|
Otros manuales para este modelo:
Resumen del manual
First Edition (May 2004) © Copyright International Business Machines Corporation 2004. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Preface . . . . . . . . . . . . . . .v Who should read this guide . . . . . . . . .v How to use this guide . . . . . . . . . . .v Additional information . . . . . . . . . .vi Chapter 1. Introduction . . . . . . . .1 The IBM Embedded Security Subsystem . . . . .1 The IBM Embedded Security Chip . . . . . .1 IBM Client Security Software . . . . . . . .2 The relationship between passwords and keys . . .2 The administrator password . . . . . . . .2 The hardware public and private keys . . . . .3 The administrator public and private keys . . .3 ESS archive . . . . . . . . . . . . . . .4 User public and private keys . . . . . . . .4 The IBM key-swapping hierarchy . . . . . .4 CSS public key infrastructure (PKI) features . . . .5 Chapter 2. Encrypting and decrypting files and folders . . . . . . . . . . .7 Right-click encryption . . . . . . . . . . .7 Transparent on-the-fly encryption (FFE encryption) .8 FFE folder-encryption status . . . . . . . .9 File and Folder Encryption utility tips . . . . . .9 Deleting protected files and folders . . . . .10 Before upgrading from a previous version of the IBM FFE utility . . . . . . . . . . . .10 Before uninstalling the IBM FFE utility . . . .10 File and Folder Encryption (FFE) utility limitations 10 Drive-letter protection . . . . . . . . . .10 Limitations when moving protected files and folders . . . . . . . . . . . . . . .10 Limitations when running applications . . . .10 Path name length limitations . . . . . . .10 Problems protecting a folder . . . . . . . .11 Chapter 3. CSS Credential Roaming . .13 CSS Credential Roaming network requirements . .13 Setting up a roaming server . . . . . . . . .13 Configuring a roaming server . . . . . . .13 Registering clients on the roaming server . . .14 Completing the roaming-client registration process 14 Registering a roaming client using the Administrator Utility . . . . . . . . . .15 Registering a roaming client using the User Configuration Utility . . . . . . . . . .15 Registering a roaming client using mass deployment (silently) . . . . . . . . . .15 Managing a roaming network . . . . . . . .17 Authorizing users . . . . . . . . . . .17 Synchronizing user data . . . . . . . . .17 Recovering a lost passphrase in a roaming environment . . . . . . . . . . . . .18 Importing a user profile . . . . . . . . .18 Removing and reinstating users in a roaming network . . . . . . . . . . . . . .19 Removing and reinstating registered clients in a roaming network . . . . . . . . . . .20 Restricting access to registered clients in a roaming network . . . . . . . . . . .20 Restoring a roaming network . . . . . . .21 Changing the administrator key pair . . . . .21 Changing the archive folder . . . . . . . .21 File and Folder Encryption (FFE) . . . . . . .21 IBM Password Manager . . . . . . . . . .22 Roaming terms and definitions . . . . . . . .22 Chapter 4. Instructions for the client user . . . . . . . . . . . . . . . .23 Using UVM protection for the system logon . . .23 Unlocking the client . . . . . . . . . .23 The User Configuration Utility . . . . . . . .23 User Configuration Utility features . . . . .23 User Configuration Utility Windows XP limitations . . . . . . . . . . . . . .24 Using the User Configuration Utility . . . . .25 Using secure e-mail and Web browsing . . . . .25 Using Client Security Software with Microsoft Applications . . . . . . . . . . . . . .25 Obtaining a digital certificate for Microsoft applications . . . . . . . . . . . . .26 Transferring certificates from the Microsoft CSP 26 Updating the key archive for Microsoft applications . . . . . . . . . . . . .27 Using the digital certificate for Microsoft applications . . . . . . . . . . . . .27 Configuring UVM sound preferences . . . . . .27 Chapter 5. Troubleshooting . . . . . .29 Administrator functions . . . . . . . . . .29 Authorizing users . . . . . . . . . . .29 Deleting users . . . . . . . . . . . .29 Setting a BIOS administrator password (ThinkCentre) . . . . . . . . . . . . .29 Setting a supervisor password (ThinkPad) . . .30 Protecting the administrator password . . . .31 Clearing the IBM embedded Security Subsystem (ThinkCentre) . . . . . . . . . . . . .31 Clearing the IBM embedded Security Subsystem (ThinkPad) . . . . . . . . . . . . .32 Known issues or limitations with CSS Version 5.3 .32 Roaming limitations . . . . . . . . . .32 Restoring keys . . . . . . . . . . . .33 Local and domain user names . . . . . . .33 Re-installing Targus fingerprint software . . . .34 BIOS supervisor passphrase . . . . . . . .34 Using Netscape 7.x . . . . . . . . . . .34 Using a diskette for archiving . . . . . . .34 Smart card limitations . . . . . . . . . .34 © Copyright IBM Corp. 2004 iii The plus (+) character is displayed on folders aft...
Otros modelos de este manual:Computadoras - NetVista M41 (6790) (355.3 kb)
Computadoras - NetVista M41 (6791) (355.3 kb)
Computadoras - NetVista M41 (6792) (355.3 kb)
Computadoras - NetVista M41 (6793) (355.3 kb)