Acer Security Suite
Acer Security Suite
Acer Security Suite
with Wave EMBASSY Trust Suite
Acer Incorporated
Quick Guide
Version: 1.1
Date: Aug, 2008
This document contains proprietary technical information, which is the property of the Acer Incorporated and shall not be
disclosed to others in whole or in part, reproduced, copied, or used as the basis for design, manufacturing, or sale of
apparatus without written permission of Acer Incorporated.
Acer Security Suite with Wave EMBASSY Trust Suite
Revision History
Rev. # Date Explanation of Change Approved by
1.1 Aug 18, 2008 First release to public
I
Acer Security Suite with Wave EMBASSY Trust Suite
TABLE OF CONTENTS
1. INTRODUCTION ................................................................................................................................. 2
2. FREQUENTLY ASKED QUESTIONS ....................................................................................................... 4
3. SET UP WAVE ETS AND TPM ............................................................................................................ 10
Initialize Owner Password ........................................................................................................................ 10
Initialize Fingerprints & Secure Login ...................................................................................................... 11
Initialize Master Password ....................................................................................................................... 12
Initialize Optional Applications – Setup Document Manager .................................................................. 12
Initialize Optional Applications – Setup Private Information Manager ................................................... 14
4. EMBASSY SECURITY CENTER ............................................................................................................ 22
4.1. TPM Owner Password settings .................................................................................................... 22
4.2. Secure Windows Login Settings ................................................................................................... 25
4.3. TCG Secure Password Vault .......................................................................................................... 25
4.4. PIM Settings ................................................................................................................................. 27
4.5. Archive and restore ...................................................................................................................... 29
5. DOCUMENT MANAGER ................................................................................................................... 30
6. PRIVATE INFORMATION MANAGER ................................................................................................. 31
7. ENCRYPTED FILE SYSTEM WIZARD ................................................................................................... 36
8. SECURE EMAIL WIZARD ................................................................................................................... 39
1
Acer Security Suite with Wave EMBASSY Trust Suite
1. Introduction
This document will assist you to evaluate, configure and set up the security features of Acer platforms
using the Wave EMBASSY Trust Suite software.
Features of the Acer Security Suite:
‧ EMBASSY Security Center:
− Provides multi‐level authentication:
¾ Fingerprint‐based biometrics
¾ TPM‐based PKI and password login
− You can enjoy these benefits:
¾ Management functions to set up and administer TPM security
¾ Backup and recovery for the TPM security chip's keys
¾ Strong, out‐of‐the‐box, multi‐level authentication
‧ Document Manager:
− Provides intuitive hardware‐based file and folder encryption allowing you to secure data
− You can enjoy these benefits:
¾ Protected data in virtual, hardware‐secured, drives
¾ Seamless integration with all Windows file operations including Explorer, My
Computer, Save, and Save As functions
¾ Secure data on corporate networks
‧ Private Information Manager:
− Manages web and application passwords for productivity and security
− You can enjoy these benefits:
¾ Simplified password management and use
¾ No forgotten passwords increases productivity
¾ Strong protection for web and application usernames and passwords
‧ Secure Email and Encrypted File System Wizard:
− Wizards allow for easy setup and uses TPM to add hardware‐based security to common
applications:
2
Acer Security Suite with Wave EMBASSY Trust Suite
¾ Secure email wizard for Microsoft Outlook or Outlook Express
¾ Secure EFS (Microsoft Encrypted File System) wizard
You can set up the above features to secure data on your Acer system.
Before beginning to set up the system, you should refer to the warning below for more detailed
information. You can also check the online User Guide in Windows for detailed information on Wave
EMBASSY Trust Suite functions.
‧ Warning
TPM provides high‐level encryption. It is essential to remember the password you set and to perform
TPM key backup before starting to use the Acer Security Suite. If you lose your password or TPM key,
TPM‐encrypted files will NOT be accessible. (Encrypted data CANNOT be decrypted if you do not have
the password or TPM key).
3
Acer Security Suite with Wave EMBASSY Trust Suite
2. Frequently Asked Questions
A. What is TPM?
TPM or Trusted Platform Module is a chip integrated into your system's motherboard that stores
information such as passwords, keys and certificates. The nature of this chip ensures that the
information stored within is secure from external attack and physical theft.
B. How can I tell if my TPM is working?
Go to the Control Panel > Device Manager. Expand the System Devices (for Windows XP) or Security
Devices (for Windows Vista) and search for the TPM device of your system, once you find it double‐click
on it to view the device's Properties. If you are unable to view the TPM device on the device driver, you
may need to enable the TPM from the BIOS and/or install the device driver software.
C. How does TPM compare with a SmartCard or biometrics?
They are complementary to the TPM, which is considered a fixed token that can be used to enhance
user authentication, data, communications and/or platform security. A SmartCard is a portable token
traditionally used to provide more secure authentication for a specific user across multiple systems,
while biometrics are providing that functionality in an increasing number of systems. Both technologies
have a role in the design of more secure computing environments.
D. Will the TPM send my private information to third parties without my knowledge?
No. The TPM is meant to store passwords, keys, certificates and biometric information, keeping them
private for each individual user who is enabled to use the TPM on that system. Any time the TPM is
accessed by a software request, you should be prompted for the password that you created during the
TPM setup wizard. This way, you will know when an application is interacting with the TPM. There is no
inherent functionality in the TPM to periodically send information to a third party such as a government
agency or your company's IT department.
E. What is the EMBASSY Trust Suite?
The EMBASSY Trust Suite (ETS) is a group of software applications that improve PC security, with
stronger restriction of access to data (authentication) and data protection (encryption). It includes the
following applications:
• EMBASSY Security Center – a one‐stop console to manage your PC's advanced security settings.
• EMBASSY Trusted Drive Manager – a plug‐in to the EMBASSY Security Center for activating the
advanced security features of Full Disk Encryption (FDE) drives.
4
Acer Security Suite with Wave EMBASSY Trust Suite
• Document Manager – a data protection application with hardware‐based file and folder
encryption for encrypting sensitive documents.
• Private Information Manager – a password management application with hardware‐based
encryption to store and automatically provide web and application passwords.
• Security Wizards – step‐by‐step wizards to walk through general security setup or to add TPM
security to several common applications.
F. What is the EMBASSY Security Center?
The EMBASSY Security Center (ESC) is a software application which helps you manage and simplify use
of the TPM chip. At the same time, it supports Enterprise IT deployments by allowing administrators to
define, through Windows Security Policies, the specific features of ESC that you may modify and those
which you may not.
G. What is Secure Windows Login in ESC?
Secure Windows Login allows users to use fingerprint and/or SmartCard authentication and leverage
security aspects of the TPM during the Windows login process. ESC security settings also allow
two‐factor authentication (password and fingerprint) if desired. You can configure ESC to use any
combination of Windows password and/or fingerprint for both Windows login, Windows unlock and
TCG Security Password Vault authentication.
H. What are ESC Security Policies?
ESC Security Policies define specific security‐related actions that are allowed or forbidden for the given
PC or user. ESC policies can be set for password Vault (enable/disable), type and frequency of
authentication for Vault access, key archiving and more. ESC also allows IT Administrators to define
policies that are unchangeable by users. If you find that you can't change certain ESC Security Policies,
you should request access from your IT department.
Note: Only an Administrator may modify ESC Security Policies.
I. Can I use fingerprints in ESC?
Embassy Security Center gives you the option of using biometric authentication (fingerprint) for logging
onto your Windows account or access additional components within ESC. A complete list of supported
devices is available at: http://www.wave.com/products/esc.asp. Click on Supported Biometric Devices.
J. What does the ESC TPM status bar indicate?
The TPM Status tab in the EMBASSY Security Center provides information on the current status of the
TPM and related system components. Information on the security hardware and software installed is
5
Acer Security Suite with Wave EMBASSY Trust Suite
provided, including:
• TPM chip enabled/disabled
• TPM owner initialization state
• TPM information ‐ including manufacturer, TPM version, TSS vendor and TSS version
information
• Wave Systems Software Information ‐ including EMBASSY Security Center Version, KTM
version, CSP name and CSP version
Taking ownership is the first step to enabling TPM security. Use the Owner tab in ESC to establish TPM
ownership. Ownership must be assumed in order for the security functions of ESC and other security
applications to function properly. Taking TPM ownership essentially enables the TPM to function,
thereby allowing you access to the security features available. Before ownership can be established, the
TPM chip must be enabled (check your PC manufacturer's documentation for instructions; this is
typically done in the BIOS).
While establishing ownership, you will define the TPM Owner Password. Once this password is defined,
ownership is established and the TPM is ready for use. On certain systems, you may notice that the
Establish Ownership button is inactive (not selectable). If this is the case, ownership of the TPM has
already been established and the TPM is ready for use.
You should ensure that the TPM Owner Password is not lost. The TPM Owner Password is required for
certain advanced functions of the TPM. If this password needs to be changed, the TPM Owner can
select Change and be guided through the process.
K. How can I confirm that my TPM chip is working through ESC?
ESC has a status bar at the bottom of the screen that indicates if the TPM is enabled and owned. If the
TPM chip is marked Enabled with a green check mark next to it, the TPM chip is recognized by ESC and
can communicate with ESC. If the TPM chip is marked enabled with a red X next to it, either the TPM
chip has not been activated from BIOS, or it is not recognized by ESC.
You can also view the TPM chip status by clicking on the Trusted Platform Module icon. If the TPM chip
is recognized by ESC it will display the TPM information, if it is not recognized all fields will show
"unknown."
L. What is the Wave TCG‐enabled CSP?
TCG‐enabled refers to the Trusted Computer Group's standard for Cryptographic Services and CSP refers
to Cryptographic Service Provider, which is a Microsoft format for providing cryptographic services. The
Wave TCG‐enabled CSP is included with the ESC and can be used whenever a CSP is required ‐ either
6
Acer Security Suite with Wave EMBASSY Trust Suite
directly called from an application or selectable from a list of installed CSPs.
M. What is the TCG Secure Password Vault that is referred to in ESC?
The TCG Secure Password Vault is where ESC will store the individual TPM key passwords being
managed for the current user. The Password Vault is secured by the TPM. Access to the Password Vault
is only granted after a valid authentication is performed. You may access the Password Vault with their
Windows Password and/or a fingerprint scan.
The value of ESC's Password Vault becomes apparent once you begin using TPM‐based applications
regularly. Typically, each application will create at least one TPM key, often more, and use them to
protect various types of data. Each TPM key requires its own password, which can quickly become
difficult to manage.
The ESC Password Vault solves this problem without undermining security. ESC allows you to save
individual TPM key passwords to the Password Vault. When TPM keys are needed by an application, ESC
retrieves them from the Password Vault.
N. What is the Private Information Manager?
The Private Information Manager secures private and sensitive information on the PC while keeping this
information easily accessible. It makes managing passwords for PC applications and Internet surfing
simple and safe.
O. How does the Private Information Manager secure information?
Private Information Manager uses TPM for enhanced security. Personal information is protected by
secure hardware in the PC and cannot be viewed by others.
P. How do I manage passwords in Private Information Manager?
When using Private Information Manager, you will be prompted for a password to login. The password
is used to access data that is protected by the PC's TPM. It is important to remember the password as
you will not be able to access the Private Information Manager data without it. You can configure ESC
so that a single authentication, your Windows account password or fingerprint, is used for all
TPM‐protected applications, including Private Information Manager.
Q. What is Private Information Manager Form Fill?
Private Information Manager Form Fill can enter name, address and credit card information into
web‐based forms. You can opt to set up Private Information Manager to automatically fill in forms
(Settings > Options > Web Form Fill Options) or use the Form Fill tool to click and fill in or drag and drop
the information into web forms.
7
Acer Security Suite with Wave EMBASSY Trust Suite
R. What is Document Manager?
Document Manager is a trusted application which protects sensitive data through the use of file and
folder level encryption via the TPM for hardware‐based, enhanced security. Encrypted files are
managed through the use of a storage location called a Vault, which appears as a connected network
drive in My Computer. Intuitive use is assured through a friendly Explorer‐type view of protected files
and folders and the ability to encrypt a single file or complete folders.
Document Manager is integrated with Microsoft Office applications allowing direct toolbar access to
the Open Encrypted File. Save and close Encrypted File functions for the protection and easy
management of files. For other applications, file menu selections can be executed with their target the
vault location.
S. Can I see documents in my Document Manager Vault from my Microsoft applications or from
Windows Explorer?
The Document Manger Vault is seamlessly integrated with the Windows file system. The Document
Manager Vault will appear as a mapped network drive on the PC. This allows the Document Manager
Vault to be accessed directly from any software application. Should you encounter difficulty finding the
Document Manager Vault mapped drive, navigate to My Computer selection via the current dialog or
Windows Explorer.
T. Are my Document Manager files really secure? If a hacker breaks into my computer, can they get the
data in the Document Manager Vault?
Yes, your files are really secure and, no, a hacker cannot gain access to the data stored in the vault files.
Document Manager uses the security key that is physically stored in your PC's TPM hardware to secure
your files. A hacker can never gain access to this key, thereby protecting files in the Vault from exposure.
U. How do I access my vault in Document Manager?
Your Document Manager Vault is accessible in two ways; through the Document Manager Vault
Interface or through Windows Mapped Drives/Windows Explorer. Items that are in a vault are not
accessible to unauthorized individuals. The Document Manager Vault supports drag and drop, as well as
Windows Context menus (right‐click in a file or folder from Windows Explorer or the Desktop to access
the context menu).
V. How do I manage my encrypted files in Document Manager?
Document Manager provides the flexibility and functionality needed to easily manage secured files.
Commands are available from the Document Manager Vault interface menu bar. These commands
provide a way to manage and back up your Document Manager Vault.
8
Acer Security Suite with Wave EMBASSY Trust Suite
W. How do I encrypt files in Document Manager?
After creating the Document Manager Vault on initial startup, files and folders are encrypted simply by
placing them within the Vault. There are several methods for placing files the vault, including right‐click
menu options, Save As from any application or drag and drop into the vault via Windows Explorer.
X. How do I manage my passwords in Document Manager?
When using Document Manager, you will be prompted for a password to access the Vault. The
password is set when you create the Vault when setting up Document Manager. The password is used
to gain access to data that is protected by the PC's built‐in secure hardware. It is important to
remember the password of, as you will not be able to access the Vault without it.
Y. Is there any limit to the size or number of files and folders I can have in my vault?
Document Manager does not have a limit on the size or number of files you can place on the Vault. The
Vault is limited only by the amount of available space on your hard drive. For example, if you have your
Vault on the C: drive, then the size of the files you place on your Vault will be limited to the amount of
free storage you have on the C: drive.
9
Acer Security Suite with Wave EMBASSY Trust Suite
3. Set up Wave ETS and TPM
‧ Initialize Owner Password
‧ Initialize Fingerprints & Secure Windows Login
‧ Initialize Master Password
‧ Initialize Optional Applications
− Document Manager
− Private Information Manager
Initialize Owner Password
10
Acer Security Suite with Wave EMBASSY Trust Suite
Initialize Fingerprints & Secure Login
(This is an enhanced function that requires a fingerprint reader. If a fingerprint reader is not available,
click Next to proceed to the next step.)
11
Acer Security Suite with Wave EMBASSY Trust Suite
Initialize Master Password
Initialize Optional Applications – Setup Document Manager
12
Acer Security Suite with Wave EMBASSY Trust Suite
13
Acer Security Suite with Wave EMBASSY Trust Suite
Initialize Optional Applications – Setup Private Information Manager
14
Acer Security Suite with Wave EMBASSY Trust Suite
15
Acer Security Suite with Wave EMBASSY Trust Suite
16
Acer Security Suite with Wave EMBASSY Trust Suite
17
Acer Security Suite with Wave EMBASSY Trust Suite
18
Acer Security Suite with Wave EMBASSY Trust Suite
19
Acer Security Suite with Wave EMBASSY Trust Suite
20
Acer Security Suite with Wave EMBASSY Trust Suite
21
Acer Security Suite with Wave EMBASSY Trust Suite
4. Embassy Security Center
‧ TPM Owner Password settings
‧ Secure Windows Login settings
‧ TCG Security password vault settings
‧ PIM settings
‧ Archive and restore
4.1. TPM Owner Password settings
22
Acer Security Suite with Wave EMBASSY Trust Suite
23
Acer Security Suite with Wave EMBASSY Trust Suite
‧ Display TPM status:
− Enabled/disabled
− Owned/un‐owned
− TPM chip vender & version
− TSS vender & version
‧ TPM Owner Password Settings
− Establish/change TPM Owner Password
24
Acer Security Suite with Wave EMBASSY Trust Suite
4.2. Secure Windows Login Settings
‧ Display current user account
‧ Enable/disable Secure Windows Login
‧ Select one of following authentication types for the current user account:
− Password or Biometric
− Password only
− Biometric only
− Password and Biometric
‧ Enroll fingerprints for user accounts.
4.3. TCG Secure Password Vault
‧ TCG Secure Password Vault:
− Store passwords used to protect each key saved in the TPM chip.
‧ Function:
− Simplify authentication steps when using a key stored in the TPM chip.
− When an application requests a key saved in the TPM chip, it needs the password used to
protect that key. Enter the Master Password and Password Vault will automatically find the
correct password to use.
25
Acer Security Suite with Wave EMBASSY Trust Suite
‧ TCG Secure Password Vault settings:
− Change Master Password
− Enable TCG Secure Password Vault
− Set authentication frequency for Password Vault login
− Set authentication type for Password Vault login
26
Acer Security Suite with Wave EMBASSY Trust Suite
‧ Functions of the Password Vault Viewer:
− Display keys stored in the TPM chip
− Display the passwords used to protect the keys
− Change the passwords used to protect the keys
4.4. PIM Settings
‧ Favorites:
− Edit the username and password used to log into selected web sites.
‧ Profiles:
− Edit personal data, such as name, company, address, phone, email, etc.
27
Acer Security Suite with Wave EMBASSY Trust Suite
‧ Options:
− Set web form fill‐out options
− Set browser window options
− Set time out options
‧ Login Settings
− Web site login
¾ Automatic login
¾ Automatic capture
− Application login
¾ Automatic login
¾ Automatic capture
‧ Backup
− Backup PIM data
− Restore PIM data
− Clear PIM data
‧ Startup
− Specify URL to be opened when logging into PIM
28
Acer Security Suite with Wave EMBASSY Trust Suite
4.5. Archive and restore
‧ Archive
− Back up all the current user's keys from the TPM chip to a file
‧ Restore
− Restore all the current user's keys from a file to the TPM chip
29
Acer Security Suite with Wave EMBASSY Trust Suite
5. Document Manager
‧ Set hardware security features provided by TPM to ensure strong protection of data
‧ Secure storage and management capabilities for files and folders
‧ Drive‐level encryption
‧ Files encrypted by Document Manager (stored in the Document Manager Vault) cannot be located
or viewed by others
‧ Users can add files or directories to the Document Manager Vault by:
− Creating a new file or directory in the Vault
− Dragging and dropping an existing file or directory to the Vault
− Right‐clicking a file/folder and selecting Move To Vault
30
Acer Security Suite with Wave EMBASSY Trust Suite
6. Private Information Manager
‧ The Profile tab:
− Allows you to set data which is used to automatically fill in web‐based forms.
31
Acer Security Suite with Wave EMBASSY Trust Suite
‧ The Wallet tab:
− Allows you to enter credit card data. This data is used to automatically fill in web‐based
forms.
‧ The Favorites tab:
− Allows you to set up automatic login to selected websites that are listed in this tab.
32
Acer Security Suite with Wave EMBASSY Trust Suite
‧ The Exclusions tab:
− You can set up a list of web sites which you don't want PIM to automatically fill in.
‧ The Options tab:
− Web Form Fill Options:
¾ Configure the way that PIM automatically fills in web forms.
− Browser Window Options:
¾ Control the behavior of the browser when launching a favorite.
− Time Out Options:
¾ Configure the amount of time PIM will idle before logging out.
33
Acer Security Suite with Wave EMBASSY Trust Suite
‧ The Login tab:
− Web Site Login:
¾ Configure the way that PIM fills in the username and password associated with
website URLs saved in Favorites.
− Application Login:
¾ Configure the way that PIM fills in the username and password applications running
on the user's PC.
− Set automatic capture functionality:
¾ Configure whether or not PIM will remember usernames and passwords for
applications and web pages that require login.
‧ The Backup tab:
− Backup, Restore and Clear personal data stored in the PIM and keys stored in the TPM chip
necessary to access the personal data.
34
Acer Security Suite with Wave EMBASSY Trust Suite
‧ The Start tab:
− Launch URL:
¾ Set a website to automatically launch when PIM starts.
− Launch Options:
¾ Modify the behavior of PIM when it starts.
− Startup:
¾ Define PIM behavior upon Windows startup.
‧ PIM Form Fill‐in:
− Double‐click the data on the PIM form fill‐in page to enter it into the target field on the web
form.
35
Acer Security Suite with Wave EMBASSY Trust Suite
7. Encrypted File System Wizard
‧ Set up Encrypted File System Wizard
‧ Encrypted File System
36
Acer Security Suite with Wave EMBASSY Trust Suite
37
Acer Security Suite with Wave EMBASSY Trust Suite
38
Acer Security Suite with Wave EMBASSY Trust Suite
8. Secure Email Wizard
― Secure Email Wizard settings
39
Acer Security Suite with Wave EMBASSY Trust Suite
― Secure email using Microsoft Outlook 2007
40
Acer Security Suite with Wave EMBASSY Trust Suite
41
Acer Security Suite with Wave EMBASSY Trust Suite
42