Check Point GO R75. User Guide. 14 November Classification: [Public]

Size: px
Start display at page:

Download "Check Point GO R75. User Guide. 14 November Classification: [Public]"

Transcription

1 Check Point GO R75 User Guide 14 November 2011 Classification: [Public]

2 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS and FAR TRADEMARKS: Refer to the Copyright page ( for a list of our trademarks. Refer to the Third Party copyright notices ( for a list of relevant copyrights and third-party licenses.

3 Important Information Latest Software We recommend that you install the most recent software release to stay up-to-date with the latest functional improvements, stability fixes, security enhancements and protection against new and evolving attacks. Revision History Date Description 14 November 2011 First release of this document Feedback Check Point is engaged in a continuous effort to improve its documentation. Please help us by sending your comments on Check Point GO R75 User Guide).

4 Contents Important Information... 3 Check Point GO Secure Portable Workspace... 5 Welcome to Check Point GO... 5 First Time Setup... 5 Selecting a Strong Password... 6 Updating the Check Point GO Policy... 6 Logging Into Check Point GO... 7 Folder Mode... 7 Resetting a Lost Password... 8 Device Expiration... 8 Advanced Operations... 8 Disk Cleanup... 9 Working with the Virtual Desktop... 9 The Check Point GO Desktop Icons... 9 Start Menu and Taskbar...10 FTP Shared Folder...11 Switching Between Check Point GO and the Host PC...11 Switching Between the Host PC and Check Point GO...11 Exporting Files to the Host...11 Importing Files from the Host PC...12 Closing Secure Portable Workspace...12 Portable Apps Using the Remote VPN Client Overview...14 Creating a Site Using the Site Wizard...14 Connecting to the Site...15 Hotspot Detection and Exclusion...15 Staying Connected to the Site...15 Selecting an Authentication Scheme...15 Certificates...16 User Name and Password...18 SecurID...18 Challenge Response...18 Changing Authentication Schemes...19 Troubleshooting Logging Into Windows...20 Collecting Logs...20

5 Chapter 1 Check Point GO Secure Portable Workspace This section explains how to work with the Check Point GO Secure Workspace. In This Chapter Welcome to Check Point GO 5 First Time Setup 5 Updating the Check Point GO Policy 6 Logging Into Check Point GO 7 Advanced Operations 8 Disk Cleanup 9 Working with the Virtual Desktop 9 Closing Secure Portable Workspace 12 Welcome to Check Point GO Check Point GO is a portable secure virtual workspace featuring security software from Check Point integrated with an encrypted USB flash drive. Check Point GO creates a temporary secure virtual workspace on any PC, providing you with secure access to resources from anywhere without fear of data loss. Using Check Point GO, you can store working files on the encrypted USB drive and transfer files to and from the host PC, if this is allowed by the security policy. When your Check Point GO session ends, no trace of the session is left on the host PC. First Time Setup This section has tips for selecting a strong password and instructions for setting up Check Point GO for the first time. To set up Check Point GO for the first time: 1. Insert the Check Point GO USB disk into an available USB port on the host PC. The first-time setup wizard should guide you through the initial configuration. If the setup does not appear automatically: a) On the desktop of the Host PC, double-click My Computer. b) Right-click the new Check Point GO drive and select open. Names of the Check Point GO drive may vary according to the Windows version. c) Double-click the Check Point GO icon. Check Point GO begins to load. 2. The first time configuration wizard opens. Optionally, select a language. This sets the language for the Check Point GO interface and Online Help. Make sure that your host computer supports the selected language. You can also change the language at a different time from the Advanced settings of the login window. Page 5

6 Updating the Check Point GO Policy 3. Click Next. The License Agreement displays. 4. Select I accept the terms of the agreement, and click Next. 5. Enter a password for the device. Be sure to create a strong password (using the password strength indicator), and to remember the password for subsequent device logins. You can create a password for your Check Point GO device using either of the following methods: Enter a password in the Create Password field, and confirm it in the Confirm Password field, then click Next. Click the Virtual Keyboard button located to the right of the Create Password and Confirm Password fields to open the virtual keyboard. Use your mouse to enter your password, and click Return. Note - The virtual keyboard enhances the security of the login process. It makes sure that keystroke loggers cannot record your password. 6. Click Next. Wait for Check Point GO to load and the Check Point GO virtual desktop to display. The Getting to Know Check Point GO pop-up window explains operations available on the Check Point GO control bar. Applications permitted to run within secure workspace have icons displayed either on the virtual desktop or the Start menu. This setup process occurs once. The second time you insert the Check Point GO device, you need only to log in and the virtual desktop opens. Selecting a Strong Password When you set up Check Point GO for the first time, you will be asked to select a password. We recommend that you select a strong password for the device. Strong passwords: Are lengthy A 15-character password composed of random letters and numbers is much more secure than an 8- character password composed of characters taken from the entire keyboard. Each character that you add to the password increases the protection that the password provides. Combine letters, numbers, and symbols A mixture of upper and lower case letters, numbers, and symbols (including punctuation marks not on the upper row of the keyboard). Avoid sequences or repeated characters For example 12345, or aaaaa. Avoid look-alike substitutions of numbers or characters For example replacing the letter "i" with the number "1", or zero with the letter "o". Avoid your login name Avoid dictionary words in any language Updating the Check Point GO Policy It is recommended to immediately update the Check Point GO policy. Click the Connect to Site icon on the Check Point GO desktop. Clicking the icon opens a wizard to configure a built-in remote access VPN client (see "Using the Remote VPN Client" on page 14). After the VPN client has been configured, a pop-up alert opens with this message: Check Point GO environment update is available. Click to restart Check Point GO. To get the update, do one of these: Click the alert message when it is open to get the update and then Restart Check Point GO. Check Point GO Secure Portable Workspace Page 6

7 Logging Into Check Point GO Click the Restart icon at any time and Check Point GO will get the update and restart. Logging Into Check Point GO Important - After seven failed login attempts, the Check Point GO device is locked. Remote password reset is required to unlock the device. If you continue to attempt to access the device, Check Point GO detects this as a brute force attack and reformats the device after three such attempts. The reformatting process erases all stored data. If you have forgotten your password, follow the instructions for Resetting a Lost Password. To Log in to Check Point GO: 1. Insert the Check Point GO USB disk into the host PC. Secure Workspace initializes when the USB disk is inserted, and the login screen displays: 2. You can log in the Check Point GO using either of the following methods: Enter the device password created in First Time Setup in the Device Password field and click Login. Click the Virtual Keyboard button located to the right of the Device Password field to open the virtual keyboard. Use your mouse to enter your password, and click Return. Note - Using the virtual keyboard enhances the security of the login process by ensuring that keystroke loggers cannot record your password. If you have forgotten your password, you can reset it ("Resetting a Lost Password" on page 8). Note - Password reset is available only after the first time you log into a VPN gateway. Folder Mode Folder mode gives access to encrypted Check Point GO folders on the device without opening the Secure Workspace desktop environment. In Windows explorer, browse to the encrypted storage and add or remove files directly. To Access Files and Folders directly on the Device: 1. Insert the device. 2. On the Login window, select Folder mode only. 3. Enter the device password. Windows explorer opens showing the Check Point GO User folder. The Check Point GO User folder contains sub-folders for: AppData Desktop Documents Links Music Pictures Public Videos 4. Edit, add or remove files as necessary. Note - The File > Open, File > Save (or Save As) options within any Windows application (such as Word) cannot be used to navigate to and change a file inside Check Point GO. Use Windows Explorer to copy or move the file outside of the Check Point GO folder before opening, changing, and saving. Check Point GO Secure Portable Workspace Page 7

8 Advanced Operations Resetting a Lost Password Important - After seven failed login attempts, the Check Point GO device is locked. Remote password reset unlocks the device. If you continue to attempt to access the device, Check Point GO detects this as a brute force attack and reformats the device after three such attempts. The reformatting process erases all stored data. If you forget your password, do the instructions in this section. To Reset a Lost Password: 1. In the Check Point GO Login window click Forgot your password? The Password Reset wizard opens. Select one of the Password Reset modes: Basic- This is the default. If you are not instructed otherwise by your administrator, select this option. Advanced- Select this option only if you are instructed to do so by your administrator. 2. Enter your new password. 3. Wait for the Help ID to display. 4. Using the number listed, call the help desk and present the Help ID. 5. Enter the Unlock Code supplied by the Help Desk and wait until the Remote password reset finished complete message appears. Note - If you enter the Unlock Code incorrectly, the reset process fails. If you remove the Check Point GO from the computer between reset attempts, or disconnect from the VPN site, a maximum of five reset attempts remain. 6. Login to the Check Point GO device using your new password. Device Expiration When logging in to the Check Point GO device, you might see a Device Locked message. The Check Point GO device locks after: A specified date. You tried to complete the first-time wizard after a pre-defined date. A specified time period has passed. The device expired after a predefined duration. A pre-defined number of failed VPN authentication attempts. Seven incorrect password attempts. If your device expires you can: Format the device. Use the Advanced button > Format Device tab > Back to Factory Default option. Use the Remote Password Reset link shown in the Check Point GO login window. For Remote Password Reset to be available: You must have connected at least once to the designated VPN site. Your system administrator must have Remote Password Reset configured for you. Advanced Operations Clicking the Advanced button on the device login window gives access to these tabs: Change Password - Change the password. Use this option if you know your old password. You can enter your password change using your physical keyboard, or you can click the Virtual Keyboard icon next to each field and use your mouse to enter your password change information. Format Device - From this tab you can restore Check Point GO to its default setting and erase all data on the device. Two options: Check Point GO Secure Portable Workspace Page 8

9 Disk Cleanup Delete user data and Portable Apps (maintains security policy and VPN Settings) The format option available to all users, user password required. (User format) Revert to factory defaults This format option requires a password set by your system administrator. (Admin format). Reset Password - Use this option to reset a lost or forgotten password. Get to the same option by clicking Forgot Your Password from the login window. Device Operations - From this tab you can: Enable logging and Collect Logs for your system administrator - If you select Collect Logs, the Log Collector opens. Enter the Device Password, which is the same password you use to log in to Check Point GO. Install or Uninstall the Automatic Launcher - The automatic launcher installs on your host computer and automatically launches Check Point GO when it is inserted into that host. Automatically upgrade the automatic launcher - Upgrades to the automatic launcher will automatically be installed on the host computer. Device information Displays software and firmware versions as well as the Device serial number, specific to your Check Point GO device. General - From this tab you can: Restore compatibility warnings - If you selected at any point that Check Point GO not display compatibility warnings, this setting displays them again. Set the Language - Sets the language for the Check Point GO interface and Online Help. Make sure that your host computer supports the selected language. You can also select a language from the First Time Wizard. View the Check Point GO Video Tutorial from YouTube. Disk Cleanup Right-clicking the Check Point GO icon in the system tray of the host PC opens a menu showing the disk cleanup feature. Disk Cleanup removes Check Point GO working files, such as temporary logs. Working with the Virtual Desktop On the Check Point GO virtual desktop, only a limited number of pre-approved applications are allowed to run. By default, the virtual desktop does not allow you to: Print Customize the desktop Perform any system configuration If you need this kind of functionality, or another program added to the list of approved applications, contact your system administrator. The Check Point GO Desktop Icons This table explains the icons on the Check Point GO Desktop Toolbar and system tray and the function of each icon. Icon Name Function Check Point GO icon Click to switch between Check Point GO and the host desktop. Right-click for a variety of options. Check Point GO Secure Portable Workspace Page 9

10 Working with the Virtual Desktop Icon Name Function Check Point GO folder icon To keep files on the device place them in this folder. Portable apps Click to manage portable apps. VPN icon Right-click to connect to the VPN or see the VPN settings. If it has a red x, the VPN is not connected. When the globe is colored, the VPN is connected. Close Check Point GO icon Close Check Point GO. A confirmation window opens before Check Point GO closes. Minimize icon Minimize the Check Point GO desktop to see the host PC. Restart icon Restart Check Point GO. When an update is ready to be installed, restarting also installs the update. Trusted or Untrusted Host icon Put the mouse on this to check whether your host PC is trusted. A trusted host is a PC that was is or once was located inside the company's internal network. Even if the PC is no longer within the corporate network, it is still regarded as trusted. An untrusted PC is one that was never within the internal network. USB Disk Capacity Indicator Export icon Put the mouse on this to check how much space is available on the Check Point GO disk, move your mouse close to the Disk Capacity indicator on the Check Point GO Control strip Export files to the host computer. Import icon Import files from the host computer to Check Point GO. Hide Toolbar icon Hides the toolbar. Put the mouse over the toolbar area to see it again. Start Menu and Taskbar The virtual desktop start menu and taskbar function in the same manner as the start menu and taskbar on the host PC: providing shortcuts to allowed applications. Approved applications appear on the Start > Secured Programs menu. Applications in Check Point GO, such as Internet Explorer and Word, function in the same manner as on the host desktop. Check Point GO Secure Portable Workspace Page 10

11 Working with the Virtual Desktop FTP Shared Folder If you see this shared folder shortcut on the desktop, then your system administrator has configured an FTP link to a shared folder inside the corporate network. Clicking the shortcut opens Windows Explorer. Windows explorer shows the contents of the shared folder. Switching Between Check Point GO and the Host PC To switch between Check Point GO and the host PC, either: Click the Check Point GO icon in the taskbar notification area. Click the Minimize button on the Check Point GO toolbar. Use the keyboard shortcut: Windows Key + S. Note - Due to the persistence of other applications on the Host PC, the Windows key + S shortcut may not always be available. Switching Between the Host PC and Check Point GO To switch between the host PC and Check Point GO, either: Right-click the Check Point GO icon in the system tray of the host PC and select Switch to Check Point GO Desktop. Use the keyboard shortcut: Windows Key + S. Note - The Windows key + S shortcut may not work in all instances due to the persistence of other applications on the host PC. Exporting Files to the Host Even though it may appear that files can be saved directly to the host PC, this is not the case. Files cannot be saved directly to the host PC. Important - Files can be saved to the host PC only by exporting them using the Check Point GO Export button. Understanding the Check Point GO Virtualized File System When loaded, Check Point GO creates a virtualized copy of the host PC s file system. This has a number of implications. If you open Windows Explorer within Check Point GO and enter the letter of a drive on the host PC, the drive is displayed. You are not, however, seeing the drive s actual file system. You are seeing the Check Point GO virtualized copy of it. To actually transfer files to and from the host PC, you must use the Check Point GO import and export features. If you edit a file in Windows Explorer and save it directly to the host, the file is saved as a virtualized copy on Check Point GO and not to the file system on the host. For example if you go to the C Drive of your host computer while in Check Point GO and edit the contents of a text document and save it, changes are not saved. You must save the file to Check Point GO and then export it to the host PC by clicking the Export icon on the Check Point GO control bar. Clicking the Export Button 1. Click the Export button on the Check Point GO control bar The Copy Files to PC window opens. Check Point GO Secure Portable Workspace Page 11

12 Closing Secure Portable Workspace 2. Select the file to be exported, and click Copy to PC. 3. Switch to the host PC. The exported file is in the Downloaded from Check Point GO folder on the desktop. Importing Files from the Host PC Files are imported from the host PC using the Import button available on the Check Point GO Control bar. You have read-only (access) privileges to all folders and files on the host PC, including those files and folders available through mapped drives. However, if you attempt to run a program or open a file for which you do not have permission, an error message appears. To import a file to Check Point GO: 1. Inside Check Point GO, click the Import icon on the Control bar The Copy Files to Check Point GO window opens. 2. Browse to the file on the host PC that you wish to import. 3. Select the required file and click Copy to Check Point GO. The file is imported and placed in the Downloaded from PC folder on the Check Point GO virtual desktop. Closing Secure Portable Workspace Check Point GO can be closed in a number of ways: From the Start Menu inside Check Point GO - From the Check Point GO Start menu, select Close Check Point GO. A confirmation and reminder to save open files appears. From the Check Point GO Control bar - Click the X button on the Check Point GO Control bar. From the System Tray on the host PC - Right-click the Check Point GO icon in the system tray and select Close Check Point GO. Note - Flash USB drives contain a FAT system that does not respond well to sudden power downs, as occurs when the device is ejected during the middle of an inputoutput operation. To prevent data loss, corruption of the FAT file system, or frozen processes on the HostPC, always shut Check Point GO down correctly. Wait until you are told that it is safe to remove the device. If FAT corruption leads to total data loss, reformat the device to factory defaults. Check Point GO Secure Portable Workspace Page 12

13 Chapter 2 Portable Apps Portable apps are virtualized versions of Windows programs that run in the Check Point GO Secure Workspace desktop environment. Portable apps are stored in the cloud. The Secure Workspace policy set by your system administrator determines which apps are : Required - Required apps are already installed on the device and cannot be uninstalled. Optional - You can install and uninstall these apps as necessary. Important - Similar to many mobile devices, Portable Apps are the only way to install new applications to Check Point GO. Do not install any application, utility, or upgrade that is not delivered as a portable app. You cannot install on Check Point GO. This is a virtual installation. The Secure Workspace changes its virtual file system structure and virtual registry structure, to appear to have the new application. But the installation is done in a different way. Your administrator can give you shortcuts to use applications from the host computer through the Secure Workspace. These are not portable apps. The portable app is on the Check Point GO stick, completely isolated from the host. If you have a choice of a host-application or a portable app, it is usually best to choose the portable app. It is more secure. If you save a file from a portable app, you cannot save it on the host computer. If you are able to Save As to a hard drive, it is not actually on the host computer. The path is a virtual path on Check Point GO. For example: in the Secure Workspace, you save a Microsoft Word document to C:\Users\Default\Documents. On the host computer, the document will not be in that path. It is not on the host computer at all. On Check Point GO, the file is saved with a virtual path: "C:\Users\Default\Documents\Mynewdoc.doc". The virtual path is not kept between sessions. Paths that do not start with a drive letter of Check Point GO are deleted when Check Point GO exits. Check Point GO can have a different drive letter on different computers, but it is best to save all files in the Check Point GO Documents or Desktop folders. These are guaranteed to be on the Secure Workspace. To install a portable app: 1. On the Check Point GO desktop, double click the Manage Portable Apps icon. The Check Point GO Portable Apps window opens. This window shows which portable apps are available from the cloud for download, and divides the apps into suitable categories. 2. Click install on the required portable app to download and install it. During the time it takes to download and install the portable app, the operation can be canceled. An app already installed can be uninstalled by clicking uninstall. After installation, an icon for the portable app shows on the desktop. Icons with a downward pointing arrow indicate portable applications downloaded from the cloud. This is an example of a Portable App icon on the Secure Workspace. Page 13

14 Chapter 3 Using the Remote VPN Client In This Chapter Overview 14 Creating a Site Using the Site Wizard 14 Connecting to the Site 15 Hotspot Detection and Exclusion 15 Staying Connected to the Site 15 Selecting an Authentication Scheme 15 Changing Authentication Schemes 19 Overview Check Point GO contains a remote VPN client for securely accessing resources on the corporate enterprise. This same secure VPN connectivity is also used to: Update the device's software Download a security policy Creating a Site Using the Site Wizard If Check Point GO is located within the internal network the first time you try to connect to a site, the device may automatically detect any site previously configured by your system administrator. Note - Automatic detection is available only if your system administrator configured this behavior. If Check Point GO is not located within the internal network, the site wizard opens. The site wizard lets you manually configure the site. To create a VPN site using the Wizard: 1. Click Next and enter a server address or name, and an easy to remember display name (optional). If you do not know this information, contact your system administrator. 2. Click Next, and compare the fingerprint from your system administrator with the one displayed on screen. If the fingerprints match, click OK. The Authentication Method window opens. Note - This window does not appear if your administrator preset an authentication method, such as user password. 3. Select a method of authentication ("Selecting an Authentication Scheme" on page 15). This is provided by your system administrator. 4. Enter your authentication credentials. For example, if you authenticate using a certificate, browse to the certificate supplied by your system administrator. 5. Click Next to finish creating the site. A message shows that the site is created. Page 14

15 Connecting to the Site 6. Click Finish. Multiple Sites For security reasons, multiple sites are not supported. This is to prevent sensitive information on one site being accidentally transferred to another. To connect to a different site, you must reformat the device ("Advanced Operations" on page 8) and run the Site wizard again. Remember that reformatting the device erases all stored data. Connecting to the Site To connect to the site: 1. Right-click the VPN Client icon in the Check Point GO system tray to display the client's menu. If you manually configured a site, you must select an authentication scheme. 2. Click Connect. Check Point GO has a built-in Single Sign-On feature. When you authenticate using a user name and password or a certificate, you must enter your login credentials only during your first login. The client stores and automatically reuses these credentials the next time a connection is opened to the corporate site. If you authenticate using any other method, for example, SecurID, enter your credentials for every session when prompted. Wait while Check Point GO connects and downloads the Check Point GO policy configured by your system administrator. While the VPN client is connected to the site, the icon in the system tray remains green. Hotspot Detection and Exclusion Note - The Hotspot Detection feature is available only if your administrator has activated it. Many public wireless networks ("wireless hotspots") have a Web portal for greeting guests and obtaining some form of authentication or payment. Such portals block the VPN component of the device from automatically connecting to the designated site. Hotspots of this kind are automatically detected by the device. When connecting for the first time through the Hotspot server: 1. The connection naturally fails because no registration details have been presented. 2. The client automatically opens its internal browser window showing the hotspot registration form. 3. Enter the relevant authentication and payment credentials. The client automatically detects when the form is submitted and immediately connects to the site. Staying Connected to the Site To ensure that you remain connected to the active site: 1. Right-click the client icon in the system tray and select Properties. The Site Properties window opens. 2. On the Settings tab, In the Always-Connect area of the window, select Enable Always-Connect. Selecting an Authentication Scheme This section covers various ways to authenticate to the designated site. If you configure your site manually, then you must select one of the following authentication methods: User Name and Password Certificates Using the Remote VPN Client Page 15

16 Selecting an Authentication Scheme SecurID Challenge Response Smart Card Certificates Your system administrator might request that you use a certificate file for authentication. Understanding Certificates A certificate is the digital equivalent of an ID card issued by a trusted third party known as a Certification Authority (CA). While there are well known external CAs such as VeriSign and Entrust, Check Point GO typically uses the digital certificates issued by the site's security gateway, which has its own Internal Certificate Authority (ICA). The digital certificate used by Check Point GO contains: Your name A serial number Expiration dates A copy of the certificate holder's public key (used for encrypting messages and digital signatures) The digital signature of the certificate-issuing authority, in this instance the ICA, so that the security gateway can verify that the certificate is real and (if real) still valid. A certificate is a file in the PKCS#12 format with the.p12 extension. Authenticating with an Existing Certificate When Certificates are the selected authentication method, by default Check Point GO attempts to import the.p12 file. When you get the message: Please import your p12 certificate in order to communicate with your Check Point GO server. 1. Click Import to browse to your certificate. 2. Enter the certificate's password in the Password field. 3. Click Connect. Obtaining a Certificate You can get certificates from your system administrator, or through the enrollment and renewal process. You can also enroll for a certificate by clicking the link "Click here if you don't have a certificate for this site" that appears on the Connect dialog box. Enrolling a Certificate Enrollment refers to the process of applying for and receiving a certificate from a recognized Certificate Authority (CA), in this case Check Point's Internal CA. In the enrollment process, your system administrator creates a certificate and sends you the certificate's registration key. The client sends this key to site's gateway and in return receives a certificate, which is saved directly on the Check Point GO device. To enroll a certificate: 1. Right-click the VPN client icon in the Check Point GO system tray. 2. Select Site Properties. 3. On the Settings tab click Enroll. The registration window opens. 4. Enter: a) A password for your new certificate. b) The registration key supplied by your system administrator Using the Remote VPN Client Page 16

17 Selecting an Authentication Scheme 5. Click Connect, and wait while the certificate is enrolled. The certificate is stored directly on the Check Point GO device. Re-Importing a Certificate If you need to re-import a certificate: 1. Right-click the VPN client icon in the Check Point GO system tray. 2. Select Site Properties. 3. On the Settings tab click Reset. This action removes previously stored authentication data. 4. Right-click the VPN client icon in the Check Point GO system tray. From the menu, select Connect: The certificate import window opens: 5. Click Import. The Open Certificate File window opens: 6. Select a certificate, and click Open. 7. Once you have returned to the import window, enter the certificate's password and click Connect. Renewing a Certificate When using certificates for authentication, each time you connect to the site, the client checks to see how close the certificate is to its expiration date. If necessary, and simultaneously with the connect process, the certificate is renewed. A message balloon appears in the system tray: Certificate renewal in progress. To manually renew a certificate: 1. Right-click the VPN client icon in the Check Point GO system tray. 2. Select Site Properties. 3. On the Settings tab click Renew. Smart Card The certificate is automatically renewed and saved to the Check Point GO device. Before using a Smart Card to authenticate to the VPN site, make sure that the Smart Card reader: Is attached to the Host PC. Can identify your certificate. After inserting the card, the reader's graphical interface should show your certificate. To Authenticate using a Smart Card: 1. Insert Check Point GO. 2. Open the Check Point GO VPN client. 3. If Smart Card is already defined as the authentication method, select the certificate from the drop-down box and click Connect. The client connects to the site. Important Notes: Each time you remove/insert the Smart Card, the Smart Card client prompts for the Smart Card password before the VPN connects. While the Smart Card remains inside the reader, you can connect and disconnect from the site without giving the Smart Card password. If the Smart Card reader or Smart Card is removed from the USB port on the hostpc, during the next reauthentication the client detects that the certificate is no longer available and disconnects from the site. When Smart Card is the chosen authentication method, the Check Point GO VPN client does not show options for certificate enrollment or renewal. Using the Remote VPN Client Page 17

18 User Name and Password Selecting an Authentication Scheme User name and password is the simplest form of authentication. Decide on an appropriate user name and password. User name and Password Reset The option exists to remove the last user name and password entered, effectively erasing data in the Single Sign-On (SSO) cache. The Single Sign On cache is where the Check Point GO device stores VPN authentication credentials so that you only have to enter them once, the first time you establish a connection with the corporate site. If you wish to remove them, on the Site Properties > Settings tab, click Reset. SecurID The RSA SecurID authentication mechanism consists of either hardware (USB memory key fob or USB slim card token) or software (SoftID) that generates an authentication code at fixed intervals (usually one minute) using a built-in clock and an encoded random key. The Check Point GO site wizard supports both methods as well as SoftID. Check Point GO uses both the PIN and tokencode or just the passcode to authenticate to the security gateway. SecurID Authentication Devices SoftID Several versions of SecurID devices are available. The older format is a small device that displays a numeric code (tokencode) and time bars. The token code changes every sixty seconds, and provides the basis for authentication. To authenticate, the user must add to the beginning of the tokencode a special PIN (Personal Identification Number). The time bar indicates how much time is left before the next tokencode is generated. The remote user is requested to enter both the PIN number and tokencode into the Client's main connection window. The newer format resembles a credit card, and displays the tokencode, time bars and a numeric pad for typing in the PIN number. These types of device mix the tokencode with the entered PIN number to create a passcode. The VPN Client requests only the passcode. Key Fobs A small hardware device with built-in authentication mechanisms that control access to network services and information is known as a key fob. While a password can be stolen without the owner's knowledge, a missing key fob is immediately apparent. Key fobs provide the same two-factor authentication as other SecurID devices: the user has a personal identification number (PIN), which authenticates them as the device's owner; after the user correctly enters their PIN, the device displays a number which allows them to log on to the network. The SecurID SID700 Key Fob is a typical example of such a device. When the Check Point GO window opens for a user that has identified SecurID as the preferred method of authentication, a field for the PIN is displayed. SoftID operates the similarly to a passcode device but consists only of software installed on the host computer. The Advanced view displays the tokencode and passcode with Copy buttons, allowing the user to cut and paste between softid and the client. Challenge Response Challenge-response is an authentication protocol in which one party presents a question (the challenge) and another party provides an answer (the response). For authentication to take place, a valid answer must be provided to the question. Security systems that rely on smart cards are based on challenge-response. Using the Remote VPN Client Page 18

19 Changing Authentication Schemes Changing Authentication Schemes To change the authentication scheme used by the VPN client for the designated site: 1. Right-click the client's icon in the system tray, and select Site Properties. The Site Properties window opens 2. On the Settings tab, use the drop-down Authentication box to select one of the following: Username and password (default) Certificate - P12 SecurID - Keyfob SecurID - PinPad SoftID Challenge Response Smart Card Using the Remote VPN Client Page 19

20 Chapter 4 Troubleshooting In This Chapter Logging Into Windows 20 Collecting Logs 20 Logging Into Windows Check Point GO does not support the Guest account on the host PC. If you experience unexpected behavior when logging into Windows, make sure that the active user account on the host PC is not the Guest account. Collecting Logs To troubleshoot issues with the Check Point GO, your system administrator may ask you to collect log files from the device. You can collect logs when the device is open, closed, or fails to respond. Open means that the Check Point GO device is loaded and you are logged in to the Secure Workspace. Closed or locked means that Check Point GO is running, but you have not yet logged in to the Secure Workspace. Frozen means that the device fails to launch or ceases to respond. Collecting Logs From an Open Device Logs are created using the Log Collector. The Log Collector can be run either from within the Check Point GO device or outside of it. To run Log Collector from within Check Point GO: 1. In the Check Point GO system tray, right-click the Check Point GO icon. 2. Select Collect Logs. 3. A pop-up message directs you to the host desktop where the Log Collector runs. To run Log Collector from outside of Check Point GO: 1. In the system tray of the Host PC, right-click the Check Point GO icon. 2. Select Collect Logs. The Log collector opens. 3. Select the type of logs to collect: Normal or Extended. If you are not sure, ask your system administrator. 4. Write a short description of the problem in the text box. 5. Click Collect Logs. The Logs collected successfully window open and the Logs are saved to your device. 6. Click one of the options in the window as instructed by your administrator: Send- Send the logs to Check Point with FTP. Save- Save the log file to a different location. Close- Close the window and the logs stay on the Check Point GO device. Page 20

21 Collecting Logs To collect logs from a closed device: 1. Click the Advanced button in the device login window. 2. Select the Device Operations tab. 3. Select Enable logging, and click Collect Logs. 4. Follow the instructions in the procedure above, To run Log Collector from outside of Check Point GO, starting with step 3. You will be prompted to enter the device password in the Log Collector dialog box. Note - To use the Log Collector when the device is closed, you are required to enter your password. If you do not enter the correct password, you can collect only a minimal set of logs via the Collect only login logs link. After the logs are collected and compressed into a.cab file, the directory where the.cab file is saved opens automatically. Alternate method for collecting logs from a closed device: You can also collect logs from a closed device by opening the Utils directory on the CD (Check Point GO drive) and clicking CollectTool.exe. To collect logs from a frozen device: If the Check Point GO device fails to launch or ceases to respond, logs can still be collected: 1. On the host PC, open My Computer to display the drives. 2. Open the CD (Check Point GO drive). 3. Open the Utils directory. 4. Click CollectTool.exe to initiate log collection. Troubleshooting Page 21

SecuRemote for Windows 32-bit/64-bit

SecuRemote for Windows 32-bit/64-bit SecuRemote for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

Endpoint Security Client

Endpoint Security Client Endpoint Security Client R80 User Guide 28 February 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Version 8.0 Rev A User s Guide Copyright 2010 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

Check Point GO R75. Release Notes. 21 December Classification: [Public]

Check Point GO R75. Release Notes. 21 December Classification: [Public] Check Point GO R75 Release Notes 21 December 2011 Classification: [Public] 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

How to Connect with SSL Network Extender using a Certificate

How to Connect with SSL Network Extender using a Certificate How to Connect with SSL Network Extender using a Certificate 29 August 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

How To Import New Client MSI Files and Upgrade Profiles

How To Import New Client MSI Files and Upgrade Profiles How To Import New Client MSI Files and Upgrade Profiles 29 April 2012 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

Guide Installation and User Guide - Mac

Guide Installation and User Guide - Mac Guide Installation and User Guide - Mac With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign

More information

How To Configure OCSP

How To Configure OCSP How To Configure OCSP 6 February 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing

More information

Endpoint Security webrh

Endpoint Security webrh Endpoint Security webrh 3.0 HFA 3 Release Notes 17 January 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

Endpoint Security webrh

Endpoint Security webrh Endpoint Security webrh Framework 3.0 HFA1 Administration Guide 2 January 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

Check Point Mobile VPN for ios

Check Point Mobile VPN for ios Check Point Mobile VPN for ios Administration Guide 10 July 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are

More information

SmartWorkflow R Administration Guide. 29 May Classification: [Restricted]

SmartWorkflow R Administration Guide. 29 May Classification: [Restricted] SmartWorkflow R75.40 Administration Guide 29 May 2012 Classification: [Restricted] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

VMware Horizon Client for Windows 10 UWP User Guide. Modified on 21 SEP 2017 VMware Horizon Client for Windows 10 UWP 4.6

VMware Horizon Client for Windows 10 UWP User Guide. Modified on 21 SEP 2017 VMware Horizon Client for Windows 10 UWP 4.6 VMware Horizon Client for Windows 10 UWP User Guide Modified on 21 SEP 2017 VMware Horizon Client for Windows 10 UWP 4.6 You can find the most up-to-date technical documentation on the VMware website at:

More information

Remote Access Resources

Remote Access Resources Remote Access Resources Windows 7 Windows 10 Firm Laptop Windows Windows Mac Computer Apple ipad Mac Computer Android Devices Apple ipad Remote Access Remote Access for Personal Computer (Windows) Quick

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

Endpoint Security Client

Endpoint Security Client Endpoint Security Client R72 User Guide 3 November, 2009 More Information To view the latest version of this document, see the User Center (http://supportcontent.checkpoint.com/documentation_download?id=10171).

More information

Endpoint Security Client. User Guide Version R71

Endpoint Security Client. User Guide Version R71 Endpoint Security Client User Guide Version R71 December 24, 2008 2003-2009 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

MyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide

MyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide MyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide i VISION RECORDS REVISION DATE DESCRIPTION 0 27 September 2017 Initial Submittal. 1 Second Submittal. ii TABLE OF CONTENTS

More information

RSA SecurID Software Token 2.0 For Palm Handhelds User s Guide

RSA SecurID Software Token 2.0 For Palm Handhelds User s Guide RSA SecurID Software Token 2.0 For Palm Handhelds User s Guide This guide explains how to install and use your RSA SecurID Software Token 2.0 for Palm Handhelds application. This guide assumes that you

More information

Guide Installation and User Guide - Windows

Guide Installation and User Guide - Windows Guide Installation and User Guide - Windows With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally

More information

Software Token. Installation and User Guide. 22 September 2017

Software Token. Installation and User Guide. 22 September 2017 Software Token Installation and User Guide 22 September 2017 Notices Following are policies pertaining to proprietary rights and trademarks. Proprietary Rights The information contained in this document

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

Endpoint Security. E80.30 Localized Version. Release Notes

Endpoint Security. E80.30 Localized Version. Release Notes Endpoint Security E80.30 Localized Version Release Notes 30 September 2013 2013 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

Sync User Guide. Powered by Axient Anchor

Sync User Guide. Powered by Axient Anchor Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7

More information

MyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide

MyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide MyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide REVISION RECORDS REVISION DATE DESCRIPTION 0 27 September 2017 Initial Submittal. 1 06 October 2017 Second Submittal. - 17 October

More information

Remote Access Clients for Windows 32-bit/64-bit

Remote Access Clients for Windows 32-bit/64-bit Remote Access Clients for Windows 32-bit/64-bit R75 HFA1 EA Administration Guide 27 January 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

VMware Horizon Client for Windows 10 UWP User Guide. 06 SEP 2018 VMware Horizon Client for Windows 10 UWP 4.9

VMware Horizon Client for Windows 10 UWP User Guide. 06 SEP 2018 VMware Horizon Client for Windows 10 UWP 4.9 VMware Horizon Client for Windows 10 UWP User Guide 06 SEP 2018 VMware Horizon Client for Windows 10 UWP 4.9 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

VMware Horizon Client for Chrome OS User Guide. 04 JAN 2018 VMware Horizon Client for Chrome OS 4.7

VMware Horizon Client for Chrome OS User Guide. 04 JAN 2018 VMware Horizon Client for Chrome OS 4.7 VMware Horizon Client for Chrome OS User Guide 04 JAN 2018 VMware Horizon Client for Chrome OS 4.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Sabre Customer Virtual Private Network Launcher (SCVPNLauncher)

Sabre Customer Virtual Private Network Launcher (SCVPNLauncher) Sabre Customer Virtual Private Network Launcher (SCVPNLauncher) User s Guide Sabre Travel Network This document provides detailed information for the install/uninstall, operation, configuration and troubleshooting

More information

Schneider Electric License Manager

Schneider Electric License Manager Schneider Electric License Manager EIO0000001070 11/2012 Schneider Electric License Manager User Manual 12/2012 EIO0000001070.01 www.schneider-electric.com The information provided in this documentation

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

EasiShare ios User Guide

EasiShare ios User Guide Copyright 06 Inspire-Tech Pte Ltd. All Rights Reserved. Page of 44 Copyright 06 by Inspire-Tech Pte Ltd. All rights reserved. All trademarks or registered trademarks mentioned in this document are properties

More information

VPN Installation Quick Setup Guide

VPN Installation Quick Setup Guide VPN Installation Quick Setup Guide For PCs running This document will help guide you through the process of installing the NJ TRANSIT VPN software on your Microsoft Windows 7 personal computer. If at any

More information

Authentication Manager Self Service Password Request Administrator s Guide

Authentication Manager Self Service Password Request Administrator s Guide Authentication Manager Self Service Password Request 9.0.2 Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017 BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...

More information

Unified Communicator Advanced

Unified Communicator Advanced MITEL Unified Communicator Advanced UC Advanced Mobile for BlackBerry User Guide NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel

More information

BitLocker to Go: Encryption for personal USB

BitLocker to Go: Encryption for personal USB BitLocker to Go: Encryption for personal USB [Windows 10] Encryption is an effective method of protecting data stored on portable USB devices such as flash drives and external hard drives. Encryption encodes

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.9.0 1996-2007 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

Patient Portal: Policies and Procedures & User Reference Guide Patient Portal Version 5.8.1

Patient Portal: Policies and Procedures & User Reference Guide Patient Portal Version 5.8.1 Patient Portal: Policies and Procedures & User Reference Guide Patient Portal Version 5.8.1 1 Welcome to the Patient Portal We would like to welcome you to the Patient Portal. The Patient Portal is a secure

More information

Security Gateway Virtual Edition

Security Gateway Virtual Edition Security Gateway Virtual Edition R75.20 Administration Guide 4 March 2012 Classification: [Restricted] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

ModeChanger

ModeChanger 35020808-02 2015.11 ModeChanger ModeChanger is a software utility that can switch the drive between normal mode and encrypted mode. Operating in encrypted mode will help protect your data. While the drive

More information

Database Migration Guide

Database Migration Guide Database Migration Guide Learn how to migrate a WhatsUp Gold database from Microsoft SQL Server 2005 Express Edition to Microsoft SQL Server 2005 or 2008 Enterprise, Standard, or Workgroup Editions. Contents

More information

Fiery proserver User Guide

Fiery proserver User Guide Fiery proserver User Guide Congratulations on your purchase of the EFI Fiery proserver, a powerful production solution for your printer. Before you begin Make sure that you have: About this document Installed

More information

Anchor User Guide. Presented by: Last Revised: August 07, 2017

Anchor User Guide. Presented by: Last Revised: August 07, 2017 Anchor User Guide Presented by: Last Revised: August 07, 2017 TABLE OF CONTENTS GETTING STARTED... 1 How to Log In to the Web Portal... 1 How to Manage Account Settings... 2 How to Configure Two-Step Authentication...

More information

Consumer Banking User Guide. Getting Started

Consumer Banking User Guide. Getting Started Consumer Banking User Guide Getting Started Contents About the platform... 3 Installing the mobile banking app... 4 Opening mobile banking... 4 Accessing the online banking site... 4 Browser requirements...

More information

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE IRONKEY D300S SECURE USB 3.0 FLASH DRIVE User Guide Document No. 48000130-001.A01 D300S Page 1 of 27 Table of Contents About This Manual... 3 System Requirements...3 Recommendations...3 Setup (Windows

More information

Secure Single Sign On with FingerTec OFIS

Secure Single Sign On with FingerTec OFIS Secure Single Sign On with FingerTec OFIS User Guide CONTENTS 3 1 INTRODUCTION Welcome to OFIS Gateway 4-11 2 INSTALLATION & SETUP Registering Your OFIS Gateway Installing & Setting Up Your OFIS Gateway

More information

Remote Access Clients for Windows 32/64-bit

Remote Access Clients for Windows 32/64-bit Remote Access Clients for Windows 32/64-bit E80.41 Release Notes 16 January 2013 Classification: [Protected] 2013 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

SecureTransport Version May Web Client User Guide

SecureTransport Version May Web Client User Guide SecureTransport Version 5.3.6 9 May 2018 Web Client User Guide Copyright 2018 Axway All rights reserved. This documentation describes the following Axway software: Axway SecureTransport 5.3.6 No part of

More information

ipassconnect 3.1 for Mac OS X

ipassconnect 3.1 for Mac OS X ipassconnect 3.1 for Mac OS X Users Guide V e r s i o n 1.3, 1 5 S e p t e m b e r 2 0 0 9 Corporate Headquarters ipass Inc. 3800 Bridge Parkway Redwood Shores, CA 94065 USA www.ipass.com +1 650-232-4100

More information

Document Signing Certificate Getting Started Guide

Document Signing Certificate Getting Started Guide Certificate Services Document Signing Certificate Getting Started Guide Using the SafeNet Authentication Client: 8.3 Document issue: 1.0 Date of issue: March 2017 For software release 12.1 Document Signing

More information

Pass4sure CASECURID01.70 Questions

Pass4sure CASECURID01.70 Questions Pass4sure.050-80-CASECURID01.70 Questions Number: 050-80-CASECURID01 Passing Score: 800 Time Limit: 120 min File Version: 4.8 http://www.gratisexam.com/ 050-80-CASECURID01 RSA SecurID Certified Administrator

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

NotifyMDM Device Application User Guide Installation and Configuration for Android

NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions

More information

KYOCERA Net Viewer User Guide Supplement

KYOCERA Net Viewer User Guide Supplement KYOCERA Net Viewer User Guide Supplement Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be

More information

RSA Authentication Manager Adapter User Guide

RSA Authentication Manager Adapter User Guide IBM Security Identity Manager Version 6.0 RSA Authentication Manager Adapter User Guide SC27-4409-04 IBM Security Identity Manager Version 6.0 RSA Authentication Manager Adapter User Guide SC27-4409-04

More information

NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0

NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0 NetIQ Advanced Authentication Framework - Client User's Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 4 About This Document 4 NetIQ Advanced Authentication Framework Overview

More information

Security Cooperation Information Portal

Security Cooperation Information Portal June 2017 https://www.scportal.us/ Contents Website... 3 Home... 3 Registration Info... 3 User Agreement... 4 SCIP Logon... 4 Digital Certificate with Name CAC or PKI users... 4 Token Users... 5 Warning

More information

Intellisync Mobile Suite Client Guide. S60 3rd Edition Platform

Intellisync Mobile Suite Client Guide. S60 3rd Edition Platform Intellisync Mobile Suite Client Guide S60 3rd Edition Platform Published July 2007 COPYRIGHT 2007 Nokia. All rights reserved. Rights reserved under the copyright laws of the United States. RESTRICTED RIGHTS

More information

RSA Authentication Manager 7.1 Help Desk Administrator s Guide

RSA Authentication Manager 7.1 Help Desk Administrator s Guide RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

GoToMyPC Corporate Administrator Guide

GoToMyPC Corporate Administrator Guide GoToMyPC Corporate Administrator Guide Contents Getting Started... 6 Administration Center Overview... 6 Log in to the Administration Center... 6 Notes on Installation and Feature Access... 8 Mac Features...

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Multi-Sponsor Environment. SAS Clinical Trial Data Transparency User Guide

Multi-Sponsor Environment. SAS Clinical Trial Data Transparency User Guide Multi-Sponsor Environment SAS Clinical Trial Data Transparency User Guide Version 6.0 01 December 2017 Contents Contents 1 Overview...1 2 Setting up Your Account...3 2.1 Completing the Initial Email and

More information

VMware Horizon FLEX Client User Guide

VMware Horizon FLEX Client User Guide Horizon FLEX 1.10 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Secure Parliamentary Remote Access (SPRA) service

Secure Parliamentary Remote Access (SPRA) service Secure Parliamentary Remote Access (SPRA) service The Secure Parliamentary Remote Access (SPRA) service provides remote access to Microsoft Office applications, the Parliamentary Intranet and files stored

More information

KYOCERA Net Viewer User Guide

KYOCERA Net Viewer User Guide KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

VMware Horizon FLEX Client User Guide. 26 SEP 2017 Horizon FLEX 1.12

VMware Horizon FLEX Client User Guide. 26 SEP 2017 Horizon FLEX 1.12 26 SEP 2017 Horizon FLEX 1.12 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware Web site also provides the latest product updates.

More information

Zen Internet. Online Data Backup. Zen Vault Express for Mac. Issue:

Zen Internet. Online Data Backup. Zen Vault Express for Mac. Issue: Zen Internet Online Data Backup Zen Vault Express for Mac Issue: 2.0.08 Tel: 01706 90200 Fax: 01706 902005 E-mail: info@zen.co.uk Web: www.zen.co.uk Zen Internet 2015 Contents 1 Introduction... 3 1.1 System

More information

Using VMware View Client for Mac

Using VMware View Client for Mac May 2012 View Client for Mac This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Software Token Enrollment: SafeNet MobilePASS+ for Apple ios

Software Token Enrollment: SafeNet MobilePASS+ for Apple ios Software Token Enrollment: SafeNet MobilePASS+ for Apple ios Step 1: Open the Self-Enrollment email a. Open the Self-Enrollment email on your Apple ios phone. NOTE: If using a personal phone, open the

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

GigaCentral ios User Guide V2.0. For User and Storage Admin

GigaCentral ios User Guide V2.0. For User and Storage Admin V2.0 For User and Storage Admin Copyright 2018 by Inspire-Tech Pte Ltd. All rights reserved. All trademarks or registered trademarks mentioned in this document are properties of their respective owners.

More information

Cisco NAC Appliance Agents

Cisco NAC Appliance Agents 10 CHAPTER This chapter presents overviews, login flow, and session termination dialogs for the following Cisco NAC Appliance access portals: Cisco NAC Agent, page 10-1 Cisco NAC Web Agent, page 10-28

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Installing and Configuring hopto Work. System Requirements Be sure you have these system requirements to install and use hopto Work.

Installing and Configuring hopto Work. System Requirements Be sure you have these system requirements to install and use hopto Work. Installing and Configuring hopto Work To configure and install hopto Work on your Microsoft Windows server, you ll need to have Administrator status. Note: The recommended setup is that Active Directory

More information

SecureTraveler User s Manual

SecureTraveler User s Manual SecureTraveler User s Manual SecureTraveler is the DataTraveler II + Migo configuration utility program that allows corporate and home users to set up public and password-protected privacy zones on the

More information

SECUDRIVE USB Office

SECUDRIVE USB Office SECUDRIVE USB Office User Guide Doc Ver. 3.0.1.383 2013-02-10 Brainzsquare, Inc. Table of Contents 1. Overview... 3 1.1 Features... 3 1.2 Product... 4 1.3 Glossary... 4 2. How to use SECUDRIVE USB Office...

More information

Guide Installation and User Guide - Linux

Guide Installation and User Guide - Linux Guide Installation and User Guide - Linux With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign

More information

Schneider Electric Floating License Manager

Schneider Electric Floating License Manager Schneider Electric Floating License Manager EIO0000001078 11/2012 Schneider Electric Floating License Manager User Manual 12/2012 EIO0000001078.01 www.schneider-electric.com The information provided in

More information

Check Point Document Security

Check Point Document Security Check Point Document Security 7.4 Release Notes 30 December 2010 2010 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed

More information

CITRIX REMOTE PC SKADDEN REMOTE ACCESS PAGE CONNECT TO SKADDEN SYSTEMS REMOTELY LOG ON TO REMOTE DESKTOP DOWNLOAD & INSTALL CITRIX

CITRIX REMOTE PC SKADDEN REMOTE ACCESS PAGE CONNECT TO SKADDEN SYSTEMS REMOTELY LOG ON TO REMOTE DESKTOP DOWNLOAD & INSTALL CITRIX CITRIX REMOTE PC SKADDEN REMOTE ACCESS PAGE Skadden Remote URL: http://skadlink.skadden.com Citrix Remote Desktop: Allows access to the Skadden network as if you were in the office. Outlook WebMail: Allows

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

AT&T Global Network Client for Android

AT&T Global Network Client for Android Version 4.1.0 AT&T Global Network Client for Android 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management Account Management Administrator User Guide July 2016 1 Copyright 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T

More information

Oracle Enterprise Single Sign-on Authentication Manager

Oracle Enterprise Single Sign-on Authentication Manager Oracle Enterprise Single Sign-on Authentication Manager Installation and Setup Guide Release 10.1.4.0.4 E10559-01 November 2007 , Release 10.1.4.0.4 E10559-01 Copyright 2006-2007, Oracle. All rights reserved.

More information

VMware Horizon Client for Windows 10 UWP Installation and Setup Guide. Modified on 21 SEP 2017 VMware Horizon Client for Windows 10 UWP 4.

VMware Horizon Client for Windows 10 UWP Installation and Setup Guide. Modified on 21 SEP 2017 VMware Horizon Client for Windows 10 UWP 4. VMware Horizon Client for Windows 10 UWP Installation and Setup Guide Modified on 21 SEP 2017 VMware Horizon Client for Windows 10 UWP 4.6 You can find the most up-to-date technical documentation on the

More information

IBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide

IBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide IBM Client Security Solutions Client Security Software Version 1.0 Administrator's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix A - U.S. export

More information

WINDOWS HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your PC or Server

WINDOWS HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your PC or Server WINDOWS HOST GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device WiseMo Guest module for example on your Windows PC WiseMo Host module on your PC or Server WiseMo develops software

More information

PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers

PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers MDQS-6-3639 Rev 4.0 Revised June 13, 2017. PS Suite EMR software and related products and services are owned by TELUS. PS Suite EMR and

More information

Contents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52

Contents. Getting Started...1. Managing Your Drives...9. Backing Up & Restoring Folders Synchronizing Folders...52 Contents Getting Started.....................................................1 Installing the Software...........................................1 Using the Maxtor System Tray Icon................................6

More information

User Guide SecureLogin 7.0 SP3 April, 2012

User Guide SecureLogin 7.0 SP3 April, 2012 www.novell.com/documentation User Guide SecureLogin 7.0 SP3 April, 2012 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and

More information

EAM Portal User's Guide

EAM Portal User's Guide EAM Portal 9.0.2 User's Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

VMware Horizon Client for Windows User Guide. Modified on 03 OCT 2017 VMware Horizon Client for Windows 4.6 VMware Horizon Client for Windows 4.6.

VMware Horizon Client for Windows User Guide. Modified on 03 OCT 2017 VMware Horizon Client for Windows 4.6 VMware Horizon Client for Windows 4.6. VMware Horizon Client for Windows User Guide Modified on 03 OCT 2017 VMware Horizon Client for Windows 4.6 VMware Horizon Client for Windows 4.6.1 VMware Horizon Client for Windows User Guide You can find

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

CESecure Quick Start Guide

CESecure Quick Start Guide CESecure Quick Start Guide Using CESecure Software CESecure software is pre-installed on CMS Products Flash or Hard Drives and does not require installation. The CESecure software moves with the encryption

More information

United States Census Bureau

United States Census Bureau United States Census Bureau VDI RDC/SSDC User Training Guide Prepared by: US Census LTSO/DVB Version: 1.2 Last Revision Date: 11/10/2015 Original Creation Date: 08/22/2014 Revision History Revision Change

More information