYSTEMS INC #200-6191 Westminster Hwy, Richmond, BC V7C 4V4 Canada 1 (604) 297-2000

More information

10ZiG Technology. Thin Desktop Quick Start Guide

10ZiG Technology. Thin Desktop Quick Start Guide 10ZiG Technology Thin Desktop Quick Start Guide 2010 05 20 Introduction This document is intended as a quick start guide for installing Thin Desktop. After reading this document, you will know how to:

More information

Storage Security Software (Version )

Storage Security Software (Version ) For Toshiba CANVIO series Storage Security Software (Version 1.00.6904) User s Manual Version 1.00 This document explains the installation process and basic usage of the Storage Security Software designed

More information

Check Point GO R75. User Guide. 14 November Classification: [Public]

Check Point GO R75. User Guide. 14 November Classification: [Public] Check Point GO R75 User Guide 14 November 2011 Classification: [Public] 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

Codebook. Codebook for OS X Introduction and Usage

Codebook. Codebook for OS X Introduction and Usage Codebook Codebook for OS X Introduction and Usage What is Codebook Encrypted Data Vault Guards passwords and private data Keeps sensitive information organized Enables quick recall of secrets Syncs data

More information

How to borrow and download an ebook using axis360 (ereader)

How to borrow and download an ebook using axis360 (ereader) How to borrow and download an ebook using axis360 (ereader) Before you begin, you will need: Your library card number and PIN An email address Note: Before starting this process, please install and setup

More information

Legal Notes. Regarding Trademarks. Models supported by the GX printer driver KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. Models supported by the GX printer driver KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Printer Driver User Guide

Printer Driver User Guide PRINT COPY SCAN FAX TASKalfa 0i TASKalfa i Printer Driver User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Password Memory 7 User s Guide

Password Memory 7 User s Guide C O D E : A E R O T E C H N O L O G I E S Password Memory 7 User s Guide 2007-2018 by code:aero technologies Phone: +1 (321) 285.7447 E-mail: info@codeaero.com Table of Contents How secure is Password

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

SECUDRIVE Sanitizer Portable User Guide

SECUDRIVE Sanitizer Portable User Guide SECUDRIVE Sanitizer Portable User Guide Doc Ver. 2.0.27.238 2014-04-24 Brainzsquare, Inc. TABLE OF CONTENTS 1 Overview... 3 1.1 Features... 3 2 PC Sanitization... 5 2.1 Program Package... 5 2.2 Running

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE IRONKEY D300S SECURE USB 3.0 FLASH DRIVE User Guide Document No. 48000130-001.A01 D300S Page 1 of 27 Table of Contents About This Manual... 3 System Requirements...3 Recommendations...3 Setup (Windows

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Version 8.0 Rev A User s Guide Copyright 2010 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

Printer Driver User Guide

Printer Driver User Guide PRINT COPY SCAN FAX TASKalfa 700i TASKalfa 800i Printer Driver User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change

More information

User Manual for Imation Flash Login Software

User Manual for Imation Flash Login Software User Manual for Imation Flash Login Software Introducing Imation Flash Login You can use Imation Flash Login to create a password protected secure partition on Imation Swivel Pro USB 2.0 flash drive. System

More information

Fiery proserver User Guide

Fiery proserver User Guide Fiery proserver User Guide Congratulations on your purchase of the EFI Fiery proserver, a powerful production solution for your printer. Before you begin Make sure that you have: About this document Installed

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

FinalCode Viewer User Manual

FinalCode Viewer User Manual FinalCode Viewer User Manual Edition 2.3 Target: FinalCode Viewer Ver.4.30 January 7th, 2015 1 Introduction Thank you for choosing FinalCode. This manual describes how to install, and operate FinalCode

More information

Package Contents. Device Overview. Navigation Buttons

Package Contents. Device Overview. Navigation Buttons 1 Package Contents 7 Pandigital Nova Tablet ereader USB Cable AC Adapter Quick Start Guide User Guide (preloaded in device) Device Overview Navigation Buttons The navigation buttons at the bottom of the

More information

Pass4sure CASECURID01.70 Questions

Pass4sure CASECURID01.70 Questions Pass4sure.050-80-CASECURID01.70 Questions Number: 050-80-CASECURID01 Passing Score: 800 Time Limit: 120 min File Version: 4.8 http://www.gratisexam.com/ 050-80-CASECURID01 RSA SecurID Certified Administrator

More information

Therefore, before you can use the Microlog Inspector application for the first time, you must perform the following steps:

Therefore, before you can use the Microlog Inspector application for the first time, you must perform the following steps: SKF Microlog Inspector Setup Guide Microlog Inspector setup overview The new Microlog Inspector application uses a different, much easier communication method than previous MARLIN versions. With the new

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

APPENDIX B: INSTALLATION AND SETUP

APPENDIX B: INSTALLATION AND SETUP APPENDIX B: INSTALLATION AND SETUP Page A. Overview... B:1 How do I install and setup ICMS?... B:1 Do I need special security rights to install ICMS?... B:1 Installation Basics... B:1 How do I get a quick

More information

Getting View Client File

Getting View Client File Getting View Client File 1. Launch Internet Explorer 2. At address bar enter this URL https://viewvdi.tp.edu.sg/ and press [Enter]. 3. Please click on More information and click on Go on to the webpage

More information

SMART (Samsung Multiple Automatic Re-flash Tool) User Guide - For Managers

SMART (Samsung Multiple Automatic Re-flash Tool) User Guide - For Managers SMART (Samsung Multiple Automatic Re-flash Tool) User Guide - For Managers Copyright 2012 Samsung Electronics Co. Ltd. All rights reserved. Ver. 5.0 / SMART 3.12.0211 05.03.2012 1. What is SMART? With

More information

Printing System Driver User Guide

Printing System Driver User Guide Printing System Driver User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We

More information

Table of Contents. D-Link SharePort Plus... 4 Introduction...4 System Requirements...4 Features...5. Installation... 6

Table of Contents. D-Link SharePort Plus... 4 Introduction...4 System Requirements...4 Features...5. Installation... 6 Table of Contents D-Link SharePort Plus... 4 Introduction...4 System Requirements...4 Features...5 Installation... 6 SharePort Plus Utility... 11 Utility Overview... 11 Device Server View... 12 Utility

More information

Quick Start Guide. PC, Mac, Android & ios

Quick Start Guide. PC, Mac, Android & ios Quick Start Guide PC, Mac, Android & ios Installation for PC Please refer to the ReadMe file on the installation disc or to the Trend Micro website for detailed system requirements. If you encounter difficulties

More information

DISK DEFRAG Professional

DISK DEFRAG Professional auslogics DISK DEFRAG Professional Help Manual www.auslogics.com / Contents Introduction... 5 Installing the Program... 7 System Requirements... 7 Installation... 7 Registering the Program... 9 Uninstalling

More information

Printer Driver User Guide

Printer Driver User Guide PRINT COPY SCAN FAX ECOSYS M660idn ECOSYS M655idn ECOSYS M65idn ECOSYS M65dn Printer Driver User Guide PRINT COPY SCAN ECOSYS M5idn ECOSTS M5dn Legal Notes Unauthorized reproduction of all or part of this

More information

Enter your Appserv username and password to sign in to the Website

Enter your Appserv username and password to sign in to the Website Appserv Desktop Access Logging on from a Windows 10 Device Step 1. To sign in to the Appserv Desktop Access website, either enter the following address into the Microsoft Edge browser address bar, or click

More information

HP Travel Phone User s Guide

HP Travel Phone User s Guide HP Travel Phone User s Guide Version 1.0 Copyright 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products

More information

Symantec Backup Exec Quick Installation Guide

Symantec Backup Exec Quick Installation Guide Symantec Backup Exec 2010 Quick Installation Guide 20047221 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup Exec service account

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2013 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google is a trademark of Google Inc.

More information

User Guide. BlackBerry Workspaces for Windows. Version 5.5

User Guide. BlackBerry Workspaces for Windows. Version 5.5 User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing

More information

Symantec Encryption (PGP) Installation Guide

Symantec Encryption (PGP) Installation Guide System Requirements Symantec Encryption (PGP) Installation Guide Windows 8 (32 and 64 bit versions) Windows 7 (32 and 64 bit versions)] Windows Vista (32- and 64-bit editions) Additional Requirements Boot

More information

User s s Manual. Transcend Elite Software

User s s Manual. Transcend Elite Software User s s Manual Transcend Elite Software (Version 1.0) Congratulations on purchasing one of Transcend s world-renowned storage products. Your Transcend storage device comes with Transcend Elite a very

More information

Select the Akeni Pro Server installation file that matches your operating system and double-click on the file.

Select the Akeni Pro Server installation file that matches your operating system and double-click on the file. Akeni Pro Server Administration Guide (Version 2) Contents Chapter 1 Chapter 2 Chapter 3 Getting Started.: 1 Pro Server Installation.: 2 Launching Akeni Pro Server.: 3 Pro Client Installation.: 4 Launching

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Internet Key Administration

Internet Key Administration Internet Key Administration An Internet Key allows multiple users access to a common Earthwork 4D software license. Users are created by the Internet Key s administrator. As an Internet Key administrator

More information

500 Series Installation Guide

500 Series Installation Guide 500 Series Installation Guide Revision 1.9 September, 2010 Disclaimer: The specifications in this document are subject to change without notice. All trademarks mentioned in this document are the property

More information

AT&T Global Network Client for Mac User s Guide Version 1.7.3

AT&T Global Network Client for Mac User s Guide Version 1.7.3 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 1.7.3 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

Finding information on your computer

Finding information on your computer Important Be sure to create recovery discs immediately after your computer is ready for use because there are no recovery discs provided with the computer. For instructions on how to create the recovery

More information

Printer Driver User Guide

Printer Driver User Guide PRINT ECOSYS P500cdn ECOSYS P500cdw ECOSYS P50cdn ECOSYS P50cdw ECOSYS P505cdn ECOSYS P506cdn ECOSYS P506cdw Printer Driver User Guide PRINT COPY SCAN FAX ECOSYS M550cdn ECOSYS M550cdw ECOSYS M55cdn ECOSYS

More information

Comodo IT and Security Manager Software Version 6.9

Comodo IT and Security Manager Software Version 6.9 Comodo IT and Security Manager Software Version 6.9 End User Guide Guide Version 6.9.072817 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016 ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

AirWatch Troubleshooting Guide Revised 23 January 2018

AirWatch Troubleshooting Guide Revised 23 January 2018 Contents READ ME FIRST (Updated 23 January 2018)... 3 Using this guide:... 3 No resolution found... 3 Deleted/wiped database... 3 Software Requirements, Installation, and Usage... 4 Reinstalling Software...

More information

MagicInfo VideoWall Author

MagicInfo VideoWall Author MagicInfo VideoWall Author MagicInfo VideoWall Author User Guide MagicInfo VideoWall Author is a program designed to construct a VideoWall layout and create VideoWall content by adding various elements

More information

SecureTraveler User s Manual

SecureTraveler User s Manual SecureTraveler User s Manual SecureTraveler is the DataTraveler II + Migo configuration utility program that allows corporate and home users to set up public and password-protected privacy zones on the

More information

Marvell SATA3 RAID Installation Guide

Marvell SATA3 RAID Installation Guide Marvell SATA3 RAID Installation Guide Overview The Marvell RAID Utility (MRU) is a browser-based graphical user interface (GUI) tool for the Marvell RAID adapter. It supports IO Controllers (IOC) and RAID-On-Chip

More information

TxEIS on Internet Explorer 8

TxEIS on Internet Explorer 8 TxEIS on Internet Explorer 8 General Set Up Recommendations: Several modifications will need to be made to the computer settings in Internet Explorer to ensure TxEIS runs smoothly, reports pop up as desired,

More information

3M Clean-Trace Hygiene Monitoring and Management System

3M Clean-Trace Hygiene Monitoring and Management System User Manual Supplement Number: TB. 378178 Effective Date: November 2018 Supersedes: (New) Technology Platform: 3M Clean-Trace Hygiene Monitoring and Management System Originating Location: St. Paul, MN

More information

Table Of Contents Introduction & System requirements: Steps to install the SecomSDK Installer package. 3

Table Of Contents Introduction & System requirements: Steps to install the SecomSDK Installer package. 3 TABLE OF CONTENTS Table Of Contents 1 1. Introduction & System requirements: 2 2. Steps to install the SecomSDK Installer package. 3 3. Manual Installation of Sennheiser Sametime plugin. 10 3.1. Steps

More information

CTIMUX for Panasonic TSP

CTIMUX for Panasonic TSP CTIMUX for Panasonic TSP Installation Manual Version 1.0 3300 N. Main Street, Suite D, Anderson, SC 29621-4128 +1 (864) 642-6103 www.poltys.com 2013 All rights reserved. The information contained in this

More information

Package Contents. Device Overview. Unlocking the Screen

Package Contents. Device Overview. Unlocking the Screen 1 This Quick Start Guide covers the basics for initial setup and usage of your Pandigital Planet. For complete instructions on all features and functionality, refer to the User Guide after you have completed

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes,

More information

ipac Access Controller

ipac Access Controller STANLEY MANUFACTURED ACCESS CONTROL ipac Access Controller QUICK START GUIDE QUICK USER GUIDE Contents Standalone Interface...3 ipac at a Glance...3 Button and Functions...4 Screen Display...4 Information

More information

OASIS Mobile Installation Guide

OASIS Mobile Installation Guide OASIS Mobile Installation Guide Table of Contents I. Preparation... 1 A. Verify System Requirements... 1 B. Uninstall Java... 3 C. Configure Internet Explorer... 3 II. Install OASIS Mobile... 5 III. Install

More information

AT&T Global Network Client for Mac User s Guide Version 2.0.0

AT&T Global Network Client for Mac User s Guide Version 2.0.0 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

U3 Encryption Utility User Guide

U3 Encryption Utility User Guide Contents 1. U3 ENCRYPTION UTILITY RELEASE NOTES... 2 1.1 FEATURES... 2 1.2 REMARKS... 2 1.3 GENERAL DESCRIPTION OF THE U3 VOICE ENCRYPTION... 3 1.4 CUSTOMIZATION... 5 2. INSTALLING THE U3 & P3 ENCRYPTION

More information

Comodo IT and Security Manager Software Version 6.4

Comodo IT and Security Manager Software Version 6.4 Comodo IT and Security Manager Software Version 6.4 End User Guide Guide Version 6.4.040417 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Micro Focus Enterprise View. Installing Enterprise View

Micro Focus Enterprise View. Installing Enterprise View Micro Focus Enterprise View Installing Enterprise View Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 2009-2014. All rights reserved.

More information

Installing and Setting Up SiteMaster 200 v4 What you need to know.

Installing and Setting Up SiteMaster 200 v4 What you need to know. Installing and Setting Up SiteMaster 200 v4 What you need to know. Table of Contents Important Information 1 System Requirements 2 Installing SiteMaster 200 v4 2 When You First Run SiteMaster 200 v4 4

More information

SoftBank Wireless Assistant Desktop Assistant Client User's Guide

SoftBank Wireless Assistant Desktop Assistant Client User's Guide SoftBank Wireless Assistant Desktop Assistant Client User's Guide Ver.5.5 Rev.1.1 3 Contents Preface Introduction... 4 1 The Personal Edition Desktop Assistant... 4 2 Requirements... 4 Chapter 1 Checking

More information

PS-4700/4800Series User ユーザーマニュアル Hardware Manual Manual

PS-4700/4800Series User ユーザーマニュアル Hardware Manual Manual PS-4700/4800Series シリーズ User ユーザーマニュアル GP-4000 Pro-face Manual Series Remote HMI Server Hardware Manual Manual (Atom N270/Core 2 Duo 2 Duo P8400 P8400 Pre-installed 搭載モデル Model) ) Preface Thank you for

More information

Installation Instructions. Your Guide to Installing and Getting Started with WinSteam Version 4.0

Installation Instructions. Your Guide to Installing and Getting Started with WinSteam Version 4.0 Installation Instructions Your Guide to Installing and Getting Started with WinSteam Version 4.0 Copyright 1992-2012 Techware Engineering Applications, Inc. www.techwareeng.com Toll Free (866) TECHWAR

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes,

More information

Package Contents. Firmware Updates. Device Overview

Package Contents. Firmware Updates. Device Overview 1 This Quick Start Guide covers the basics for initial setup and usage of your SuperNova. For complete instructions on all features and functionality, refer to the device User Guide (preloaded in the device)

More information

Installation Guide & User Manual Sennheiser HeadSetup for MAC

Installation Guide & User Manual Sennheiser HeadSetup for MAC Installation Guide & User Manual Sennheiser HeadSetup for MAC This document describes the installation procedure and the usage of the User Interface (UI) controls of the HeadSetup TM for MAC software.

More information

JMP to LSAF Add-in. User Guide v1.1

JMP to LSAF Add-in. User Guide v1.1 JMP to LSAF Add-in User Guide v1.1 Table of Contents Terms and Conditions... 3 System Requirements... 3 Installation... 3 Configuration... 4 API Setup... 4 Java Configuration... 5 Logging In... 5 Launching

More information

Table of Contents... ii. Go Ahead Bring Your Own Device to Work... 1 Requirements... 1

Table of Contents... ii. Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 Table of Contents... ii Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: Activate AT&T Toggle... 1 1.1: Welcome Email with ORANGE Banner... 1 1.2: Welcome Email with BLUE Banner... 2 1.3:

More information

Bloomberg Software Installation Manual New Bloomberg Professional Installer (InstallAware) English

Bloomberg Software Installation Manual New Bloomberg Professional Installer (InstallAware) English Bloomberg Software Installation Manual New Bloomberg Professional Installer (InstallAware) English 18 June 2018 Version: 1.0 2018 Bloomberg L.P. All rights reserved. 1 Download the Bloomberg Software...2

More information

RemoteHelp User Guide

RemoteHelp User Guide Rsupport Inc. RemoteHelp User Guide RemoteHelp User Guide version 1.0 INDEX Glossary... 5 2 RemoteHelp Introduction... 7 What is RemoteHelp?... 7 Recommended specifications for the Representative and Customer...

More information

CCH Portal Client User Guide

CCH Portal Client User Guide CCH Portal Client User Guide 4/30/2014 Icon Legend Keys Quick reference to the key aspects of a particular function Tip Best practice tips and shortcuts Notes Informational notes about functions Warning

More information

SC-3 USB Token. QUICK Reference. Copyright 2007 CRYPTOCard Corporation All Rights Reserved

SC-3 USB Token. QUICK Reference. Copyright 2007 CRYPTOCard Corporation All Rights Reserved SC-3 USB Token QUICK Reference Copyright 2007 CRYPTOCard Corporation All Rights Reserved 091807 http://www.cryptocard.com Table of Contents OVERVIEW... 1 OPERATING MODES & OPTIONS... 2 USING THE SC-3 USB

More information

Go Ahead Bring Your Own Device to Work... 1 Requirements... 1

Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 Table of Contents Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: Activate AT&T Toggle... 1 1.1: Welcome Email with ORANGE Banner... 1 1.2: Welcome Email with BLUE Banner... 2 1.3: Orange

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Once a USB drive has been inserted into an encrypted machine, the Dell Data Protection software will recognize the unencrypted device.

Once a USB drive has been inserted into an encrypted machine, the Dell Data Protection software will recognize the unencrypted device. Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they

More information

Installation Manual for Multi-purpose Ecological Risk Assessment and Management Tool (AIST-MeRAM) For. Windows 10

Installation Manual for Multi-purpose Ecological Risk Assessment and Management Tool (AIST-MeRAM) For. Windows 10 Installation Manual for Multi-purpose Ecological Risk Assessment and Management Tool (AIST-MeRAM) For Windows 10 February 14, 2017 National Institute of Advanced Industrial Science and Technology (AIST)

More information

Deposit Wizard TellerScan Installation Guide

Deposit Wizard TellerScan Installation Guide Guide Table of Contents System Requirements... 2 WebScan Overview... 2 Hardware Requirements... 2 Supported Browsers... 2 Driver Installation... 2 Step 1 - Determining Windows Edition & Bit Count... 3

More information

Setup Instructions for Upgrading the Windows XP Panasonic CF-19 Toughbook to Windows 7

Setup Instructions for Upgrading the Windows XP Panasonic CF-19 Toughbook to Windows 7 Setup Instructions for Upgrading the Windows XP Panasonic CF-19 Toughbook to Windows 7 Installation Setup Please ensure that the Windows XP CF-19 Toughbook to be upgraded is plugged in but powered OFF

More information

Version March 7, 2012

Version March 7, 2012 PCAM Installer User's Manual Version 3.0.6 March 7, 2012 GPI360, Inc. IT121107-1 1 GPI360 Inc. PCAM Installer User s Manual Document Part Number: IT121107-1 Document Version: 3.0.6 Revised: April 13, 2012

More information

Client Installation Guide

Client Installation Guide GENView Provisioning and Portals Portal Server Client Installation Guide Release: 9.4 Document revision: 03.01 Describes the steps for installing the GVPP-PS client application. www.genband.com 630-01903-01

More information

Metasys Database Manager Help Code No. LIT Software Release 9.0 Issued August 2017

Metasys Database Manager Help Code No. LIT Software Release 9.0 Issued August 2017 Code No. LIT-12011202 Software Release 9.0 Issued August 2017 Refer to the QuickLIT website for the most up-to-date version of this document. Document Introduction...2 Summary of Changes...2 Metasys Database

More information

Table of Contents.

Table of Contents. Table of Contents 1. Items Included with the BioAxxis ThumbLock Audit Trail Software: 2 2. IMPORTANT NOTE:... 2 3. Supported Operating Systems:... 3 Section 1 Installing the BioAxxis ThumbLock AT Software...

More information

Device commands. Device Command. Compliance

Device commands. Device Command. Compliance Device commands Compliance Apply the latest Device mgmt. Profile & app info Apply the latest Device mgmt. Profile Apply the latest app mgmt. profile Apply the latest internal app info Apply customized

More information

Comodo IT and Security Manager Software Version 6.6

Comodo IT and Security Manager Software Version 6.6 Comodo IT and Security Manager Software Version 6.6 End User Guide Guide Version 6.6.053117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

WinDSX New Installations

WinDSX New Installations WinDSX New Installations Use these instructions for new Installations. a) Make sure that the Comm Server PC has the.net Framework 4.0 or higher installed. b) Make sure you have Administrative Privileges

More information

Remote Access Resources

Remote Access Resources Remote Access Resources Windows 7 Windows 10 Firm Laptop Windows Windows Mac Computer Apple ipad Mac Computer Android Devices Apple ipad Remote Access Remote Access for Personal Computer (Windows) Quick

More information