SafeGuard LAN Crypt: Loading Profile Troubleshooting Guide

Size: px
Start display at page:

Download "SafeGuard LAN Crypt: Loading Profile Troubleshooting Guide"

Transcription

1 1 Troubleshooting Guide SafeGuard LAN Crypt: Loading Profile Troubleshooting Guide Document date: 26/11/2014

2 Contents 1 Introduction SafeGuard LAN Crypt User application Loading the user profile (%username%.xml and %username%.pol) Problems loading the profile Red Key with error message Cannot copy user profile Red Key with error User certificate cannot be found Red Key with error User certificate expired or is not valid yet Red Key with error LAN Crypt Security officer s certificate not found Certificates Useful logs for troubleshooting SafeGuard LAN Crypt SGMTrace Errlfile Event log Additional information Appendix Legal notices

3 Troubleshooting Guide This document applies to the following Sophos products: SafeGuard LAN Crypt Client 3

4 1 Introduction This article describes how to troubleshoot the SafeGuard LAN Crypt client when the LAN Crypt profile fails to load i.e. the tray icon does not show a green Key. 2 SafeGuard LAN Crypt User application SafeGuard LAN Crypt is designed to be used with almost no user interaction. Logon to SafeGuard LAN Crypt Logon to SafeGuard LAN Crypt is a process where the encryption profile, which is stored in policy files, is loaded on the client machine after a user has logged into Windows. The encryption profile can only be loaded when the user owns the corresponding certificates. SafeGuard LAN Crypt encryption profiles are created by a security officer according to the security policy of the company and then stored in policy files. When the client machine logs into AD it will receive a GPO setting where the policy files can be found. Such settings are done by the system administrator. The path to the policy files are written to the registry of the client machines. SafeGuard LAN Crypt loads the policy files from this directory (or even a web server) and checks whether the user is allowed to load it by verifying the user s certificates. Certificates To have access to their encryption profile, the corresponding certificates have to be available on the user s machine. This means that the user must be in possession of both their certificate (private key p12) and the security officer certificate (public key cer-file) too. The security officer has to distribute the certificates to the user and the user has to import the certificate to their machine. If the certificates are available at first logon, the process runs completely without user interaction. SafeGuard LAN Crypt also offers the possibility to import certificates automatically after the encryption profile is loaded for the first time. In this case, the system is configured by the security officer in a way that allows SafeGuard LAN Crypt to find a certificate file (at logon) and starts to import the certificate automatically. The user is prompted to enter the PIN (password) for this certificate. The certificate (filename) must be the same as the username. For instance, if the username is Peter then the certificate name must be peter*.p12. NOTE: The PIN (password) for importing the certificate has to be distributed to the user by the security officer. 4

5 Troubleshooting Guide The certificate is checked each time the encryption profile is loaded. If a valid certificate is found, the user is logged on to SafeGuard LAN Crypt. If no valid certificate is found, the user is not able to work with encrypted data. Special encryption rules included in the SafeGuard LAN Crypt encryption profiles gives the user access to encrypted data. They define exactly which files in particular directories have to be encrypted by each key. The encryption profile of a user needs to be loaded for encryption and decryption to takes place in the background (transparently). The user will not be aware of the encryption/decryption tasks being performed. User Application A key icon in the Windows task bar shows the state of SafeGuard LAN Green key: Encryption rules loaded, transparent encryption activated. Yellow key: Encryption rules loaded, transparent encryption deactivated. Red key: No profile loaded. The application provides (via right mouse button) the following functions to the user: Load encryption rules Clear encryption rules Deactivate/Activate encryption Show profile Client Status Initial encryption Close About 5

6 3 Loading the user profile (%username%.xml and %username%.pol) Starting with the version 3.90, the client works only with policies of file type xml. Older clients do not support this file format. In case your client cannot read the received policies, a corresponding message is displayed. How does the SafeGuard LAN Crypt client workstation know where to find the correct user profile and which one to load? When creating the profile, it will always be named after the corresponding username (e.g. user Peter has a profile peter.xml or peter.pol ). The path to the profile can either be defined in Group Policy Object or directly in the registry. We recommend always using the group policy settings. Note: Only SafeGuard LAN Crypt Client 3.71 and above can load the profile from network drives or web servers via http/https (https only with versions 3.90 and above). 6

7 Troubleshooting Guide 4 Problems loading the profile 4.1 Red Key with error message Cannot copy user profile... This behaviour indicates that the profile (%username%.xml or %username%.pol) was not found by the client workstation. Reasons for this behaviour 1. The profile for this user does not exist! To be checked at SafeGuard LAN Crypt Administration console: If the security officer has created the profile but the error message above is shown, the path to the profile in SafeGuard LAN Crypt Administration and the registry of the client is different. It can be checked in the SafeGuard LAN Crypt Administration console. To do so, right-click on Central Setting and click on the Directories tab. 7

8 In case that you are using an older version e.g 3.71, please make sure that you have enabled the option Create legacy policy files (.pol.bz2) via Options. If you use different SafeGuard Client versions, you have to make sure that all SafeGuard Clients can read the generated policy files. SafeGuard LAN Crypt supports different policy file formats: 8

9 Troubleshooting Guide Create legacy policy files (.pol) for older version than Create legacy policy files (.pol.bz2) for SafeGuard LAN Crypt versions older than 3.90 e.g 3.71 Create new policy files (.xml.bz2) for SafeGuard LAN Crypt versions 3.90 and higher 2. Make sure that the user has sufficient read access to the path where the profiles are stored. 3. To be checked at AD GPO: Examine the path where the profiles are located with the path you defined in Group Policy Object (GPO). 9

10 4. Check at client: Make sure that the GPO has been applied to the workstation. This can be done by checking the registry and ensuring that the registry key PolicyFileLocation has the same value as defined in the GPO. 10

11 Troubleshooting Guide 5. If the policies have not been applied then you would normally experience an Active Directory issue. This is indicated in the Windows Application Event log with a userenv entry. You may receive many different userenv entries but basically they all indicate problems with the Active Directory. If this is the case then please fix the Active Directory issue first before proceeding. 6. Please check the connection to the web server if the policies are located on the web. Check out by trying to connect to the webserver by calling it with a web browser check for error messages there. 11

12 4.2 Red Key with error User certificate cannot be found. If this error message is displayed, it indicates that the client workstation has located the profile file but the private Key (certificates - *.p12) for this user is not available in order to decrypt the profile. The profile file must be decrypted by the private key of the user in order to get access it. If you are using certificates from a PKI or a 3rd Party Software then the certificates (private key) must already be distributed to the user. SafeGuard LAN Crypt (Loadprof.exe) imports certificates automatically when the encryption profile is loaded for the first time. 1. If you are distributing the certificates via SafeGuard LAN Crypt (loadprof.exe), you have to make sure that the path where the certificates (%username%.p12) are located on the file system is identical to the path you defined in the GPO. Note: Starting with version 3.90, p12 files can also be downloaded from a web server. If you experience an issue here then please check the connection to the web server. 12

13 Troubleshooting Guide 2. Make sure that group policies have been applied to the workstation, check the registry key P12SearchLocation to ensure that the value is the same one as defined in the GPO. 13

14 3. If group policies are not applied then you will experience AD issues and userenv errors in Windows Application Event log. Ensure AD issues are fixed before proceeding with LAN Crypt. 4. Is the certificate (private key) available for the user? To check this, open Internet Explorer properties Content Certificates. 14

15 Troubleshooting Guide 5. If all these settings are correct and the user certificate (%username%.p12) is also installed correctly, there may be a possibility that more than one certificate exists for the user. Check to ensure that the user profile is not encrypted with a different user certificate i.e. make sure to install the same certificate with which the profile was encrypted. 6. When more than one certificate exists for a user, Safeguard LAN Crypt Client (Loadprof) will always try to install the certificate with %username%.p12 first. There are successively all of the user s p12 files imported as 15

16 long as the password is correct. At http(s), up to a maximum number of 10 <Username>.p12 files can be imported (f.e. <Username>10.p12 ). 7. To make sure that you are using the correct certificate, you can manually install the *.p12 file for the user and try loading the profile again by right-clicking on the red key in the Windows Taskbar and then select Load encryption rule. 4.3 Red Key with error User certificate expired or is not valid yet This indicates that the User certificate has expired. When using PKI, this certificate should be renewed or a new user certificate for the user must be issued. When the user receives a new certificate, also the profile for that user must be generated again too. The new certificate must then be distributed to the user so the policy file can be decrypted. SafeGuard LAN Crypt can be configured so that the time invalidity will be ignored, but for security reasons we do not recommend activating this switch! This can be activated in GPO Computer configuration. This can also be checked in the SafeGuard LAN Crypt Administration console. All users that have a valid certificate will be shown with a green symbol and users with invalid certificates with a red symbol. 16

17 Troubleshooting Guide 4.4 Red Key with error LAN Crypt Security officer s certificate not found. 1. If you are distributing the public LAN Crypt Administrator (Security officer SO) certificates with the SafeGuard LAN Crypt (Loadprof.exe) then you have to make sure that the path where the certificates (*.cer) are located (network drive or web server via http/https) on the file system is the same path you defined in the GPO. All public certificates that are located in the defined path will be imported automatically. 17

18 2. Make sure that the group policies have been applied to the workstation. This can be done by checking that the registry key Security Officer Certificate Client Location has the same value as defined in the GPO. 3. If group policies are not applied then you will experience AD issues and userenv errors in Windows Application Event log. Please fix these issues first before proceeding. 4. Is the LAN Crypt Administrator Certificate installed? To check this, open Internet Explorer properties Content Certificates. Note: The public certificate of the security officer who created the user profile must be installed in order to gain access to the rules in the profile. 5. To make sure that you are using the correct public security officer certificate, you can manually install the *.cer file for the security officer who generated the user profile. Once done, try loading the profile again by right-clicking on the red key in the Windows Taskbar and select Load encryption rule. 6. It is not allowed to rename Security officer certificate when they are located on a web server. If you rename the certificate then it cannot be loaded on to the client because the client searches for the file name and will not be able to find it. If it is on a share then the client will search all files till it finds the certificate that matches. 18

19 Troubleshooting Guide 7. This error will also appear if the SO certificates does not contain the correct key usage. The Key Usage for SO certificates should contain: Digital Signature, Non-Repudiation, Key Encipherment, and Data Encipherment. 19

20 5 Certificates Important information about how to use certificates: The Key Usage value of the user certificate must be KeyEncryption and/or DataEncryption. The Certificate may not contain any unknown critical extensions. Following critical extensions are allowed, if any other critical extension is set then the certificate cannot be used: OID: (key usage) OID: (enhanced key usage) OID: (Utimaco critical extension) OID: (basic constraints) OID: (certificate policies) To check the key extension of a certificate, double-click on the certificate and go to the Details tab. Now you can set a filter to show Extensions Only as per image below. 20

21 Troubleshooting Guide The Key Usage for any SO certificate, that can generate the profiles, should contain Digital Signature, Non-Repudiation, Key Encipherment, and Data Encipherment. SafeGuard LAN Crypt only uses the Microsoft Crypto API for certificate functionality. Most certificates that use this function are supported. Certificates using the Cryptographic Next Generation (CNG) CSP are not supported. SafeGuard LAN Crypt supports all Cryptographic Service Providers (CSPs) that comply with certain standards (e.g. RSA key length at least 1024 bits). They include, among others, the Microsoft Enhanced CSP. In the case that a CRL-Distribution point is set in a certificate and it is out of reach, it could take a while (depending on the CSP) until a timeout appears Note: The Microsoft Base CSP cannot be used! Ignore rules during Certificate Verification In SafeGuard LAN Crypt, you can specify whether any errors found when checking user certificates are to be ignored. Note: Ignoring errors that occur during certificate checks always means a reduction in security and we recommend using a certificate that has the required properties instead of ignoring the error. Even if the setting is configured, the certificate may still be rejected by CSP or Middleware (especially when tokens are used). These settings can be defined under Client Settings Ignore during Certificate Verification in the GPO. You can select which status shall be ignored during the certificate verification. 21

22 Ignore Certificate revoked If a certificate is on a Certificate Revocations List (CRL), which is evaluated during logon, it may not actually be used for accessing his profile. But with this option activated a user can continue to gain access to his encryption profile - because in this case LAN Crypt will not check for any CRL. Ignore time invalidity Even if the validity period of a certificate has expired, the user can continue to access their encryption profile, if this option is selected. Ignore bad certificate chain 22

23 Troubleshooting Guide If this option is activated, the user can continue to access their encryption profile even if the public part of the issuer s certificate is not available on the client machine or is kept in the wrong certificate store. Ignore unknown revocation When PKIs from some vendors write reasons for the revocation of a certificate to a CRL, they do not comply with common standards. You cannot usually use a certificate if the reason for revocation is not known. However, if this option is selected, the user can continue to access their encryption profile. Note: A network connection may be necessary to evaluate the certificate chain and CRL. If a connection cannot be established, access will be denied, although the certificate may actually be valid. 23

24 6 Useful logs for troubleshooting SafeGuard LAN Crypt 6.1 SGMTrace If you experience an issue with loading profiles, it would be very helpful to create a log file called SGMTrace. KBA SafeGuard LAN Crypt: How to enable extended tracing for SafeGuard LAN Crypt explains how to do this. 6.2 Errlfile On the desktop, right-click on My Computer Properties Advanced Environment Variables System Variables. Add a new variable ERRLFILE : Restart the machine. 24

25 Troubleshooting Guide After the reboot, you will be able to access the log file (path is defined when creating the variable). Note: Errlfile can be only created for the earlier versions i.e and below. 6.3 Event log Check Windows Event log for any errors 25

26 7 Additional information Relevant KBAs KBA SafeGuard LAN Crypt: User certificate cannot be found KBA SafeGuard LAN Crypt Administration 3.80 and above: How to add a Critical Extension for a newly generated certificate 26

27 Troubleshooting Guide 8 Appendix [actually no information for future references] 27

28 Legal notices Copyright 2014 Sophos Group. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise unless you are either a valid licensee where the documentation can be reproduced in accordance with the license terms or you otherwise have the prior permission in writing of the copyright owner. Sophos, Sophos Anti-Virus, and SafeGuard are registered trademarks of Sophos Limited, Sophos Group and Utimaco Safeware AG, as applicable. All other product and company names mentioned are trademarks or registered trademarks of their respective owners. 28

Sophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 7

Sophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 7 Sophos SafeGuard File Encryption for Mac Quick startup guide Product version: 7 Document date: December 2014 Contents 1 About Sophos SafeGuard File Encryption for Mac...3 2 First use...4 3 Working with

More information

SafeGuard Easy Demo guide. Product version: 6 Document date: February 2012

SafeGuard Easy Demo guide. Product version: 6 Document date: February 2012 SafeGuard Easy Demo guide Product version: 6 Document date: February 2012 Contents 1 Introduction...3 2 Requirements...4 3 The demo configuration package...5 4 Install the demo software...6 5 What to expect

More information

SafeGuard Easy Demo guide. Product version: 6.1

SafeGuard Easy Demo guide. Product version: 6.1 SafeGuard Easy Demo guide Product version: 6.1 Document date: February 2014 Contents 1 About this guide...3 2 Requirements...4 3 The demo configuration package...5 4 Install the demo software...6 5 What

More information

SafeGuard LAN Crypt Client help

SafeGuard LAN Crypt Client help SafeGuard LAN Crypt Client help Product version: 3.95 Document date: September 2016 Contents 1 What is SafeGuard LAN Crypt?...3 1.1 Data protection using SafeGuard LAN Crypt...3 1.2 SafeGuard LAN Crypt

More information

Kerio VPN Client. User Guide. Kerio Technologies

Kerio VPN Client. User Guide. Kerio Technologies Kerio VPN Client User Guide Kerio Technologies 2012 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio VPN Client, version 7.3 for Windows. All additional

More information

Sophos Anti-Virus for NetApp Storage Systems

Sophos Anti-Virus for NetApp Storage Systems Sophos Anti-Virus for NetApp Storage Systems user guide Product Version: 3.0 Contents About this guide... 1 About Sophos Anti-Virus for NetApp Storage Systems...2 System requirements... 4 Before you install

More information

Sophos Enterprise Console

Sophos Enterprise Console secure network quick startup guide Product Version: 5.5 Contents About this guide... 1 Limitations on the secure network...2 What do I install?...3 What are the key steps?... 4 Download the installers...5

More information

Sophos Central Partner ConnectWise Integration. guide

Sophos Central Partner ConnectWise Integration. guide Sophos Central Partner ConnectWise Integration guide Contents About ConnectWise Integration... 1 Customer usage and other data sent to ConnectWise...1 Set up integration... 3 Initial setup in ConnectWise...3

More information

Sophos Connect. help

Sophos Connect. help help Contents About... 1 Installing...1 Uninstalling... 1 Connections...3 Import connection... 3 Connect...4 Connection options...7 Events...9 Troubleshooting events... 10 General troubleshooting... 13

More information

Sophos Mobile. Network Access Control interface guide. Product Version: 8.1

Sophos Mobile. Network Access Control interface guide. Product Version: 8.1 Network Access Control interface guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile NAC support... 2 Prerequisites...3 Configure NAC support...4 NAC web service interface... 5 API

More information

Sophos Enterprise Console

Sophos Enterprise Console quick startup guide Product Version: 5.5 Contents About this guide... 1 What do I install?...2 What are the key steps?... 3 Download the Enterprise Console installer...4 If you have a Sophos license...

More information

Sophos Central Device Encryption. Administrator Guide

Sophos Central Device Encryption. Administrator Guide Sophos Central Device Encryption Administrator Guide Contents About... 1 Manage BitLocker Drive Encryption... 2 Migrate to...2 Prepare Device Encryption...3 Device Encryption step by step... 3 Device Encryption

More information

How to Configure SSL Interception in the Firewall

How to Configure SSL Interception in the Firewall Most applications encrypt outgoing connections with SSL or TLS. SSL Interception decrypts SSL-encrypted traffic to allow Application Control features (such as the Virus Scanner, ATD, URL Filter, Safe Search,

More information

Sophos for Virtual Environments. configuration guide -- Sophos Central edition

Sophos for Virtual Environments. configuration guide -- Sophos Central edition Sophos for Virtual Environments configuration guide -- Sophos Central edition Contents About this guide... 1 Configure policies...2 Check that guest VMs are protected...5 Check the protection settings...5

More information

Authentication is not limited to the workstation logon but it supports also Remote Desktop, Shares, Hyper-V Sessions, etc.

Authentication is not limited to the workstation logon but it supports also Remote Desktop, Shares, Hyper-V Sessions, etc. Aloaha Smartlogin Aloaha Smartlogin allows you to logon to your windows machine with a Smart Card, PKCS #11 Token, USB Memory Stick or just a plain Memory Card such as I2c or Mifare. Authentication is

More information

Endpoint web control overview guide

Endpoint web control overview guide Endpoint web control overview guide Sophos Web Appliance Sophos UTM (version 9.2 or later) Sophos Enterprise Console Sophos Endpoint Security and Control Contents 1 Endpoint web control...3 2 Enterprise

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement

More information

Sophos Mobile. startup guide. Product Version: 8.1

Sophos Mobile. startup guide. Product Version: 8.1 Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

keyon / PKCS#11 to MS-CAPI Bridge User Guide V2.4

keyon / PKCS#11 to MS-CAPI Bridge User Guide V2.4 / PKCS#11 to MS-CAPI Bridge V2.4 April 2017 Table of Contents Copyright 2017 by AG All rights reserved. No part of the contents of this manual may be reproduced or transmitted in any form or by any means

More information

Sophos Central Self Service Portal help

Sophos Central Self Service Portal help Sophos Central Self Service Portal help Contents 1 About this Help...3 2 Email...4 2.1 Manage Quarantined Email...4 2.2 Emergency Inbox...4 3 Mobile Control...5 3.1 Set up Sophos Mobile Control on your

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control for Windows, version 10.0 Sophos Anti-Virus for Mac OS X, version 7 Document date: December 2011 Contents

More information

Sophos Mobile. startup guide. Product Version: 8.5

Sophos Mobile. startup guide. Product Version: 8.5 Sophos Mobile startup guide Product Version: 8.5 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

SafeGuard Enterprise. user help. Product Version: 8.1

SafeGuard Enterprise. user help. Product Version: 8.1 SafeGuard Enterprise user help Product Version: 8.1 Contents About SafeGuard Enterprise...1 Modules... 2 Full disk encryption with BitLocker...2 Full disk encryption with SafeGuard Power-on Authentication...

More information

Integration Guide. Entrust Authority Security Manager 8.1 SP1 Microsoft Windows Server 2012 R2 Standard

Integration Guide. Entrust Authority Security Manager 8.1 SP1 Microsoft Windows Server 2012 R2 Standard Integration Guide Entrust Authority Security Manager 8.1 SP1 Microsoft Windows Server 2012 R2 Standard Integration Guide: Entrust Authority Security Manager 8.1 SP1 Imprint copyright 2018 Utimaco IS GmbH

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

Sophos for Virtual Environments. startup guide -- Sophos Central edition

Sophos for Virtual Environments. startup guide -- Sophos Central edition Sophos for Virtual Environments startup guide -- Sophos Central edition Contents About this guide... 1 About Sophos for Virtual Environments...2 Key steps in installation... 5 Check the system requirements...

More information

How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity

How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity This article explains how to configure your Sophos UTM to allow access Microsoft s Remote Desktop Gateway

More information

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the

More information

The SafeNet Security System Version 3 Overview

The SafeNet Security System Version 3 Overview The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure IT

More information

Endpoint Security Client

Endpoint Security Client Endpoint Security Client R80 User Guide 28 February 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed

More information

Centrify Infrastructure Services

Centrify Infrastructure Services Centrify Infrastructure Services Smart Card Configuration Guide August 2018 (release 18.8) Centrify Corporation Legal Notice This document and the software described in this document are furnished under

More information

Blue Coat Security First Steps Solution for Controlling HTTPS

Blue Coat Security First Steps Solution for Controlling HTTPS Solution for Controlling HTTPS SGOS 6.5 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks

More information

User Management Tool

User Management Tool Citrix Product Documentation docs.citrix.com September 21, 2018 Contents What s new 3 What s new in User Management Tool 1.8.1........................... 3 What s new in User Management Tool 1.8............................

More information

Novell ZENworks Endpoint Security Management 4.1 Interim Release 1. 1 Issues Resolved in IR1. Novell. April 16, 2010

Novell ZENworks Endpoint Security Management 4.1 Interim Release 1. 1 Issues Resolved in IR1. Novell. April 16, 2010 Novell ZENworks Endpoint Security Management 4.1 Interim Release 1 Novell April 16, 2010 Interim Release 1 (IR1) is the current release of ZENworks Endpoint Security Management 4.1. You can download IR1

More information

Aloaha Smartlogin allows you to logon to your windows machine with a Smart Card, PKCS #11 Token or USB Memory Stick.

Aloaha Smartlogin allows you to logon to your windows machine with a Smart Card, PKCS #11 Token or USB Memory Stick. Aloaha Smartlogin Aloaha Smartlogin allows you to logon to your windows machine with a Smart Card, PKCS #11 Token or USB Memory Stick. Aloaha even supports plain and simple cards such as MIFARE, I2C or

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

Sophos Central Enterprise

Sophos Central Enterprise Contents 1 About Sophos Central Enterprise...3 2 Dashboard...4 3 Alerts...5 4 Sub-Estates...6 5 Licenses...8 6 Trials...9 7 Manage Administrators...10 8 Explore Products...11 9 Global Security News...12

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information

Configuring Certificate Authorities and Digital Certificates

Configuring Certificate Authorities and Digital Certificates CHAPTER 43 Configuring Certificate Authorities and Digital Certificates Public Key Infrastructure (PKI) support provides the means for the Cisco MDS 9000 Family switches to obtain and use digital certificates

More information

Privileged Access Agent on a Remote Desktop Services Gateway

Privileged Access Agent on a Remote Desktop Services Gateway Privileged Access Agent on a Remote Desktop Services Gateway IBM SECURITY PRIVILEGED IDENTITY MANAGER User Experience and Configuration Cookbook Version 1.0 November 2017 Contents 1. Introduction 5 2.

More information

Sophos Firewall Configuring SSL VPN for Remote Access

Sophos Firewall Configuring SSL VPN for Remote Access Sophos Firewall Configuring SSL VPN for Remote Access Product Version: 1 Document date: October 2014 Contents 1 Introduction 3 2 Configuring Sophos Firewall 4 2.1 Defining a User Account 4 2.2 Configuring

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

Send documentation comments to

Send documentation comments to CHAPTER 6 Configuring Certificate Authorities and Digital Certificates This chapter includes the following topics: Information About Certificate Authorities and Digital Certificates, page 6-1 Default Settings,

More information

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures Public Key Infrastructures Public Key Infrastructure Definition and Description Functions Components Certificates 1 2 PKI Services Security Between Strangers Encryption Integrity Non-repudiation Key establishment

More information

Sophos Central Enterprise. Help

Sophos Central Enterprise. Help Help Contents About Sophos Central Enterprise...1 Dashboard... 2 Alerts... 3 Logs... 4 Audit Logs...4 Sub-Estates... 6 Unlink sub-estates... 7 Delete sub-estates...8 Licenses...9 Trials...10 Manage Administrators...

More information

Sophos Deployment Packager

Sophos Deployment Packager Sophos Deployment Packager guide Product Version: 1.3 Contents About this guide... 1 About Deployment Packager... 2 Deployment Packager known issues and limitations...2 System requirements... 3 Create

More information

XenApp 5 Security Standards and Deployment Scenarios

XenApp 5 Security Standards and Deployment Scenarios XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards

More information

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT ESCB-PKI REGISTRATION AUTHORITY APPLICATION MOST COMMON ERRORS VERSION 1.2 ECB-PUBLIC 15-November-2012 ESCB-PKI - Common errors v.1.2.docx Page 2 of 20

More information

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without

More information

Sophos for Virtual Environments. startup guide -- Enterprise Console edition

Sophos for Virtual Environments. startup guide -- Enterprise Console edition Sophos for Virtual Environments startup guide -- Enterprise Console edition Contents About this guide... 1 About Sophos for Virtual Environments...2 Key steps in installation... 5 Check the system requirements...

More information

Troubleshooting smart card logon authentication on active directory

Troubleshooting smart card logon authentication on active directory Troubleshooting smart card logon authentication on active directory Version 1.0 Prepared by: "Vincent Le Toux" Date: 2014-06-11 1 Table of Contents Table of Contents Revision History Error messages The

More information

NCP Secure Client Juniper Edition (Win32/64) Release Notes

NCP Secure Client Juniper Edition (Win32/64) Release Notes Service Release: 10.10 r31802 Date: September 2016 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows 10 32/64 bit Windows 8.x 32/64

More information

Troubleshooting Guide

Troubleshooting Guide . All right reserved. For more information about Specops Reset and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Reset is a trademark owned by Specops Software.

More information

SecuRemote for Windows 32-bit/64-bit

SecuRemote for Windows 32-bit/64-bit SecuRemote for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

ivest Client 4.0 Release User Guide

ivest Client 4.0 Release User Guide ivest Client 4.0 Release User Guide Windows Vista Documentation Version 4.0.0.1 ( 29-April-2008 ) MIMOS BERHAD TECHNOLOGY PARK MALAYSIA 57000 KUALA LUMPUR http://www.ivest.com.my http://www.mimos.my Copyright

More information

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Intel Security Drive Encryption 7.1.3

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Intel Security Drive Encryption 7.1.3 RSA SECURID ACCESS Authenticator Implementation Guide Intel Security Daniel R. Pintal, RSA Partner Engineering Last Modified: December 12, 2016 Solution Summary Intel Security/McAfee

More information

Instructions for Application Access via SecureCitrix

Instructions for Application Access via SecureCitrix Instructions for Application Access via SecureCitrix This document provides Crozer-Keystone Health System associates instructions for accessing internal applications via the CKHS Citrix Secure Gateway.

More information

Security Service tools user IDs and passwords

Security Service tools user IDs and passwords IBM Systems - iseries Security Service tools user IDs and passwords Version 5 Release 4 IBM Systems - iseries Security Service tools user IDs and passwords Version 5 Release 4 Note Before using this information

More information

VMware Horizon Client for Chrome OS User Guide. 04 JAN 2018 VMware Horizon Client for Chrome OS 4.7

VMware Horizon Client for Chrome OS User Guide. 04 JAN 2018 VMware Horizon Client for Chrome OS 4.7 VMware Horizon Client for Chrome OS User Guide 04 JAN 2018 VMware Horizon Client for Chrome OS 4.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

ONE ID Identity and Access Management System

ONE ID Identity and Access Management System ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

MANAGING LOCAL AUTHENTICATION IN WINDOWS

MANAGING LOCAL AUTHENTICATION IN WINDOWS MANAGING LOCAL AUTHENTICATION IN WINDOWS Credentials Manager Windows OS has a set of tools that help remedy some of the authentication challenges. For example, the Credential Manager in Windows 7 and newer

More information

Lab - View Wireless and Wired NIC Information

Lab - View Wireless and Wired NIC Information Lab - View Wireless and Wired NIC Information Objectives Part 1: Identify and Work with PC NICs Part 2: Identify and Use the System Tray Network Icons Background / Scenario This lab requires you to determine

More information

Administrator s Guide (CA QIWI Bank)

Administrator s Guide (CA QIWI Bank) PUT&GET MAIL (PGM) Administrator s Guide (CA QIWI Bank) MOSCOW March 2017 PGM Administrator s Guide (QIWI) INDEX 1. SETTING UP... 2 1.1. COMMON SETTINGS... 2 1.2. POINT CONFIGURATIONS... 2 1.2.1. Options

More information

Step-by-step installation guide for monitoring untrusted servers using Operations Manager

Step-by-step installation guide for monitoring untrusted servers using Operations Manager Step-by-step installation guide for monitoring untrusted servers using Operations Manager Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside

More information

Entrust Connector (econnector) Venafi Trust Protection Platform

Entrust Connector (econnector) Venafi Trust Protection Platform Entrust Connector (econnector) For Venafi Trust Protection Platform Installation and Configuration Guide Version 1.0.5 DATE: 17 November 2017 VERSION: 1.0.5 Copyright 2017. All rights reserved Table of

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

Pulse Secure Client for Chrome OS

Pulse Secure Client for Chrome OS Pulse Secure Client for Chrome OS Quick Start Guide Published March, 2018 Release 5.2r1 Version 1.6 2018 by Pulse Secure, LLC. All rights reserved 1 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose,

More information

Sophos for Virtual Environments Startup guide -- Enterprise Console edition. Product version: 1.1

Sophos for Virtual Environments Startup guide -- Enterprise Console edition. Product version: 1.1 Sophos for Virtual Environments Startup guide -- Enterprise Console edition Product version: 1.1 Contents 1 About this guide...4 2 About Sophos for Virtual Environments...5 3 Key steps in installation...8

More information

Intel Security/McAfee Endpoint Encryption

Intel Security/McAfee Endpoint Encryption RSA Ready Implementation Guide for RSA SecurID Last Modified: March 13, 2015 Partner Information Product Information Partner Name Intel Security formerly McAfee Web Site www.mcafee.com Product Name for

More information

Assureon Installation Guide Client Certificates. for Version 6.4

Assureon Installation Guide Client Certificates. for Version 6.4 Client Certificates for Version 6.4 Publication info 2011 Nexsan Technologies Canada Inc. All rights reserved. Published by: Nexsan Technologies Canada Inc. 1405 Trans Canada Highway, Suite 300 Dorval,

More information

digiseal server User Guide

digiseal server User Guide Page 1 of 57 Server software for central automated processes secrypt GmbH Bessemerstraße 82 D-12103 Berlin, Germany Tel: +49 30 7565978-0 Fax: +49 30 7565978-18 mail@secrypt.de www.secrypt.de Last Revision:

More information

DoD Common Access Card Authentication. Feature Description

DoD Common Access Card Authentication. Feature Description DoD Common Access Card Authentication Feature Description UPDATED: 20 June 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies

More information

Installation and configuration guide

Installation and configuration guide Winfrasoft HAS Installation and Configuration Guide Installation and configuration guide Winfrasoft HAS for Microsoft Forefront UAG 2010 Published: October 2011 Applies to: Winfrasoft HAS (Build 2.0.2300.4)

More information

Kerberos Constrained Delegation Authentication for SEG V2. VMware Workspace ONE UEM 1810

Kerberos Constrained Delegation Authentication for SEG V2. VMware Workspace ONE UEM 1810 Kerberos Constrained Delegation Authentication for SEG V2 VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you

More information

The PKI Certificate Manager will require to be upgraded before renewing your certificates:

The PKI Certificate Manager will require to be upgraded before renewing your certificates: HCN Technical Support KBA: This article applies to Product(s): Blue Chip 2.1 (Medicare Australia Online) Summary: PKI certificates are the basis of an encryption technology used for the secure transmission

More information

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Check Point SmartEndpoint Security

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Check Point SmartEndpoint Security RSA SECURID ACCESS Authenticator Implementation Guide Check Point SmartEndpoint Security Daniel R. Pintal, RSA Partner Engineering Last Modified: January 27, 2017 Solution

More information

Certification Authority

Certification Authority Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying

More information

YubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n

YubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n YubiKey Smart Card Minidriver User Guide Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n Copyright 2017 Yubico Inc. All rights reserved. Trademarks

More information

SSH Communications Tectia SSH

SSH Communications Tectia SSH Secured by RSA Implementation Guide for 3rd Party PKI Applications Last Modified: December 8, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product

More information

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Index INDEX... 2 1. DISCLOSURE TEXT APPLICABLE TO NATURAL PERSON CERTIFICATES ISSUED ON QSCD...

More information

ForeScout CounterACT. SecureConnector Advanced Features. How-to Guide. Version 8.0

ForeScout CounterACT. SecureConnector Advanced Features. How-to Guide. Version 8.0 ForeScout CounterACT SecureConnector Advanced Features How-to Guide Version 8.0 Table of Contents About this How-to Guide... 3 Certificate Based Rapid Authentication of Endpoints... 3 Requirements for

More information

Dolby Conference Phone. Configuration guide for BT MeetMe with Dolby Voice

Dolby Conference Phone. Configuration guide for BT MeetMe with Dolby Voice Dolby Conference Phone Configuration guide for BT MeetMe with Dolby Voice Version 3.2 17 May 2017 Copyright 2017 Dolby Laboratories. All rights reserved. Dolby Laboratories, Inc. 1275 Market Street San

More information

One Identity Defender 5.9. Product Overview

One Identity Defender 5.9. Product Overview One Identity 5.9 Product Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Titan FTP Server SSH Host Key Authentication with SFTP

Titan FTP Server SSH Host Key Authentication with SFTP 2016 Titan FTP Server SSH Host Key Authentication with SFTP A guide for configuring and maintaining SSH Host Key Authentication for SFTP connections in Titan FTP Server. QuickStart Guide 2016 South River

More information

YubiKey Smart Card Deployment Guide

YubiKey Smart Card Deployment Guide YubiKey Smart Card Deployment Guide Best Practices and Basic Setup YubiKey 4 Series (YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano) YubiKey NEO Series (YubiKey NEO, YubiKey NEO-n) Last Updated:

More information

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2 Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...

More information

Balabit s Privileged Session Management and Remote Desktop Protocol Scenarios

Balabit s Privileged Session Management and Remote Desktop Protocol Scenarios Balabit s Privileged Session Management and Remote Desktop Protocol Scenarios May 02, 2018 Abstract Common RDP scenarios for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a

More information

OCSP Client Tool V2.2 User Guide

OCSP Client Tool V2.2 User Guide Ascertia Limited 40 Occam Road Surrey Research Park Guildford Surrey GU2 7YG Tel: +44 1483 685500 Fax: +44 1483 573704 www.ascertia.com OCSP Client Tool V2.2 User Guide Document Version: 2.2.0.2 Document

More information

NeoAccel NeoAccel Management Console: Gateway Gateway Administration version version 2.3

NeoAccel NeoAccel Management Console: Gateway Gateway Administration version version 2.3 SSL VPN-Plus TM NeoAccel NeoAccel Management Console: Console: Gateway Gateway Administration version version 2.3 2.0 Copyright 2005-2006. 2005-2009. NeoAccel Inc. NeoAccel Inc. NMC - Volume II -SSL VPN-Plus-v2.33

More information

Guide Installation and User Guide - Mac

Guide Installation and User Guide - Mac Guide Installation and User Guide - Mac With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

NCP Secure Client Juniper Edition Release Notes

NCP Secure Client Juniper Edition Release Notes Service Release: 10.11 r32792 Date: November 2016 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows 10 32/64 bit Windows 8.x 32/64

More information

U.S. E-Authentication Interoperability Lab Engineer

U.S. E-Authentication Interoperability Lab Engineer Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI

More information

Version 3 X.509 Certificates

Version 3 X.509 Certificates Entrust Technologies White Paper Author: Ian Curry Date: July 1996 Version: 1.0 Entrust Technologies, 1997. All rights reserved. 1 1. Introduction This document provides a description of the version 3

More information

Displaying SSL Configuration Information and Statistics

Displaying SSL Configuration Information and Statistics CHAPTER 7 Displaying SSL Configuration Information and Statistics This chapter describes the show commands available for displaying CSS SSL configuration information and statistics and an explanation of

More information

AirWatch Mobile Device Management

AirWatch Mobile Device Management RSA Ready Implementation Guide for 3rd Party PKI Applications Last Modified: November 26 th, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description

More information