Secure It Easy User Manual
Secure It Easy User Manual
User Manual
Table of Contents
5.2.3. Graphs.........................................................................................8
I
Secure it Easy™ – User Manual
1. Introduction
Secure it Easy™ will help you secure your PCs endpoints. You will be able to restrict
the use of the USB Ports and other endpoints on your Workstation and therefore
effectively prevent unwanted data introduction or data leakage from your PC.
• Allow or restrict the use of any USB storage device on your computer
• See the details of all USB storage devices connected to the computer at a
certain moment
• Use file tracing to monitor file accesses on any USB storage device
2. Concept of Architecture
Secure it Easy is meant as a local endpoint security for the USB ports of your
workstations. All installations and configurations will be done locally unless you have
a software deployment mechanism for MSI Files in place (such like Microsoft Remote
installation Server – RIS)
3. System Requirements
• Operating Systems:
o Windows Vista
4. Installation
To install Secure it Easy it is required that you are logged on the workstation as with
full administrative rights.
It is required that the Microsoft .NET Framework Version 2.0 (or newer) is installed on
the PC. If it is not already installed the Secure it Easy installer will ask you to do so.
After the Microsoft .NET Framework Version 2.0 is installed on the PC, run the
SecureItEasy.exe file
Secure it Easy will install itself in the start menu and create the Secure it Easy
program group. Secure it Easy will require in some cases that you restart your PC for
a successful completion of the installation process.
After a successful installation Secure it Easy will always run in the background to
protect your PCs endpoints when you or other users are logged into the PC.
All the adjacent software that is necessary for installation can be downloaded for free
from the following locations:
http://www.microsoft.com/downloads/details.aspx?FamilyID=0856eacb-4362-4b0d-8edd-aab15c5e04f5&displaylang=en
2
Secure it Easy™ – User Manual
5. Getting Started
IMPORTANT! Make sure you are logged in to the PC as administrator. Secure it
Easy comes with a configuration Interface, which will be available for logged in
Administrators only. If a standard user logs in to the system the configuration
Interface will not be accessible.
Once you plug in a USB Device, it will be shown in the “Authorized Devices” tab of
Secure it Easy. Here you can give or deny access to a specific device by checking
the corresponding checkbox (or by double clicking on the Device name).
3
Secure it Easy™ – User Manual
By default USB storage devices are not authorized and therefore blocked to keep
your endpoints on your PC safe.
You can disable this window by checking the box next to “Do not show this again”.
You can also re-enable it under the Settings->General Settings and un-checking the
box “Do not show Tool Tip window”.
4
Secure it Easy™ – User Manual
The red dot means that the The user can not access this
correspondent device is currently device from this PC.
connected but not authorized.
The green dot means that the device The user is able to access the
is currently connected and device from this PC.
authorized (Trusted Device).
The grey dot means that the device
is currently not connected.
With a right mouse click on a device a menu will open. This menu will give you quick
access to the following settings:
Option Explanation
Check / uncheck Checks / un checks a device for authorization
Edit description Here you can give each device an additional individual name
to simplify the work with different devices
Device History Secure it Easy logs when a device was
connected/disconnected to/from the PC and when it was
authorized/unauthorized
Delete Device You can remove a device from the list. Once you plug the
device back in, it will appear in the list as unauthorized.
Explore Device You can explore the contents of the drive. This option is only
available if the selected device is authorized.
After editing you settings you have to apply them by clicking the “Apply” button.
File tracing can be enabled by checking the “show file accesses” button under the
Reporting tab.
5
Secure it Easy™ – User Manual
You can then verify the files that have been accessed in the log file, to the right of the
screen.
You can also export the log file and save it for later examination by clicking the
“Export” button.
6
Secure it Easy™ – User Manual
This powerfull module contains detailed information and statistics regarding your
devices and the use of these.
7
Secure it Easy™ – User Manual
5.2.3. Graphs
Here you can see a graphical representation of the usage of devices and file
accesses.
8
Secure it Easy™ – User Manual
Device activity
Files activity
9
Secure it Easy™ – User Manual
You can also save and/or print these images, for later audit.
You can sort the events by date & time, user, action, file type, product ID (PID),
vendor ID (VID), etc. by clicking on the correspondent table header, e.g. ‘Timestamp’.
10
Secure it Easy™ – User Manual
This list can be exported as a *.csv (comma-separated values) file for later reference.
Simply click the Export as .csv button and define the path where you would like the
file to be saved.
You have the option to receive an e-mail notification, each time an unauthorized
device is connected in to the PC that is protected with Secure it Easy.
To enable the e-mail notification, check the “Enable e-mail notifications” option from
the “E-Mail Notification” tab.
11
Secure it Easy™ – User Manual
Please specify a sender and a recipient e-mail address. Enter your SMTP server
address along with your username and password in case that your SMTP server
requires this information in order to send mail.
We recommend you to send a test e-mail be clicking the “Send Test Message”
button. If a firewall is installed on the PC that you are protecting with Secure it Easy,
the firewall will request you for authorization that Secure it Easy is accessing the
internet. Please grant Secure it Easy this authorization so you will be able to receive
e-mail notification.
12
Secure it Easy™ – User Manual
The General Settings tab gives you the option to set the Secure it Easy Service
settings. The Secure it Easy service is by default set to “Automatic” meaning that
when the PC is started the Secure it Easy Service started automatically and runs in
the background in order to protect you PCs endpoints. As the PCs administrator you
would also be able to temporarily stop the Secure it Easy Service manually.
You also have the option to save a ‘Hint’ (reminder) for the Password. This might be
helpful when forgetting the password.
13
Secure it Easy™ – User Manual
After setting up a password, you will be asked to enter it each time you start Secure it
Easy.
In case you didn’t save a ‘Hint’, this functionality will be hidden in the Login dialog.
14
Secure it Easy™ – User Manual
You will be also notified from time to time, by a similar message, about the trial period
of Secure it Easy.
You can stop the notifications pop up messages from “General Settings” menu
option,
or from the system tray by right clicking on the Secure it Easy icon.
15
Secure it Easy™ – User Manual
After the 30 days trail has expired the Secure it Easy Service will stop and
discontinue protecting your PCs endpoints.
Please save your license key in a safe place for future reference.
7. Update Mechanism
You can check for the availability of a newer Secure it Easy version by clicking the
“Check for Update” button in the “General Settings” tab.
If there is a newer version available you will be asked if you want to download it.
8. Support
In case additional help, such as the FAQs or e-mail support is required, please visit
our support website directly at http://www.cososys.com/help.html.
17
Secure it Easy™ – User Manual
Or you can also click on CoSoSys icon from ‘General Settings’ window,
then choose the ‘Support’ tab from the web page browsed.
18
Secure it Easy™ – User Manual
9. Uninstall
To remove Secure it Easy from your PC, please go to Control Panel Æ Add or
Remove Programs Æ Secure it Easy Æ Remove. Before doing this you have to close
Secure it Easy Settings.
IMPORTANT! Uninstalling the application will give full access to all USB drives that
were and will be plugged into your PC.
© 2004 – 2008 CoSoSys SRL; Secure it Easy and Trusted Devices are trademarks of CoSoSys SRL.
All rights reserved. Windows and .NET Framework are registered trademarks of Microsoft Corporation.
All other names and trademarks are property of their respective owners.
19