Endpoint Encryption For PC Administration Guide
Endpoint Encryption For PC Administration Guide
Administration Guide
Version 5.2.5
McAfee, Inc.
McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA
Tel: (+1) 888.847.8766
For more information regarding local McAfee representatives please contact your local McAfee office,
or visit:
www.mcafee.com
Document: Endpoint Encryption for PC Administration Guide
Copyright (c) 1992‐2010 McAfee, Inc., and/or its affiliates. All rights reserved.
McAfee and/or other noted McAfee related products contained herein are registered trademarks or
trademarks of McAfee, Inc., and/or its affiliates in the US and/or other countries. McAfee Red in
connection with security is distinctive of McAfee brand products. Any other non‐McAfee related
products, registered and/or unregistered trademarks contained herein is only by reference and are the
sole property of their respective owners.
Contents
Preface ........................................................................................... 1
Using this guide ............................................................................................. 1
Audience ................................................................................................. 1
Conventions ............................................................................................ 1
Welcome .........................................................................................2
About This Guide ..................................................................................... 2
Audience ................................................................................................. 2
Related Documentation............................................................................. 3
Acknowledgements .................................................................................. 3
Design Philosophy .................................................................................... 3
Contacting Technical Support .................................................................... 3
Introduction ...................................................................................4
Why Endpoint Encryption for PC? ............................................................... 4
How Endpoint Encryption for PC Works ............................................................. 4
Protection ............................................................................................... 4
Management ................................................................................................. 5
The Object Directory ................................................................................ 5
Objects, Entities, and Attributes explained. ................................................. 6
The Endpoint Encryption Components ............................................................... 6
Endpoint Encryption Manager .................................................................... 7
Endpoint Encryption Server ....................................................................... 7
Endpoint Encryption Object Directory ......................................................... 8
Endpoint Encryption for PC Client ............................................................... 8
Endpoint Encryption File Encryptor ............................................................. 9
Endpoint Encryption Connector Manager ..................................................... 9
Install and Deployment ............................................................................ 10
Preface
Audience
This guide is intended for administrators of Endpoint Encryption for PC.
Conventions
This guide uses the following conventions:
Bold Condensed All words from the interface, including options, menus, buttons, and dialog
box names.
Courier The path of a folder or program; text that represents something the user
types exactly (for example, a command at the system prompt).
Italic Emphasis or introduction of a new term; names of product manuals.
Blue A web address (URL); a live link.
Note Supplemental information; for example, an alternate method of executing
the same command.
Caution Important advice to protect your computer system, enterprise, software
installation, or data.
|1
Welcome
Welcome
The team at McAfee is dedicated to providing you with the best in security for
protecting data on personal computers. Applying the latest technology, deployment
and management of users is enhanced using simple and structured administration
controls.
Endpoint Encryption for PC represents the latest addition to the McAfee family and
incorporates functionality not found in earlier versions. This new edition of Endpoint
Encryption for PC features a new dimension in IT security incorporating many new
enterprise level options, including automated upgrades, file deployment, flexible
grouping of users and centralized user management. In addition, user’s credentials
can be imported and synchronized with other deployment systems.
Readers unfamiliar with Endpoint Encryption should follow the appropriate sections of
the Endpoint Encryption for PC Quick Start Guide which walks through setting up a
Endpoint Encryption enterprise before tackling any of the topics in this guide.
Audience
This guide was designed to be used by qualified system administrators and security
managers. Knowledge of basic networking and routing concepts, and a general
understanding of the aims of centrally managed security is required.
McAfee can only contribute to information security within your organization as part of
a coherent and well-implemented organizational security policy.
For information about cryptography topics, readers are advised to consult the following
publications:
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition, Bruce
Schneier, Pub. John Wiley & Sons; ISBN: 0471128457
Computer Security, Deiter Gollman, Pub. John Wiley and Sons; ISBN: 0471978442
2|
Welcome
Security in Computing, Charles P. Pfleeger, Pub Prentice Hall PTR; 3 edition; ISBN
0130355488
Related Documentation
The following materials are available from our web site, www.mcafee.com, and from
your Endpoint Encryption Distributor:
Acknowledgements
McAfee’s Novell NDS Connector and LDAP Connectors make use of OpenLDAP
(www.openldap.org) and OpenSSL (www.openssl.org). Due credit is given to these
1 2
Design Philosophy
Unlike other security systems, Endpoint Encryption for PC does not prevent access to
specific files, or in any way alter the way the PCs and PDAs are used.
|3
Introduction
Introduction
Why Endpoint Encryption for PC?
Around 1,000,000 laptops go missing each year, causing an estimated 4 billion USD
worth of lost data. Is your data safely stored? Ever thought about the risks you run for
your company and your clients? Endpoint Encryption for PC was developed with the
understanding that often the data stored on a computer is much more valuable than
the hardware itself.
McAfee’s product range enhances the security of devices by providing data encryption
and a token-based logon procedure using, for example, a Smart Card via a USB,
PCMCIA, serial or parallel reader. Endpoint Encryption also has optional File and Media
encryption programs (VDisk, File Encryptor and Endpoint Encryption for Files and
Folders). Endpoint Encryption for PC supports the following Microsoft Operating
Systems:
• Microsoft Windows 7
NOTE: For end users, Endpoint Encryption allows users to work as usual, including the
security and network services. Apart from the initial Logon, Endpoint Encryption for PC
offers completely transparent security.
If an unauthorized application broke through the Endpoint Encryption barrier and read
the disk directly, it would find only encrypted data, even in the Windows swap file and
temporary file areas.
4|
Introduction
Endpoint Encryption installs a mini-operating system on the user’s hard drive, this is
what the user sees when they boot the PC. Endpoint Encryption looks and feels like
Microsoft Windows, with mouse and keyboard support, moveable windows, etc. This
Endpoint Encryption OS is completely contained and does not need to access any other
files or programs on the hard disk, and is responsible for allowing the user to
authenticate with a password, or, a token such as a smart card.
Once the user has entered the correct authentication information, the Endpoint
Encryption operating system starts the crypt driver in memory and boots the protected
machine’s original operating system. From this point on the machine will look and
behave as if Endpoint Encryption was not installed. The security is invisible to the
user: the only readable data on the hard disk will be the Endpoint Encryption
operating system; the encryption key for the hard drive is itself protected with the
user’s authentication key. The only possible way to defeat Endpoint Encryption is to
either guess the hard disk encryption key (a one in 2256 chance with the AES256
algorithm), or to guess the user’s password.
Management
The Object Directory
The Object Directory is a central store of configuration information for all machines,
servers, policies and users. It is managed by Endpoint Encryption Administrators using
the Endpoint Encryption Manager.
Each time an Endpoint Encryption protected device boots, it will try and connect with
the Object Directory; optionally, every time the user initiates a dial-up connection, or,
after a set period of time, the Endpoint Encryption protected machine will attempt to
contact the Object Directory. The Object Directory is accessed over TCP/IP via a
secure Endpoint Encryption Server (in the case of a centrally managed enterprise).
The Endpoint Encryption protected machine queries the Object Directory for any
updates to its configuration; when the updates are found they are downloaded to the
|5
Introduction
client machine. Typical updates could be a new user assigned to the machine by an
administrator, a change in password policy, an upgrade to the Endpoint Encryption
operating system, or, a new file specified by the administrator. At the same time,
Endpoint Encryption uploads details like the latest audit information, e.g. any user
password changes and security breaches to the Object Directory, thus allowing
transparent synchronization of the enterprise system.
Within the object are collections of configuration data called Attributes. Again, the
same type of attribute may exist across many object types. Using the previous
example of John and his laptop, the details of the encryption keys, user status and
administration level would all be stored as separate attributes.
Entities are applications within the Endpoint Encryption system. Because of the
generality of the object design all Endpoint Encryption applications also have some
generality about them, for example, the Entity representing the Endpoint Encryption
client and the Entity representing the Endpoint Encryption Server. Both authenticate to
the Object Directory in the same way - as an "object" which could be a machine or
user. This generality is mainly hidden from users and administrators, however,
because of this core design, you will find that many Endpoint Encryption related
functions and tasks are common between users, machines and entities.
6|
Introduction
Figure 1. Endpoint Encryption Manager Interface
The most important component of the Endpoint Encryption enterprise is the Endpoint
Encryption Manager, the administrator interface. This utility allows privileged users to
manage the enterprise from any workstation that can establish a TCP/IP link or file link
to the Object Directory. Typical procedures that the Endpoint Encryption Administrator
handles are:
|7
Introduction
Hellman key exchange and bulk algorithm line encryption. This ensures that
"snooping" the connection cannot result in any secure key information being disclosed.
The server exposes the Object Directory via fully routed TCP/IP, meaning that access
to the Object Directory can be safely exposed to the Internet / Intranet, allowing
clients to connect wherever they are. As all communications between the Server and
client are encrypted and authenticated there is no security risk in exposing it in this
way.
There is a unique PDA Server which provides similar services to PDAs such as
Microsoft Pocket Windows and PalmOS devices. More information about this can be
found in later chapters.
• Audit trails
Clicking on this icon allows the user to lock the PC with the screen saver (if the
administrator has set this option there one is selected). Right-clicking on the monitor
allows them to perform a manual synchronization with their Object Directory, or,
monitor the progress of any active synchronization.
8|
Introduction
Normally the Endpoint Encryption client attempts to connect to its home server or
directory each time the machine boots, or, establishes a new dial-up connection.
During this process, any configuration changes made by the Endpoint Encryption
administrator are collected and implemented by the Endpoint Encryption client. In
addition, information such as the last audit logs are uploaded to the directory.
Once protected in this way the file can be sent elsewhere, e.g. via e-mail or a floppy
disk, without the risk of disclosure.
When the file needs to be used, it just needs to be double clicked; a password or login
prompt will be presented for authentication. If they are authenticated correctly, the
file will be decrypted.
The File Encryptor also has an option to create an RSA key pair for recovery – if the
password to a file is lost, then the file can still be recovered using the correct recovery
key.
Figure 2. Endpoint Encryption Connector Manager
|9
Introduction
The Connector Manager is a customizable module which enables data from systems
such as X500 directories (commonly used in PKI infrastructures) to propagate to the
Endpoint Encryption Object Directory. Using this mechanism, it is possible to replicate
details such as a user’s account status between Endpoint Encryption for PC and other
"directories".
Current connector options include LDAP, Active Directory, and a NT Domain Connector.
For information on these components, contact your Endpoint Encryption
representative, or, see the Endpoint Encryption Manager Administration Guide.
With the increasing necessity of install mechanisms which do not involve end users,
and software industries striving to make the cost of ownership and implementation of
products as small as possible, Endpoint Encryption for PC utilizes "smart-update" type
technology.
With this mechanism, only a small amount of code needs to be placed on the client
machine to facilitate installation. The remaining code modules are downloaded on
demand from either central Endpoint Encryption Servers (in the case of a network
install), or from a local compressed directory (in the case of a standalone PC). With
network connected machines, this gives the additional benefit of being able to update
Endpoint Encryption files simply by updating the data stored in the Object Directory.
Endpoint Encryption’s file deploy mechanism can also be used to "push" other files to
Endpoint Encryption protected machine, for instance virus databases can be stored in
the central Endpoint Encryption directory, when it needs updating a Endpoint
Encryption administrator upgrades the central copy. All Endpoint Encryption protected
machines notice the change and automatically download the new file. This deploy
mechanism can also be used to make registry changes on remote machines and can
even execute files.
10 |
Installing the Endpoint Encryption Manager
The Endpoint Encryption Manager is the administration tool for managing all Endpoint
Encryption aware applications.
The Endpoint Encryption Manager will now be installed on your machine. Follow the
on-screen prompts to install the software: you may be prompted to select a language,
a smart card reader, and encryption algorithm. For more information on these options
please see the Encryption Manager Administration Guide. Once completed you may
need to restart your system.
The Endpoint Encryption Management suite adds some items to your start menu:
Endpoint Encryption Manager which starts the management console; the Database
Server which starts the communication server and provides encrypted links between
clients and the configuration.
After rebooting, run the Endpoint Encryption Manager program. A wizard will walk you
through the creation of a new Endpoint Encryption directory. If you have an existing
Object Directory in your network, you can connect to it by cancelling the wizard and
manually configuring a connection.
For more information on the Endpoint Encryption Manager please see the Endpoint
Encryption Manager Administration Guide.
| 11
Endpoint Encryption for PC User Policies
In the case of hard tokens, creating the token does not necessarily set the user to
actually use that token. This must be accomplished separately from the user’s Token
properties page.
Reset Token
This option resets the token authentication to the default. In the case of the soft
(password) token resets the password to 12345.
Some hard tokens may not be able to be reset using Endpoint Encryption, for
example, Datakey Smart Cards. In this case contact the manufacturer of your token to
determine the correct re-use procedure.
View Audit
This option displays the audit for the user - for more information see the Auditing
chapter.
12 |
Endpoint Encryption for PC User Policies
Create Copy
This option creates a new object based on the selected object.
Properties
This option displays the properties of the selected object.
Figure 3. User Options ‐ General
Auto-boot users
The special user id “$autoboot$”, with a password of “12345”, can be used to auto-
boot a Endpoint Encryption protected machine. This option is useful if an auto-boot of
a machine is required, for example, when updating software using a distribution
package such as SMS or Zenworks. However, this ID should be used with caution as it
effectively bypasses the security of Endpoint Encryption.
Enabled
This option shows whether the user account is enabled or not. The enabled status is
always user selectable.
When an Endpoint Encryption for PC protected system synchronizes with the Endpoint
Encryption Manager, it checks the user account list to ensure that the currently logged
on user is still valid (because they logged on at a boot time before the network and
Object Directory were available).
| 13
Endpoint Encryption for PC User Policies
Users with disabled accounts, or users who have been removed from the user list, will
find their workstation will lock and they will be unable to log in.
NOTE: If you want to force an Endpoint Encryption machine to synchronize (and hence immediately stop
the user from accessing the machine), you can use the "force sync" option to force an update. See the Force
Synchronization chapter.
Devices
Figure 4. User Configuration ‐ Devices
Ports
Endpoint Encryption can attempt to block access to the serial and/or parallel ports.
This blocking is implemented after the operating system has booted. Therefore, if the
machine has a serial mouse, it will still function. Likewise a printer connected to the
parallel port will still function. This option is designed to stop users adding serial and
parallel devices AFTER the machine has booted.
NOTE: The McAfee Port Control product provides granular device access by allowing you to take detailed
control of the devices which are available to your users.
14 |
Endpoint Encryption for PC User Policies
Application Control
Figure 5 User Configuration ‐ Application Control
| 15
Using Tokens with Endpoint Encryption for PC
https://kc.mcafee.com/corporate/index?page=content&id=pd20895
If you intend to use smart cards, you need to ensure that a Endpoint Encryption
supported smart card reader is installed, along with its drivers – for example the
Mako/Infineer LT4000 PCMCIA smart card reader must be installed.
In both cases, the appropriate device drivers are available either direct from the
manufacturer, or from the Endpoint Encryption install CD in the \Tools directory.
NOTE: You should also note that some USB key tokens are in fact a combined USB Smart Card reader and
USB Device in one unit, therefore, you need to add USB CCID Smart Card reader support to your Endpoint
Encryption for PC clients for them to work. See the Token Compatibility section later in this chapter for
information on the tokens which are of this nature.
16 |
Using Tokens with Endpoint Encryption for PC
If all steps are followed, when you install Endpoint Encryption, or after the machines
synchronize, users will be able to log in using their new token.
NOTE: When learning how to use Endpoint Encryption, we advise you always leave at least one password‐
only user assigned to machines in case you make a mistake when setting up token support.
Storage tokens host around 1KB of data unique to the Endpoint Encryption
environment and user, on each token. They are configured within the Endpoint
Encryption Manager for the specific user before they can be used.
• The users key is not stored on the users machine, and is protected from brute
force attack by the microprocessor of the token
• Tokens can be used for other physical purposes, for example door access
systems
By using one of Endpoint Encryption’s certificate connectors, you can quickly make
your Endpoint Encryption enterprise aware of all certificate-holding users, and can
allow them to be allocated to computers using Endpoint Encryption for PC without
having to create new smart cards or other forms of token for them to use.
| 17
Using Tokens with Endpoint Encryption for PC
Endpoint Encryption has been tested with the following tokens and PKI environments –
more tokens and PKIs are being developed so if your environment is not listed, please
contact your Endpoint Encryption representative for the latest information.
Endpoint Encryption uses the information stored in the public certificate store of a PKI
to look up users and encrypt their unique key with the public key stored in their
certificate. This online process is handled transparently by one of the Endpoint
Encryption Connectors.
Once encrypted, Endpoint Encryption stores the information within its policy store, and
makes it available to all Endpoint Encryption-aware applications: for example, with
Endpoint Encryption for PC, the user’s key encrypted with their public key is stored on
each machine the user is assigned to. When a user tries to login, Endpoint Encryption
sends their encrypted user key to their token and asks it to be decrypted using the
private key stored on the token. The actual decryption happens securely within the
microprocessor of the token and only after the user has supplied the correct token PIN
or password. This ensures the user’s decryption key (private key) never has to leave
the token.
Once decrypted, the resulting user key can be used to authenticate the user.
You can see from this process that there is no need for Endpoint Encryption to have
prior experience, or to have stored anything on the users token. All the information
Endpoint Encryption needs to prepare the system can be obtained online through the
PKI certificate server.
Certificate Connectors
Setting up Certificate tokens is the responsibility of the Endpoint Encryption Certificate
connectors – these are available for both Active Directory and LDAP systems, and
more information on configuring them can be found in the Endpoint Encryption
Manager Administration Guide, in the Active Directory Connector and LDAP Connector
chapters.
The connectors can search AD and LDAP directories for users, and create them in
Endpoint Encryption based on certain criteria. The connectors can also monitor CRL
18 |
Using Tokens with Endpoint Encryption for PC
lists for revoked certificates, and also automatically handle the rollover of certificates
on expiry.
• Security Chip: TPM (TCG V1.2) with Infineon Package versions: InfineonTPM
Professional Package V2.5 and InfineonTPM Professional Package V2.5 SP1
Token Compatibility
Endpoint Encryption supports many tokens, but due to the pre-boot nature of Endpoint
Encryption for PC, not all tokens are supported in all environments. If you have a
specific token requirement, please contact your Endpoint Encryption representative for
the latest information. Please also see the token overview spreadsheet. Contact your
McAfee representative for further details.
Some USB key tokens are a combined USB Smart Card reader and USB Device in one
unit. You therefore need to add USB CCID Smart Card reader support to your Endpoint
Encryption for PC clients, to enable them to work.
| 19
Using Tokens with Endpoint Encryption for PC
• Pre-Boot Authentication
• Screensaver Authentication
NOTE: If you use TPM as a token for Endpoint Encryption Manager, ensure that the UserID is not used on
any other PC with a TPM. If it is, it will be locked to that PC from then on.
The embedded TPM chip, in its simplest form, can be envisaged as a smart card
physically attached to the motherboard of the PC. The TPM (Trusted Platform Module)
can perform similar cryptographic operations to PKI smart cards, such as encryption,
decryption, key generation, signing of data etc.
With the Endpoint Encryption TPM module, the TPM chip is used to secure a users
logon credentials. This means once initialized the users unique secret key is removed
from the Endpoint Encryption environment and secured by the TPM chip. The user
from this stage onwards will only be able to login to that particular machine.
Conversion from password mode to TPM mode is automatic and occurs as soon as the
user uses their account on a TPM protected machine. From activation onwards, that
Endpoint Encryption user will only be able to log into the machine on which the TPM
chip holds their keys.
Endpoint Encryption's TPM module also requires that the TPM be "initialized". This
involves creating the Endorsement Key, Storage Root Key and setting an Owner
password. If this is not done, Endpoint Encryption will find the TPM and try to convert
the user to use it at first logon, but the operation will fail and the user will not be able
to logon.
The TPM initialization process is performed by the Infineon software after you install it.
The TPM Chip must be enabled in the BIOS on the target PC.
20 |
Using Tokens with Endpoint Encryption for PC
The TPM has to be enabled in the BIOS (which it is not by default). Until it is enabled,
it is essentially not present as far as Endpoint Encryption and Infineon software is
concerned. If you try to install the Infineon software with TPM disabled, it will warn
you that the "Infineon TPM not found" and abort the install (exactly as it does on
machines without a TPM).
Endpoint Encryption has been tested with the following TPM Components:
- Version = 2.50.0771.00
1. From the system tray double-click the TPM icon or from Start Æ All
Programs Æ Infineon Security Platform solution Æ Manage Security
Platform.
5. When you have successfully created the TPM password, exit the application.
| 21
Using Tokens with Endpoint Encryption for PC
5. Click on the Files icon and select TPM Machine Chip. Apply these settings.
7. Right click on the new Endpoint Encryption user and select Properties.
8. Assign an Infineon Embedded TPM Chip to the user and apply these settings
(Note: the Configure option does not apply to the Puppy token).
4. When prompted to change the password, select the same password as the
Basic User password for the TPM.
5. After the PCs next boot, the password for the TPM will be the TPM Basic
User password.
6. Reboot the machine and logon at PBA by selecting the Sony Puppy token.
Recovery
When a user password recovery is performed Endpoint Encryption will reset the
password to the default ‘12345’ and will allow the user to login. The user will be
prompted to change the password. Select a new password and ensure that you change
the TPM password to the new one before rebooting the PC.
22 |
Using Tokens with Endpoint Encryption for PC
• Pre-Boot Authentication
• Screensaver Authentication
The Puppy allows two mode of operation: Fingerprint or Password. This means that if a
user fails to login using their fingerprint, they can do so using their password.
The following instructions detail how to enable Sony Puppy Support for a user. For this
you will need to have a new Sony Puppy or Reset an exsiting one using the Sony
Puppy Administration Tools.
2. Plug the Sony Puppy finger-print reader into an available USB Port.
5. When you have successfully created the Sony Puppy User and registered
your fingerprint(s) exit the application.
5. Click on the Files icon and select Sony Puppy Client Files.
7. Click on the Users tab and create a Endpoint Encryption user (Keep a note
of the UserID).
| 23
Using Tokens with Endpoint Encryption for PC
8. Right click on the new Endpoint Encryption user and select Properties.
9. Assign a Puppy token to the User and apply these settings. (Note: the
configure option does not work with the Puppy token).
3. Select Train Puppy from the menu. The logon screen will appear.
4. Select Use Endpoint Encryption Username and enter the User ID and
Password of the Endpoint Encryption user and click the Logon with
Password button. You will be asked to verify your fingerprint.
5. Place your finger on the reader and it should verify OK. The training is
complete. You may Reboot the machine and logon at PBA by selecting the
Sony Puppy token.
Step 1.
Create a user and assign their finger within the USB Phantom by running
SMCforUSB.exe (this is the USB Management utility):
1. Create user
24 |
Using Tokens with Endpoint Encryption for PC
Step 2.
1. From the Endpoint Encryption Manager create a user account for the user
name created in step 1.
2. Assign Endpoint Encryption for USB token to user (default token is password)
Note: The default in EEPC is to create a default password of 12345.
Step 3.
Step 4.
Create online installation set note: assign user or user group to the machine as part of
machine policy.
Step 5.
After the second reboot, the client should see the preboot authentication screen. This
will have the password and Endpoint Encryption for USB token options.
Step 7.
Select Endpoint Encryption for USB which should generate a Endpoint Encryption
Biometric challenge screen:
The standard Endpoint Encryption logon screen should appear which will require the
SAME user name to be entered as the one registered with the USB Phantom. At this
point you will need to enter the default Endpoint Encryption password of 12345 which
will marry the Endpoint Encryption for PC client with the USB phantom. This step has
completed the integration of Endpoint Encryption for PC with the USB phantom.
The PC should now boot into Windows. After rebooting the client you will be prompted
to authenticate via the USB Phantom biometric reader.
| 25
Using Tokens with Endpoint Encryption for PC
1. The Upek Protector Suite QL software must be installed and configured on the
client machine. The software can be found on the McAfee Endpoint Encryption
Tools download. Please consult your McAfee representative for further
information.
• Create a file group for the Upek token and import the token files:
SbTokenUpek.dll and SbTokenUpek.dlm. See the File Groups and
Management chapter for further information.
• The Upek file group must be assigned to the machine or machine group.
• The fingerprint reader must be assigned to a user or a user group. See the
user or user group Properties Æ Tokens screen.
3. The user logs onto the client machine using the Upek token module in
password mode.
4. The user will be presented with a dialog which will ask them to register their
fingerprints with Endpoint Encryption; the user configures the fingerprint
reader to work with one or more of their fingerprints.
5. From then on the user will need to authenticate to Endpoint Encryption with
their fingerprint instead of a password.
26 |
Creating and Configuring Machines
Each user machine periodically tries to connect to its parent directory to check that its
local configuration matches the centrally defined one. If there are any differences, the
local machine reconfigures itself to match. You can change any aspect of the
machine’s configuration centrally; these changes get applied to the machine the next
time it synchronizes.
Machines normally create their own object in the directory when Endpoint Encryption
first installs, this happens automatically if you use a Group Install Set (see the
Creating an Install Package chapter), but you can pre-create a “placeholder” object for
the machine, set a unique custom configuration for it, and then create an install set for
that object only.
Users are assigned to machines and machine groups. When the machine synchronizes
it compares its local user list with that in its Object Directory entry. Any changes are
made in real time, including disabling the current user if their account status becomes
removed or disabled.
Rename
This option changes the Endpoint Encryption name of the machine.
This does not affect the machines network name which can be seen from the General
Properties page.
| 27
Creating and Configuring Machines
Delete
This option deletes the machine entry – you will be given the opportunity to
“Permanently Delete” the machine, or to move the machine to the Recycle Bin (where
it can be later restored, if necessary).
Import Machines
This option imports a machine definition into the group - This definition could be from
a machine created using an Offline Install (see Offline Package Installs for further
information) or from an export from another database.
Export Configuration
This option exports the configuration information for a machine (.sdb file) which can
be used for diagnostic or troubleshooting tasks or for import into an alternate
database.
Force Synchronization
You can elect to force a machine (or group of machines), which are online to perform
immediate configuration synchronization. You would perhaps do this if you have
removed a user from a group (or disabled them) and it is imperative that they are
disabled immediately, or a user has a configuration issue that needs resolving.
To do this, select the machine (or machine group) in question, and use the "Force
Synchronization" option from the window menu or right-click menu. The Endpoint
Encryption Manager sends a short message to the machine in question (using its
stored DNS or IP address) telling it to perform an immediate synchronization to update
its policies.
If you "Force Sync" a machine that is not online, or refuses the request because
Endpoint Encryption is no longer installed, an error message is generated. If Endpoint
Encryption is already in the process of performing a configuration change on the
remote machine, the sync request is ignored.
Reboot Machine
You can select the “Reboot Machine” option to attempt to reboot one or many
machines – this sends a message to the machines in question telling them to perform
28 |
Creating and Configuring Machines
an immediate shutdown. Users may not be given enough time to save their work, so
this feature should be used with caution.
You can configure the messages and timeout of the reboot option by editing the
SCM.ini file, as explained in Endpoint Encryption Configuration Files chapter of this
guide.
There are some instances when Windows will prevent remote rebooting of a system,
e.g. while the screen-saver is active.
Lock Machine
You can remotely activate the screen saver on a given machine by using the “Lock
Machine” command. Both machines and groups of machines can be locked in this way.
Add Users
You can add a number of users to a collection of machines using this option – You can
select the machine, or combination of machines you want to add users to from a group
or search window.
View Audit
This option displays the audit for the machine. For more information see the Auditing
chapter.
Create Copy
Creates a new object based on the selected object.
Properties
This option displays the properties of the selected object.
Machine Groups
Description
You can enter a text description for a machine group, such as the physical location of
the machines.
| 29
Creating and Configuring Machines
General
Figure 6. Boot Protection and General Options
Boot Protection
The status of Endpoint Encryption can be set in one of four modes. Both the desired
and current protection status is shown.
Remove – Endpoint Encryption will decrypt and uninstall itself at the next
synchronization
Remove and Reboot – as above, with the addition that Endpoint Encryption
will automatically reboot the machine after uninstalling.
Note: If you select Remove and let the machine uninstall Endpoint Encryption, remember to delete the
entry from the directory, or, set the protection back to Enable before re‐installing Endpoint Encryption. If
you forget this, then as soon as the new install connects, it will remove itself again.
Description
This field allows you to enter a text description of the machine, such as its
specification, model or physical location.
30 |
Creating and Configuring Machines
Network Name
The machines logical network name - you can find and filter the Machine tree for the
machines name using the “Object/Filter” option.
Options
Windows Logon
NOTE: If the user’s Windows credentials are different from their Endpoint Encryption for PC credentials,
Endpoint Encryption stores the windows credentials the first time they are used. It may take two reboots
before the single sign on becomes active.
Require Endpoint Encryption re-logon – If the user logs out of Windows, Endpoint
Encryption will control the login box for the next login.
Automatically logon as boot user – If there are no stored Windows credentials for
the user, Endpoint Encryption tries to login to Windows with the user’s Endpoint
Encryption credentials.
Must Match Windows user name – If a users Endpoint Encryption and Windows
user ID’s do not match, no SSO credentials will be stored for the user if this option is
enabled. This prevents an administrators Windows credentials being associated with a
normal user’s Endpoint Encryption account in the case that the normal user logged in
at pre-boot, but then an administrator authenticated to Windows.
| 31
Creating and Configuring Machines
Booting
Allow Booting from the hard disk – If disabled, users will have to boot the machine
with a machine bootable token such as a Endpoint Encryption Floppy Disk. This adds
the additional security in that the machine is inaccessible without the token. NOTE:
This option is not available with Endpoint Encryption version 4.1 or later.
Virus Protection
Enable MBR Virus protection – Endpoint Encryption monitors boot sector activity,
and prevents any program writing to it. Endpoint Encryption also monitors the bios
signature to further prevent boot viruses.
NOTE: If you have this option enabled and you move a protected hard disk between two machines,
Endpoint Encryption will detect this as a possible virus and prevent the machine being used until a virus
reset has been performed. For information on this procedure, see the chapter on WinTech and SafeTech.
Miscellaneous
Do not display previous user name – Hides the ID of the last logged on user in all
Endpoint Encryption logon dialogs, and changes the “Incorrect Password” and
“Unknown User ID” error messages to a generic message.
Disable Checking for T - This option switches off the $autoboot$ user support on
this machine. If the machine has many users assigned, this option can speed up the
boot time.
Do not lock after AutoBoot is removed – normally Endpoint Encryption locks the
workstation if the current logged in user is removed, or disabled, as part of a
synchronization event. This is to prevent the machine being used in the event that
there is no current user. Switching this option on stops the autolock happening if the
$autoboot$ user is removed, and may be useful in the case of automated software
updates.
Disable Clearing of status log – Prevents users from clearing the Client side status
log.
32 |
Creating and Configuring Machines
Enable Boot Disk Compatibility – Some machines have BIOS code which mounts
USB disks as physical drives. This is an unusual mode of operation and means that
after Endpoint Encryption has finished it’s authentication, Windows will hang trying to
access the drive through the BIOS physical interface (because Endpoint Encryption is
also a 32 bit platform, it unloads all BIOS drives when it finishes). This option forces
the low-level Endpoint Encryption drivers to block access to disks other than the boot
disk meaning Windows will not detect these USB drives until the USB stack is
initialized. An alternate solution would be to unplug all USB drives before booting the
machine.
Always enable pre-boot USB support – This option forces the Endpoint Encryption
pre-boot code to always initialize the USB stack. Normally this option should not be
enabled as Endpoint Encryption will dynamically enable USB on demand.
Do Not Lock Workstation if no User is Authenticated – This option will stop the
client manager from locking the workstation after a synchronization if it finds there is
no current Endpoint Encryption user logged on, e.g. after the first synchronization
during the install or if the Endpoint Encryption user that is currently logged on is
removed.
Do Not Lock Workstation if User is Disabled – This prevents the client manager
from locking the workstation after a synchronization if the currently logged on
Endpoint Encryption user is disabled.
Encryption
| 33
Creating and Configuring Machines
Figure 7. Setting Drive Encryption
Before a machine has first synchronized with the Object Directory, or in the case of
the properties of a machine group, the Object Directory does not know what drives
and partitions are available to be encrypted. The Endpoint Encryption Manager
provides the ability to specify any partition name and elect to encrypt it.
Once the machine has synchronized, only the partitions present on it will be shown.
You can specify one of three encryption modes – “Full” encrypts the entire partition,
“Partial” encrypts only the first 10% of the drive, “None” leaves the drive in plain text
with no security. The “Last Reported Setting” can be used to verify if the machine has
applied recent configuration changes.
The “Last Reported Setting” for a drive is the exact state of encryption the last time
the machine reported to the Database.
NOTE: Partial encryption is designed to encrypt the directory structure and file allocation table on FAT
drives – it does not stop a competent hacker reassembling file data from the drive.
Encryption Mode
The Encryption Mode drop down menu lets you specify an encryption type for all drives
in a machine group:
This option allows you to manually select the encryption type for each drive
using the Full, Partial or None buttons.
This option will set all drives in the machine group to be partially encrypted.
This option will set all drives in the machine group to be fully encrypted.
Recovery key
You can boot a machine, or close the Endpoint Encryption screen saver without logging
on using the recovery process – this involves the user reading a small “challenge” of
18 characters from the machine to an administrator, then typing in a larger “response”
from the administrator. The recovery key size defines the exact length of this code
34 |
Creating and Configuring Machines
exchange. For more information see the Recovery Key chapter. A recovery key size of
“0” disables the machine recovery system.
Removable Devices
You can configure Endpoint Encryption for PC to also encrypt removable drives such as
USB/Firewire hard disks, Flash drives etc. Normally, Endpoint Encryption for PC only
protects physically attached hard disks, for example, IDE or SCSI hard disks. This is
because Endpoint Encryption for PC is related to the machine, not the user – it’s
impossible to share drives encrypted with Endpoint Encryption for PC between
different machines. If you need to share data amongst users and machines, please
consider using Endpoint Encryption for Files and Folders.
Users
Figure 8. Allowed Users
You can add groups of users, and individual users, to a machine (or machine group).
Either drag and drop the user(s) from the user tree into the machine properties User
tab, or, use the “user picker” to select them. Although Endpoint Encryption supports
many hundreds of users on a single machine, we STRONGLY recommend that the
actual number of users assigned is minimized to the fewest possible. Every user added
to a machine is another possible account for a hacker to gain entry. There is no
| 35
Creating and Configuring Machines
purpose in adding entire departments of users to laptops which are used by only one
person.
Auto-boot users
Special user IDs containing the name “$autoboot$” with a password of “12345” can be
used to auto-boot a protected machine. This option is useful if an auto boot of a
machine is needed; for example, when updating software using a distribution package
such as SMS or Zenworks. These IDs should be used with caution however, as they
effectively bypass the security of Endpoint Encryption.
Any ID containing the string “$autoboot$” can be used, for example, “my$autoboot$”,
“$autoboot$123” etc.
By using more than one ID, you can improve database performance if many machines
are synchronizing the $autoboot$ account at the same time.
The AutoBoot user is now ready. For further explanation of steps 5 and 6 see the
General section of Machine Configuration Options chapter.
You can also change the default password for the $autoboot$ accounts, to do so see
the section Autoboot.ini in Endpoint Encryption Configuration Files.
WARNING: It is quite possible to create a machine, or machine group, with no users assigned. If this
configuration is deployed then no one will be able to log on to that machine. To resolve this issue, use the
recovery “boot once” procedure, add some users to the machine in question, and then synchronize it again
to update the configuration.
36 |
Creating and Configuring Machines
Figure 9. Client Warning Text
Security Warning
Recovery Message
Text displayed to the user when they select the “Recover” button. This may include
information such as their help desk telephone number.
Synchronization Settings
Figure 10. Synchronization Settings
| 37
Creating and Configuring Machines
Endpoint Encryption machines try to keep their local configuration the same as their
central directory configuration; they do this by periodically synchronizing changes with
the Object Directory. The default behavior is to synchronize on boot, but further
options can be set.
Automatically Resynchronize
Endpoint Encryption tries to contact the Object Directory every specified number of
minutes. If the directory cannot be contacted, the sync sleeps until the next period.
By right clicking on the Endpoint Encryption tool tray icon, the user can force a
synchronization event by selecting the Synchronize option. This feature can be
disabled.
This option causes a synchronization event to occur if the user dials up to the internet
/ intranet. Endpoint Encryption checks for new RAS (Remote Access Service)
connections every second.
This option sets the local machine time to the time of the server / directory it is
synchronizing with. If the user’s machine is in a different time zone to the server, the
correct local time will be set as long as their time zone is correct.
WARNING: This option is useful when logon hour restrictions are in place – without this time check the
user could set their system clock back to gain extra hours of machine use.
This option stops Endpoint Encryption monitoring file group changes and deploying
updates to the remote machines.
This option allows an administrator initiate a synchronization event using the “Force
Sync” option. The Endpoint Encryption client sends its IP address to the Object
Directory each time it connects to enable the communication channel. The
communication port can be set between 0 and 65535. Note: The client IP will appear
in the Address field within the Synchronize settings screen of the machine’s Properties
screen.
38 |
Creating and Configuring Machines
If a machine does not connect to its server within the specified number of days, then
all accounts will become disabled. This option prevents users continuing to use
machines offline from the Endpoint Encryption Object Database for extended periods
of time. Also, if a machine is stolen or lost, you can be assured that it will disable itself
after the timeout has passed.
You can specify an optional offset and random offset for the initial boot sync. This may
speed up the machine, and will also ensure any network load created by “9am
syndrome” is distributed over a longer period of time. You can set a value of Zero for
the delay time, this disables the initial synchronization.
The synchronization settings take effect once Endpoint Encryption has connected and
picked up its policy from the central object directory. You can pre-set the parameters
that Endpoint Encryption will use while it is trying to establish the initial first time
connection through settings in the file SCM.ini. More information on this file can be
found in Endpoint Encryption Configuration Files.
Files
Figure 11. Client File Groups
Select which groups of files need to be deployed to the machine. Typically the
Endpoint Encryption Client File group is deployed, along with optional token and
language files.
Some file groups may not be displayed in the list - Only file groups with the property
“Client File Sets” will be show.
| 39
Creating and Configuring Machines
You can add your own file groups for deployment to the Endpoint Encryption Object
Database – see the following chapter for more information.
If your Endpoint Encryption user account has group permissions set, Some file groups
assigned to the machine may be outside your control - in this case they will be marked
as locked groups. To gain the ability to change them, remove any “Group”
administration restrictions on your account.
Screen Saver
Figure 12. Screen Saver Properties
Endpoint Encryption will take control over all screen savers, providing secure
authentication services. On Windows 2000, and XP, the “Windows Logon” options also
need to be configured.
This option allows the user to change the local screen saver properties.
If the current user’s token supports dynamic removal, e.g. a smart card or eToken,
then the screen saver will be activated if they remove the token from the machine.
This option sets the current selected screen saver to be the Endpoint Encryption
Screen Saver.
40 |
Creating and Configuring Machines
This option allows administrators with accounts on machines greater than the specified
admin level to unlock a screen saver that has locked by a different user. If this option
is not set, then only the user who locked the machine can unlock it.
This option sets the timeout period for the screen saver.
Boot
Figure 13 ‐ Boot Properties
Boot Manager
Switches on the built in pre-boot partition boot manager. Users can select which
primary partition on the hard disk they wish to boot.
You can control the display of the partitions which the user can select to via the file
“bootmanager.ini”. For information about this file, see the Endpoint Encryption
Configuration Files chapter of this guide.
This option allows you to select a period, which once it has expired, will cause the boot
manager to select the last used partition.
Graphics Mode
This menu allows you to specify the screen resolution for a machine or machines
within a group. The default option is “Default Graphics Mode” which supports
resolutions up to 1024x768. Note: if the selected mode is not supported on the
machine it will fall back to the default mode.
| 41
File Groups and Management
Figure 14. Endpoint Encryption File Groups
Endpoint Encryption for PC uses central collections of files, called Deploy Sets, to
manage what versions of files are used on remote Endpoint Encryption clients. When
an administrator updates a file in the central directory, all machines attached to that
Deploy Set automatically collect the new version of the file from the directory the next
time they synchronize. This mechanism can be used to update Endpoint Encryption
clients to future versions, or to manage any file on a Endpoint Encryption protected
machine - for instance, updating a virus database, or, a new version of an application.
You can assign multiple file sets to be used on each machine. Typically two are used,
the first for the core Endpoint Encryption files, the second for the language files. All
assigned sets are processed in the same way.
When the Endpoint Encryption Manager is installed, it automatically adds the entire
standard Endpoint Encryption administrator and client files into two core file groups:
Administration Center Files and Endpoint Encryption for PC 5 Client Files; it
also may create language sets, for example, English Language; two INI files -
ADMFILES.INI for the administrator files (determines the contents of the core groups)
and SBCLIENTFILESET.INI for the client files. These INI files can be edited to allow
custom collections of files to be quickly imported and then applied using the "Import
42 |
File Groups and Management
file list" menu option. For more information on ADMFILES.ini and SbClientFileSet.ini,
see the Endpoint Encryption Configuration Files chapter of this guide.
Other file sets created as standard include those to support login tokens, such as
smart card readers, and USB Key tokens.
Figure 15. File Group Content
You can specify the function of a file group by right-clicking it and selecting its
properties. Some file selection windows, for example the file selector for machines,
only display certain classes of file group (in this example, those marked as “Client
Files”).
Exporting Files
You can export a file group, or an individual file back to a directory. This may be
useful, for example if you have an out of date administration system driver and there
is an updated file in the Object Directory.
| 43
File Groups and Management
Deleting Files
You can delete individual files from a file set. In this case all machines that are
maintaining a link to the file through association will delete it from their local directory
at the next synchronization event.
Clients maintain a link to a particular file via its object id, not its name. If you delete a
file and re-import it, its id changes, clients will still delete the original and download
the new copy.
The name of the file is the actual name, which will be used when deploying the file on
the remote machine. The ID is the Object Directory object ID which is used as a
reference for the file from the client PC.
The version number is an incremental version of the file. When the file is updated, the
version is incremented. This is used by the clients to check whether an update is
needed. Other information such as the name of the user who imported the file and its
size may be shown.
Figure 16. File Properties, Advanced
File Types
Operating System
44 |
File Groups and Management
Because some files are only applicable to some operating system(s), the target
operating system(s) for the file must be selected. This is to prevent Windows NT
drivers being installed on Windows 98 machines, or windows 9x registry files being run
on Windows 2000 servers.
App ID
If you are installing file which is shared between multiple Endpoint Encryption
applications, you can specify this applications ID. This prevents one application from
installing files shared by another.
Update
| 45
Adding components to a Machine
46 |
Using Endpoint Encryption as a File Deploy System
When the Endpoint Encryption client performs synchronization, it compares its internal
file revision list with the revision of the files in the Object Directory. If any files have
been superseded (or are in the directory list but not in the local list), the Endpoint
Encryption downloads them.
The file type assigned in the Object Directory determines what happens to a file when
it is downloaded. The action can be summarized simply:
From the properties of the machine (or controlled machine group) you want to update,
check which file groups are assigned. The default file group is EEPC1: Endpoint
Encryption for PC 5.1.2 Client Files. You can create new file groups specifically for
your custom files and assign them to machines if you so wish.
1. Select the file group from step 1, and then use the Import Files option (right-
click inside the File Group window).
2. Select the new file you want to import, for example, "message.txt". Once
imported, select the new file and go to its Advanced Properties box.
Because we are importing a "Known" file type, the file location will be set
automatically to [appdir]. We will override this with the location we want to send the
file to, in this case c:\windows\desktop. We also want this file to be deployed on all
operating systems, so we check all the boxes.
| 47
Using Endpoint Encryption as a File Deploy System
Figure 17. Setting the new text file permissions.
Now, next time the machine synchronizes, it will notice the new file, and download it
into its c:\windows\desktop directory. If the file was defined as a type of Endpoint
Encryption or Windows Registry file, it would be applied. If it was marked as an
"Installation Executable", it would be run.
You can test this behavior by forcing the machine to resynchronize using either the
"Force Sync" option from the Endpoint Encryption Manager, or from the Endpoint
Encryption client tool tray Icon right-click menu.
The file "message.txt" should appear on the desktop, and the status window of the
client should reflect the change.
More information on the Endpoint Encryption file deployment mechanism can be found
in the File Groups and Management chapter.
48 |
Creating an Install Package
The Endpoint Encryption Manager compresses the files needed into a single self-
contained executable for ease of management. Deploy sets can be created for Machine
groups, and individual machines for both fully online, and temporary offline situations.
This chapter deals with creating the install package, for information on how to apply it,
see the Installing, Upgrading and Removing Endpoint Encryption for PC chapter.
Figure 18. Creating an Installation Set
For the second step you need to determine whether you expect the machine to be
online or offline at the time of install.
| 49
Creating an Install Package
Online Installs
Online installations expect the master Object Directory (the directory the administrator
is currently connected to) to be available via the LAN during the install process. Once
Endpoint Encryption for PC is installed, after the next boot, Endpoint Encryption will
contact the Object Directory and download all the configuration and object data for the
machine and users.
If a "placeholder" object for the machine name exists (a machine object created, but
not installed), it will use the configuration stored in that object. If no placeholder
exists, the machine will obtain its configuration from the machine group that the install
set was created for.
If the machine name is already used in the directory, and the existing machine is not a
“placeholder”, the new machine will append a four digit number to the end of its name
and install. For example, where a machine called “JSMACHINE” already exists, an
object “JSMACHINE0001” will be created.
NOTE: By editing the file scm.ini on the client before Endpoint Encryption is activated (i.e. after setup,
but before the first reboot) the group can be changed.
Offline Installs
If the machine is expected to be disconnected from the Endpoint Encryption Server
during the install, an "offline" install set can be created. In this case a "transport
directory" containing the necessary objects and configuration data will be included in
the deploy set. After local configuration, the transport directory will need to be re-
imported into the master directory before the machine can be recovered.
Selecting an Offline install mode allows the additional choice to include the "individual
objects" in the transport directory. If they are included, then all users and machines in
the set will be deployed with the transport directory (and therefore will be available
immediately, even before the machine connects back to the master directory). If they
are not included, then there will be no login prompt until the machine has performed
its first connection and brought down its user list.
NOTE: Until the transport directory containing the machine’s completed configuration is imported back
into the master directory, no connection or configuration of the client can be performed. Also, in the case
where the offline install set was created from a group, it will not be possible to recover the machine until it
has successfully synchronized with its master database. In the case where the offline install set was created
for an individual machine, or in the case of users, synchronization is not necessary for the machine to be
recovered.
50 |
Creating an Install Package
• User objects assigned to the group, and user objects assigned to machines in
that group.
If the group contains machines, the following items are included in the set:
| 51
Creating an Install Package
Figure 19. Selecting the Master Object Directory
Step 3 involves selecting the final Object Directory that the new client will
communicate with to synchronize configuration details. The default is the directory
that the administrator is currently using, but could be any directory the administrator
has access to. Usually the clients will access the Object Directory via a Endpoint
Encryption server, rather than locally.
Connections via a Endpoint Encryption Server have the category type called Remote.
You can specify multiple connection points for machines, if you have more than one
server defined.
You can also change the order that the client will look for servers, and enable
automatic random selection of servers by using the wizard.
NOTE: For information on setting up a Endpoint Encryption Server, see the Endpoint Encryption Manager
Guide.
52 |
Creating an Install Package
Figure 20. Saving the Install Set
In Step 4, you specified the location the completed install file will be saved to; also,
the directory on the client you wish Endpoint Encryption to be installed into.
Two options for the "visibility" of the set-up process can be set. Silent installs, for
example, do not give the user any visible display of the install process and are used in
automatic deployment environments, such as Microsoft SMS.
After the install file has been run on a client machine, it needs to be restarted before
Endpoint Encryption can be activated. An automatic restart option is included,
however, be aware if ”perform installation silently” and “automatically restart
machine” are enabled, the machine will restart with no user intervention - this may
cause users to lose work, for example, if they have open documents when this
process occurs.
| 53
Installing, Upgrading, and Removing Endpoint Encryption for PC
For information on creating install packages see the Creating an Install Package
chapter.
Once restarted, you must retrieve the file sbxferdb.sdb which needs to be imported
back into the master directory. For information on this procedure see the Creating an
Install Package chapter.
Once the transport directory has been imported into the master database; if there is a
network connection between the client and a Endpoint Encryption Server, you will be
able to remotely manage the machine. If you do not retrieve the transport directory,
then you will not be able to recover or reconfigure the machine.
If your machines are unable to connect to the master database after install, for
example, and you are working in a permanently disconnected environment, you may
want to retrieve the .sdb file AFTER encryption has finished – the status of encryption
will then be properly reflected in the master database. In the case of machines which
connect to the master database after offline install, this property will be automatically
updated during the sync process.
54 |
Installing, Upgrading, and Removing Endpoint Encryption for PC
3. You have to set the File Group Properties to Client files to have it available
under the Files section in the machine properties. Therefore right-click the file
group, choose Properties Æ Content and check the Client Files box. In
case of new language file groups you need to check client files and language
as properties.
4. Right-click the new group and select Import File Set. Select the file
SBClientFileSet.ini from the administration system directory (usually
c:\program files\sbadmin).
5. Deselect the Endpoint Encryption 5.x Client Files file set from the
machines you wish to upgrade, and select Endpoint Encryption 5.1x Client
Files instead. During the next synchronization, the machine will download the
latest files and code and apply the upgrade.
WARNING: The deselection of all old Endpoint Encryption file groups and the selection of all new
Endpoint Encryption file groups MUST be done at the same time, e.g. if you deselect the Endpoint
| 55
Installing, Upgrading, and Removing Endpoint Encryption for PC
Encryption 4.x Client Files and the English (British) KB/Language file group without selecting the new
Endpoint Encryption 5.x Client File groups then you risk corrupting your client.
If you have other options selected, such as the File Encryptor, or Token modules, be
sure to also deselect the v4 modules, and select the appropriate 5.x versions of these
as well.
6. For each machine you want to upgrade, deselect the machines current client
file set, and select the new 5.x file set you created in step 2.
2. Set Endpoint Encryption to either Remove or Remove and Reboot from the
machines General properties. The next time the machine synchronizes with
the database, it will remove all encryption and authentication,
3. Now, uninstall the Endpoint Encryption program files. If you simply want to
disable the Endpoint Encryption protection, set the Client to Disable instead.
56 |
Client Software
Client Software
The Endpoint Encryption Client connects to its Object Directory, or configuration store,
which may be on the same machine, a network drive, or, via the Endpoint Encryption
Server. It does this every time the machine boots and optionally at set time intervals
or when a RAS session is initiated.
Once connected to the directory, the Endpoint Encryption client uploads the latest
audit and password changes to the directory, and if necessary downloads any
configuration changes specified centrally.
Show Status
The configuration process within Endpoint Encryption is largely transparent to the
user. The only evidence of Endpoint Encryption working can be found from the status
menu available from Endpoint Encryption's tool tray icon
Figure 21. Endpoint Encryption Client Status Window
The Status window displays any on-going configuration tasks (such as encryption
processes) and status messages from the last directory connection.
| 57
Client Software
Synchronize
Endpoint Encryption tries to establish connection with its directory during the boot
process. In a situation where the directory is unavailable, for example - a notebook
user who is connecting via dial-up networking, the user can establish a connection at
any time, and select the Synchronize option to connect to a remote directory and
collect / upload changes.
For details of the supported functions within the Endpoint Encryption client, please see
the User and Machine configuration sections in the Endpoint Encryption Manager
Administration Guide, and also this guide.
Client Auditing
User events are audited locally and then transferred to the Object Directory as part of
the synchronization process. For more information on the events tracked see the
chapter on Auditing.
When the operating system starts, the Endpoint Encryption Configuration Manager
(SCM) runs and performs a logon to the operating system (if SSO is enabled). It then
attempts to contact the Object Directory using the Directory Manager - this can be
local or remote via a Endpoint Encryption Server and re-validates the user against any
changes that have been made between the last validation. Following this SCM
downloads and applies any configuration updates. This could include new user
accounts.
After a period of inactivity or a power event, SCM activates the screen saver locking
the user.
If the user logs out of the operating system, they may be required to authenticate to
Endpoint Encryption when they log back into windows.
58 |
Client Software
NOTE: You can change the logo displayed in the screen saver by adding a file called “logo.bmp” to the
Windows directory. You can also deploy logo.bmp using the File Update technology built into Endpoint
Encryption. You may find extra graphics on your Endpoint Encryption CD in the “tools” directory.
Users can start the screen saver through any of the normal Windows mechanisms, or
by double-clicking on the Endpoint Encryption tool tray icon.
There are a limited range of sounds which enable access to the basic logon. Other
options, e.g. About and Recovery screens are not accessible.
As the user tabs (or shitf-tabs) between controls, the pre-boot will emit various beep
sequences to indicate where they are. Other beep sequences will be used when an
error is displayed, when password timeouts are displayed and when a logon is
successful.
| 59
Client Software
OK button: beep-pause-beep-beep
Error: beep-pause-beep-beep-pause-beep
60 |
Windows Sign-on and SSO
If the user’s Windows id and password are different from their Endpoint Encryption id
and password, Endpoint Encryption stores the windows credentials the first time they
are used. It may take two boots before the single sign on becomes active.
Automatically logon as boot user – If there are no stored Windows credentials for
the user, Endpoint Encryption tries to login to Windows with the user’s Endpoint
Encryption credentials.
If you are using this option, it is important to ensure that the password template and
quality rules in Endpoint Encryption are identical, or more lenient than those in
| 61
Windows Sign-on and SSO
Windows, otherwise a failed password change may occur and the user will be reset to
“12345”.
Must Match Windows User Name – This option ensures the SSO details are only
captured in the situation that the user’s Endpoint Encryption and Windows IDs match.
If they are different, no SSO details will be stored.
In Windows VISTA Microsoft has replaced the original MSGINA (Graphical Identification
and Authentication) with a new method called Microsoft Credential Provider. Endpoint
Encryption has modified the Single Sign On architecture and implemented a Credential
Provider to communicate with Windows. We display each of the Endpoint Encryption
Tokens as a potential logon method. If you logon to Endpoint Encryption, you will be
asked for your Windows credentials only for the first time and Endpoint Encryption will
store the Windows Credentials securely within Endpoint Encryption. On subsequent
logon events, Endpoint Encryption will use the stored Windows credentials to logon.
You can find out more about Microsoft Vista Credential Providers from the Microsoft
MSDN Website:
http://msdn.microsoft.com/msdnmag/issues/07/01/CredentialProviders/default.aspx
8
For more information on Endpoint Encryption ini files, see the Endpoint Encryption
Configuration Files chapter of this guide. Also, see the Endpoint Encryption
Configuration Files chapter of this guide SBGina.ini if you wish to enable smartcard
based Single-Sign-On to Microsoft. Note: this feature is not supported under Vista.
First Boot
The first time a user starts their newly Endpoint Encryption protected machine,
Endpoint Encryption authenticates them at boot time. If successful, the operating
system starts.
Normally they would next presented with a Windows logon – if the Endpoint
Encryption Windows Logon architecture is fully activated, Endpoint Encryption will
automatically present the user’s stored SSO id and password to windows. If these
details are accepted, Endpoint Encryption stores a record of these credentials in a
special encrypted area of the user’s profile. If Windows fails the SSO credentials, for
62 |
Windows Sign-on and SSO
example, if they have not been set, Windows displays the standard login box and the
user is forced to enter their Windows id and password.
Again, once a valid login has taken place, Endpoint Encryption stores the correct
credentials in the user’s encrypted profile, which are uploaded to the central Object
Directory on the next synchronization.
Second Boot
The second and subsequent times the user starts the machine, they login to the
Endpoint Encryption boot screen, then Endpoint Encryption supplies the stored
Windows credentials to the Windows login box.
Re Logon
If a user chooses to “log off” windows, they would normally expect to see the standard
Windows logon box. Endpoint Encryption takes control of this in the same way as the
initial logon screen, forcing the next user to login with their Endpoint Encryption
credentials.
If you want to logon to Windows using a different account than your stored
credentials, they simply cancel the default login window, then clear the “Automatically
logon to Windows” box.
Once cleared, simply select the token you want to login with.
| 63
Auditing
Auditing
Introduction
Endpoint Encryption Endpoint Encryption for PC audits user, machine, and server
activity. By right-clicking on an object in the Endpoint Encryption Object Directory, you
can select the view audit function.
Audit trails are uploaded to the central directory each time a machine synchronizes.
Until that time the audit is cached internally in the encrypted Endpoint Encryption file
system. In SB4.1.1 and above, the last 3000 entries are cached locally; when the
limit is reached the oldest 300 entries are culled. The local audit will retain
approximately 2 years of normal operation before culling begins.
The permission to view or clear an audit log can be controlled on a user or group
basis. Both the administration level and administration function rights are checked
before allowing access to a log. For more information on setting these permissions see
the 12chapter.
Audit trails can be exported to a CDF file by using the “Audit” menu option, or by
right-clicking the trail and selecting “Export”. Also, the entire audit of the directory can
be exported using the “SBAdmCL” tool. For information on this option please contact
your Endpoint Encryption representative.
The Object Directory audit logs are open-ended, i.e. they continue to grow indefinitely,
but can be cleared on mass again using SBAdmCL.
Information Events
Description Event
Audit cleared 01000000
Boot started 01000001
Boot complete 01000002
64 |
Auditing
Description Event
Booted non‐secure 01000003
Backwards Date Change 01000005
Booted from floppy 01000004
Token battery low 01000010
Power fail 01000011
A virus was detected 01000013
Synchronization Event 01000014
Crypt Start 01000015
Crypt End 01000016
Add group 01000082
Add object 01000083
Delete group 01000084
Delete object 01000085
Import object 01000086
Export object 01000087
Export configuration 01000088
Update object 01000089
Import file set 01000090
Create token 01000091
Reset token 01000092
Export key 01000093
Recover 01000094
Create database 01000095
| 65
Auditing
Description Event
Reboot machine 01000096
Move Object between groups 01000098
Rename Object 01000099
Server started 010000C0
Server stopped 010000C1
Table 1. Information Audit Events
Try Events
Description Event
Logon attempt 02000001
Change password 02000002
Forced password change 02000003
Recovery started 02000016
Database logon attempt 02000081
Logon successful 04000001
Password changed successfully 04000002
Boot once recovery 04000016
Password reset 04000017
Password timeout 04000018
Lockout recovery 04000018
Change token recovery 04000019
Screen saver recovery 0400001A
Database logon successful 04000081
Logon failed 08000001
Password change failed 08000002
66 |
Auditing
Description Event
Password invalidated 08000005
Recovery failed 08000017
Database logon failed 08000081
Machine configuration expired Undefined
A virus was detected Undefined
Table 2. Try Audit Events
Succeed Events
Description Event
Logon successful 04000001
Password changed successfully 04000002
Boot once recovery 04000016
Password reset 04000017
Password timeout 04000018
Lockout recovery 04000018
Change token recovery 04000019
Screen saver recovery 0400001A
Database logon successful 04000081
Table 3. Succeed Audit Events
Failure Events
Description Event
Logon failed 08000001
Password change failed 08000002
Password invalidated (too many 08000005
incorrect attempts)
| 67
Auditing
Description Event
Machine configuration expired 08000012
Recovery failed 08000017
Database logon failed 08000081
Table 4. Failure Audit Events
68 |
Recovering Users and Machines
Warning: Recovery cannot be used for resetting or changing the pin codes of smart cards.
Offline Recovery
Resetting a remote user’s password or replacing their logon token if it has been lost
requires a challenge/response procedure to be followed. The user starts their machine,
cancels any logon dialogues that may appear; they must then click Options in the
bottom left-hand part of the screen followed by the Recovery option from the menu.
This process can be used at the boot screen, windows logon, or screen saver logon.
Figure 22. The user selects Machine Recovery or User Recovery
After (optionally) entering their user name, a set of codes is displayed on the user’s
screen. The user needs to telephone their helpdesk and read the codes to the
administrator. The user code is time based, and unique to the user and machine.
| 69
Recovering Users and Machines
Figure 23. Starting the recovery process
The administrator must log into the Endpoint Encryption Manager and select any
machine group. This will activate the Recovery button options on the toolbar and the
top menu. The administration should then click the Recovery button. Note: there is no
need to find the correct user beforehand.
The administrator will be prompted to enter the user code in the wizard, and if correct
will be given the opportunity to check the user’s profile if the administrator has
sufficient access rights to recover the user (based on their level and group
memberships). The administrator should use this opportunity to validate the user by
asking them questions based on the hidden information stored in their account. Only if
successful should the helpdesk actually allow the user’s password to be reset.
If the administrator is happy that the user on the telephone is legitimate, they can
proceed with the next step in recovery.
70 |
Recovering Users and Machines
Figure 24. Selecting the recovery option
The administrator selects the option they want to perform. If a user name was entered
a user recovery proceeds, if no user name was entered, then a machine recovery can
be performed.
Reset the user’s password – The user’s password is reset to the token default. The
user can then change this to a new password – This option will not function if the user
is disabled due to too many invalid passwords – to resolve this issue see “Change
Token”.
NOTE: Some tokens do not support password resets through Endpoint Encryption, examples of this include
the DataKey Smartcard, RSA Smartcard, and Aladdin eToken Pro. For information on how to reset the
password on these devices contact the appropriate manufacturer.
To recover an Endpoint Encryption user who has forgotten their password in this case, either issue them
with a new token, or temporarily switch them to use a password using the “Change Token” recovery option.
| 71
Recovering Users and Machines
Change the user’s token to – Changes or resets the user’s token to the one
specified. The administrator needs to have pre-generated the token for the user. If a
user has invalidated their password account through too many invalid attempts,
changing their token to “password only” recreates their “soft token” and allows them
to enter the default password again.
WARNING: If you change a user’s token using this method, remember that next time their machine
synchronizes with the Endpoint Encryption directory, their token will be set to whatever is specified in their
user properties stored currently in the database. If you want the change to be permanent remember to set
their token type in the user properties window.
Figure 25. User’s recovery code
The final step is to read the recovery code back to the user. The length of this code is
controlled by their token recovery key set in the user’s “token” properties, or in the
case of a machine, the recovery key set in the encryption properties.
The user simply enters the code line by line into the pre-boot dialog. Each line is check
summed. Once the code has been entered, the elected action will occur.
Local Recovery
The Local Recovery option allows the user to reset a forgotten password by answering
a set of security questions.
The full list of security questions is set by the administrator using the Endpoint
Encryption Manager. Note: Endpoint Encryption contains a generic set of questions.
When the user first sets up their local recovery feature they will be prompted to select
a number of questions and provide the answers to them. These form the basis for
their local self recovery feature.
72 |
Recovering Users and Machines
Figure 26 ‐ Setting the Local Recovery options
Selecting this check box will set Local Recovery for the specified user or user group.
This option determines how many questions the user must select to perform a Local
Recovery.
This option determines how many times a user can logon without setting their Local
Recovery questions and answers.
Add
The Add button will load the Local Self Recovery Question dialog box and allow you
to create a new question. You can also specify the language that question should be in
and the minimum number of characters the user must specify when configuring the
answer to this question.
Remove
The Remove button will remove a selected question from the list.
| 73
Recovering Users and Machines
Edit
The Edit button will allow you to edit the configuration of a selected question.
Apply
The Apply button will save any changes that have been made.
Restore
The Restore button will undo your changes and restore the Local Recovery options to
the previous settings (providing you have not clicked the Apply button).
When the user logs on, they will be prompted to specify a set of questions and
answers; this exercise is performed once only.
2. From the Local Recovery Enrollment screen, select a question from the
drop down list.
4. Click Next.
5. Repeat this process until you have answered all the questions. Note: the
Endpoint Encryption administrator will determine how many questions you
need to answer.
6. When you have answered all the questions click the Finish button. Local
Recovery is now set.
4. Enter your username into the User name field and click Next.
74 |
Recovering Users and Machines
5. Enter the answer to each question in turn, clicking the Next button to move
forward.
8. Select the Password Only Token option from the preboot screen.
Online Recovery
If a user’s machine is online when they forget their password or lose their token,
simply create a new token for them in the Endpoint Encryption directory, and force
sync their machine to make the appropriate change.
You can reset a user’s password by simply generating a new password token for them.
| 75
Trusted Applications
Trusted Applications
Endpoint Encryption’s client has the capability to restrict which applications and code
users will be allowed to run. Using this mechanism, you can restrict access for a few
users to certain applications, or, prevent users running any applications that are not
pre-defined.
With this system you can apply untrusted control, for example, to prevent access to
pre-defined tools such as “regedit.exe” for all but administrators. With untrusted
control, unknown applications are allowed to run - known applications are blocked.
You can also apply trusted control where ONLY pre-defined code can run, and
unknown control is blocked. This is useful, for example, when you want to restrict an
entire build image so it becomes impossible for users to run any application other than
the ones distributed in the “gold build”.
Endpoint Encryption application control takes effect once a user has logged into
Windows – it does not affect code run in the context of booting the operating system.
To prevent applications and code being run at this stage Endpoint Encryption
recommends appropriate operating system security settings be used, for example,
disallowing device driver updates etc.
Hash Sets
The first step in applying application control to Endpoint Encryption users is to create
sets of “hashes” for the code modules using the Endpoint Encryption Hash Generator
(see the Hash Generator chapter).
A hash set contains a unique digital signature for each file in the scope of the set. This
digital signature is unique to the file – no two files will ever have the same signature.
When Endpoint Encryption applies control to applications, it calculates the “hash” of
the code (.exe file, .dll etc) that the user is trying to run, and compares it to the list of
hashes applied to the user. The actual location of the code does not matter, only its
content - so, if a user moves a restricted application to another directory, it will still be
blocked.
After creating a hash set for the files or directories containing the sample code
modules you can create an “Endpoint Encryption Hashes Group” in the Endpoint
Encryption database to contain them. Within the group, create new hashes objects to
contain your hash sets created previously.
76 |
Trusted Applications
Figure 27. Hash Group
Displays the number of file hashes stored in this object. You can remove duplicates
using the File Hashes/Compact function.
Description
File Hashes
Import
Allows you to import one or many hash sets created with the Endpoint Encryption
Hash Generator into this hash object.
Export
Compact
Removes duplicate entries from this hash object – As Endpoint Encryption Application
Control is driven by the hash (or digital signature) of a file, not its location, only one
entry per file is required.
Remove
The option removes a single file entry from this hash object.
WARNING: You can add entries only by importing hash files.
| 77
Trusted Applications
You can specify one of two modes of application control – “Untrusted” and “Trusted”:-
Untrusted
In the case of untrusted control, if the hash is known then the code is prevented from
running.
Trusted
In the case of trusted control, if the code is know it is allowed to run, whereas all
unknown code is blocked.
Known Applications Unknown Applications
Table 5. Trusted Application Logic
You can also set whether to actually block the untrusted code, or to simply log it for
future analysis – this option (log with no blocking) is useful when debugging hash sets
which do not block appropriately.
78 |
Hash Generator
Hash Generator
Introduction
Endpoint Encryption Hash Generator creates “Hash Sets” for use with the application
control feature of Endpoint Encryption. For more information on application control,
see the Using Hash Sets section.
The generator creates MD5 hashes of the selected files and packages them into an
Endpoint Encryption hash set (HSH file).
After selecting the output file name, add the files (or folders) you want to include in
the hash set. Finally, select Hash – the specified HSH file will be generated.
The progress window shows the activity. Once completed, you can import the resultant
hash set into your Endpoint Encryption directory.
| 79
Common Criteria EAL4 Mode Operation
Administrator Guidance
• Endpoint Encryption must be installed using the Endpoint Encryption AES
(FIPS) 256bit algorithm.
To comply with CC regulations, these policy settings must be applied before installing
any clients.
• There must be a system in place for maintaining secure backups that are
separately encrypted or physically protected to ensure data security is not
compromised through theft of, or unauthorized access to, backup information.
80 |
Common Criteria EAL4 Mode Operation
• Administrators should ensure their users are fully trained in the use of the
Endpoint Encryption for PC Client software as described in the Client Software
chapter of this guide, and should remind them of the security procedures
detailed in the User Guidance Below.
User Guidance
• Users must maintain the confidentiality of their logon credentials, such as
passwords and tokens.
• Users must be informed of the process that they need to go through to contact
their administrator in the event that they need to recover their PC, if, for
example, they forget their password, or, their user account becomes disabled;
this could be through the actions of the administrator or repeated incorrect
login attempts.
http://www.cesg.gov.uk/products_services/iacs/cc_and_itsec/media/certreps/
CRP227.pdf
http://csrc.nist.gov/cryptval/aes/aesval.html
1
| 81
Common Criteria EAL4 Mode Operation
SHA1
Cert 71 and 254
http://csrc.nist.gov/cryptval/shs/shaval.htm
1
DSA/DSS
DSS cert 53 and 112 Sig(ver) Mod(all)
http://csrc.nist.gov/cryptval/dss/dsaval.htm
1
RNG
Cert 15 AES, DSA., SHA, RNG on AMD Athalon XP, Windows XP SP1, PentiumIII
Windows 2000
http://csrc.nist.gov/cryptval/rng/rngval.html
1
DES
http://csrc.nist.gov/cryptval/des/desval.html
82 |
Endpoint Encryption Configuration Files
sbgina.ini
Used by the Endpoint Encryption for PC client to control the Windows logon
mechanism. SBGina.ini contains the references used to populate the user id, password
and domain boxes of a login dialog, and also the id of the Ok button.
The Trace option is an aid to implementing SSO to further dialogs. If this option is set
to "Yes", then information about every window that is created during the logon
process is output to the defined trace file.
If you want to activate smart card based single sign on with the possibility to pass
through the smart card PIN to Windows you will need to add the [Smartcard] section
as specified in the example below:
[Global]
;Version 5110
;
; This option is an aid to implementing SSO to further dialogs. If this
option
; is set to "Yes", then information about every window that is created when
; a logon dialog is expected is saved to the file specified (or
"LOGONWND.TXT"
; if not supplied). Note the file will always be in the SafeBoot directory.
;
Trace.LogonWindowInfo=No
Trace.FileName=LOGONWND.TXT
;
; This is an option (NT only) that controls the behaviour of SafeBoot's Gina
; when unlocking a locked workstation. The possible values are
;
; SbOnly = only a SafeBoot logon is used (the
default)
;
; SbWindowsSso = a SafeBoot logon is required then SSO is
atempted
; to the original Gina.
;
;Option.UnlockWorkstationMode=SbOnly
;
; This options (NT only) controls the ability of the user to cancel the
; Windows SSO attempt from the SafeBoot logon dialog. Possible values are
;
; Yes - Allows the user to cancel the SSO attempt (the default)
;
| 83
Endpoint Encryption Configuration Files
;
; These options control how the user names are treated when they are
compared.
; The UPN (User Principal Name) format is of the form [email protected]. To
; successfully compare the user names, the format needs to be the same for
; both the Windows and SafeBoot names.
;
; Note that Windows will always supply the user name to the SafeBoot Gina
; module as a user name and domain name (i.e. not DNS name).
;
; If the DetectUPN option is set to "Yes", then SafeBoot will attempt if the
; user names are in UPN format by looking for an "@" character. If this is
; set to any other value, SafeBoot will not manipulate the user names in any
; way.
;
; Examples:-
;
; SB user name = "[email protected]"
; Windows user name = "user"
; Windows domain = "domain"
;
; Comparision will be between SB="user" and Win="user".
;
; SB user name = "user"
; Windows user name = "[email protected]"
; Windows domain = "domain"
;
; Comparision will be between SB="user" and Win="user".
;
; SB user name = "[email protected]"
; Windows user name = "[email protected]"
; Windows domain = "domain"
;
; Comparision will be between SB="user" and Win="user".
;
;Option.Username.DetectUPN=Yes
[SmartCard]
;
; This option enables looking for smart cards used for Windows logon. It
; can be either "On" or "Off". If this is set to "On", the SB Gina will
; attempt to detect the presence of a smart card and allow the user to
; choose to logon with the smart card or with the standard user name and
; password.
;
;Enabled=Off
;
; If the smart card check is enabled, then this option can be used to force
; the use of smart cards or the standard password. This can be "Off" to
; automatically determine which to use, "Pin" to force the use of a smart
; card or "Pwd" to force the use fo a smart card.
;
;Force=Off
;
: This options controls the number of seconds the gina will wait for the
; user to decide which logon method to use (smart card or password). If this
; is set to a zero, then the user will not be prompted at all.
84 |
Endpoint Encryption Configuration Files
;
;TimeoutSecs=5
;
; This option controls whether the SafeBoot SSO detsils are updated when
; the user logs on with a smart card. If this is set to "No", then the SSO
; details are not changed if the user logs on with a smart card. This will
; prevent the smart card PIN being used as to automatically logon to Windows.
;
;EnableSso=Yes
;
; If this option is set to "Yes", then if a smart card is inserted when
; a user logs off and back on again, the SafeBoot logon will not be displayed
; even if it is set to do so in the configuration. If a smart card is not
; present, then the SafeBoot logon will be displayed.
;
;DontSbRelogonIfSc=No
[Windows.NT.Logon]
;
; Lists all the sections that contain information about the logon windows for
; the NT derived versions of Windows (NT4/2000/XP).
;
; The keys should be of the form "Window" with an incrementing number
appended.
; The sections are checked in incrementing numerical order. The numbering
; cannot contain any gaps.
;
Window1=MSGina.NT4.LogonDialog
Window2=MSGina.W2K.LogonDialog
Window3=MSGina.XP.LogonDialog
Window4=MSGina.WIN2003.LogonDialog
Window5=NWGina.NT.LogonDialog
Window6=NWGinaJP.NT.LogonDialog
Window7=FSSGina.XP.LogonDialog
Window8=CSGina.W2K.LogonDialog
Window9=CSCOGina.W2K.LogonDialog
Window10=ODYGINA.W2K.LogonDialog
Window11=PRM_GINA.XP.LogonDialog
Window12=IPASS.XP.LogonDialog
Window13=TRYIT.XP.LogonDialog
[Windows.NT.Locked]
;
; Lists all the sections that contain information about the workstation
locked
; logon windows for the NT derived versions of Windows (NT4/2000/XP).
;
; The keys should be of the form "Window" with an incrementing number
appended.
; The sections are checked in incrementing numerical order. The numbering
; cannot contain any gaps.
;
Window1=MSGina.XP.LockedDialog
Window2=FSSGina.XP.LockedDialog
[Windows.9x.Logon]
;
; Lists all the sections that contain information about the logon windows for
; the Windows 9x versions of Windows (95/98/ME).
;
| 85
Endpoint Encryption Configuration Files
;----------------------------------------------------------------------------
; The logon window definition sections for NT/W2K/XP
;
[MSGina.NT4.LogonDialog]
;
; The operating system version to which this section applies. You can specify
; the value of "Any" for either field (which is the default if not
specified).
;
OS.MajorVersion=4
OS.MinorVersion=Any
;
; The original DLL to which this section applies. If the name is not
; specified or set to "Any", all original DLLs match. If any part of the
; for digit file version is set to "x", then then all values for that
; component are matched (e.g. 4.1.0.x).
;
OrigDll.Name=MSGINA.DLL
OrigDll.FileVersion=x.x.x.x
;
; Specifies information about the window that we can use to indentifiy it.
; For both the class and title, setting a value of "Any" will match any
; window. Starting the value with a "*" means the remainder of the value
; is treayed as a substring, and hence if it occurs anywhere in the window
; title/class it is matched. Otherwise the whole value must match (case
; insensitive).
;
Window.Title=Any
Window.Class=#32770
;
; The control identifiers of controls that are used by the SSO module to
; simulate logons.
;
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=1453
Dlg.CtrlId.Password=1454
Dlg.CtrlId.Domain=1455
;
; Optional entries which list up to 10 IDs that must come before the ID
; specified above and up to 10 IDs that must come after. The IDs are
specified
; as a comma-seperated list.
;
;Option.CtrlId.OK.Preceeding=1,2,3
;Option.CtrlId.OK.Following=5,6,7
;Option.CtrlId.UserName.Preceeding=1,2,3
;Option.CtrlId.UserName.Following=5,6,7
86 |
Endpoint Encryption Configuration Files
;Option.CtrlId.Password.Preceeding=1,2,3
;Option.CtrlId.Password.Following=5,6,7
;Option.CtrlId.Domain.Preceeding=2204,2203
;Option.CtrlId.Domain.Following=5,6,7
;
; If this is set to "Yes" then the user/password fields are captured from the
; dialog box rather than using the values supplied by the original gina.
;
Option.CaptureFromDlg=Yes
;
; These options define how text is entered into the various fields when
; simulating a logon. Mode 0 sets the text directly into the controls, while
; mode 1 sends characters one at a time (simulating pressing keys) and mode 2
; selects from a combo box.
;
Option.EntryMode.UserName=0
Option.EntryMode.Password=0
Option.EntryMode.Domain=2
[MSGina.W2K.LogonDialog]
OS.MajorVersion=5
OS.MinorVersion=0
OrigDll.Name=MSGINA.DLL
Window.Title=Any
Window.Class=#32770
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=1502
Dlg.CtrlId.Password=1503
Dlg.CtrlId.Domain=1504
Option.CaptureFromDlg=No
Option.EntryMode.UserName=0
Option.EntryMode.Password=0
Option.EntryMode.Domain=2
[CSCOGINA.W2K.LogonDialog]
;This section for Ciscos Gina for Windows 2000 which is the same as the
standard one, but
;has a different extention.
OS.MajorVersion=5
OS.MinorVersion=0
OrigDll.Name=CSCOGINA.DLL
Window.Title=Any
Window.Class=#32770
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=1502
Dlg.CtrlId.Password=1503
Dlg.CtrlId.Domain=1504
Option.CaptureFromDlg=No
Option.EntryMode.UserName=0
Option.EntryMode.Password=0
Option.EntryMode.Domain=2
[ODYGINA.W2K.LogonDialog]
OS.MajorVersion=5
OS.MinorVersion=0
OrigDll.Name=ODYGINA.DLL
Window.Title=Any
Window.Class=#32770
Dlg.CtrlId.OK=1
| 87
Endpoint Encryption Configuration Files
Dlg.CtrlId.UserName=1502
Dlg.CtrlId.Password=1503
Dlg.CtrlId.Domain=1504
Option.CaptureFromDlg=No
Option.EntryMode.UserName=0
Option.EntryMode.Password=0
Option.EntryMode.Domain=2
[PRM_GINA.XP.LogonDialog]
OS.MajorVersion=5
OS.MinorVersion=1
OrigDll.Name=PRM_GINA.DLL
Window.Title=Any
Window.Class=#32770
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=1502
Dlg.CtrlId.Password=1503
Dlg.CtrlId.Domain=1504
Option.CaptureFromDlg=No
Option.EntryMode.UserName=0
Option.EntryMode.Password=0
Option.EntryMode.Domain=2
[CSGina.W2K.LogonDialog]
;This section for Ciscos Gina for Windows 2000 which is the same as the
standard one, but
;has a different extention.
OS.MajorVersion=5
OS.MinorVersion=0
OrigDll.Name=CSGINA.DLL
Window.Title=Any
Window.Class=#32770
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=1502
Dlg.CtrlId.Password=1503
Dlg.CtrlId.Domain=1504
Option.CaptureFromDlg=No
Option.EntryMode.UserName=0
Option.EntryMode.Password=0
Option.EntryMode.Domain=2
[MSGina.XP.LogonDialog]
OS.MajorVersion=5
OS.MinorVersion=01
OrigDll.Name=MSGINA.DLL
Window.Title=Any
Window.Class=#32770
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=1502
Dlg.CtrlId.Password=1503
Dlg.CtrlId.Domain=1504
Option.CaptureFromDlg=Yes
Option.EntryMode.UserName=0
Option.EntryMode.Password=0
Option.EntryMode.Domain=2
[IPASS.XP.LogonDialog]
OS.MajorVersion=5
OS.MinorVersion=1
OrigDll.Name=ipgina.dll
Window.Title=Any
88 |
Endpoint Encryption Configuration Files
Window.Class=#32770
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=1502
Dlg.CtrlId.Password=1503
Dlg.CtrlId.Domain=1504
Option.CaptureFromDlg=No
Option.EntryMode.UserName=0
Option.EntryMode.Password=0
Option.EntryMode.Domain=2
[MSGina.XP.LockedDialog]
OS.MajorVersion=5
OS.MinorVersion=01
OrigDll.Name=MSGINA.DLL
Window.Title=Any
Window.Class=#32770
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=1953
Dlg.CtrlId.Password=1954
Dlg.CtrlId.Domain=1956
Option.CaptureFromDlg=Yes
Option.EntryMode.UserName=0
Option.EntryMode.Password=0
Option.EntryMode.Domain=2
[MSGina.WIN2003.LogonDialog]
OS.MajorVersion=5
OS.MinorVersion=02
OrigDll.Name=MSGINA.DLL
Window.Title=Any
Window.Class=#32770
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=1502
Dlg.CtrlId.Password=1503
Dlg.CtrlId.Domain=1504
Option.CaptureFromDlg=Yes
Option.EntryMode.UserName=0
Option.EntryMode.Password=0
Option.EntryMode.Domain=2
[NWGina.NT.LogonDialog]
OS.MajorVersion=Any
OS.MinorVersion=Any
OrigDll.Name=NWGINA.DLL
OrigDll.FileVersion=x.x.x.x
Window.Title=Any
| 89
Endpoint Encryption Configuration Files
Window.Class=#32770
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=1202
Dlg.CtrlId.Password=1204
Dlg.CtrlId.Domain=1001
Option.CaptureFromDlg=Yes
Option.EntryMode.UserName=0
Option.EntryMode.Password=1
Option.EntryMode.Domain=2
Option.CtrlId.UserName.Preceeding=1201
Option.CtrlId.Password.Preceeding=1203
Option.CtrlId.Domain.Preceeding=2204,2203
[NWGinaJP.NT.LogonDialog]
OS.MajorVersion=Any
OS.MinorVersion=Any
OrigDll.Name=NWGINA.DLL
OrigDll.FileVersion=x.x.x.x
Window.Title=Any
Window.Class=#32770
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=3002
Dlg.CtrlId.Password=3004
Dlg.CtrlId.Domain=1001
Option.CaptureFromDlg=Yes
Option.EntryMode.UserName=0
Option.EntryMode.Password=1
Option.EntryMode.Domain=2
[FSSGina.XP.LogonDialog]
OS.MajorVersion=5
OS.MinorVersion=01
OrigDll.Name=FSSGINA.DLL
Window.Title=Any
Window.Class=Any
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=0
Dlg.CtrlId.Password=1001
Dlg.CtrlId.Domain=0
Option.CaptureFromDlg=Yes
Option.EntryMode.UserName=0
Option.EntryMode.Password=1
Option.EntryMode.Domain=2
[FSSGina.XP.LockedDialog]
;This Section for Macnica specifc FSS Gina
OS.MajorVersion=5
OS.MinorVersion=01
OrigDll.Name=FSSGINA.DLL
Window.Title=Any
Window.Class=Any
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=0
Dlg.CtrlId.Password=1001
Dlg.CtrlId.Domain=0
Option.CaptureFromDlg=Yes
Option.EntryMode.UserName=0
Option.EntryMode.Password=1
Option.EntryMode.Domain=2
90 |
Endpoint Encryption Configuration Files
;----------------------------------------------------------------------------
; The logon window definition sections for Win9x/ME
;
[MSNP.9x.LogonDialog]
OS.MajorVersion=4
OS.MinorVersion=Any
OrigDll.Name=MSNP32.DLL
OrigDll.FileVersion=x.x.x.x
Window.Title=Any
Window.Class=#32770
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=21
Dlg.CtrlId.Password=23
Dlg.CtrlId.Domain=25
Option.CaptureFromDlg=Yes
Option.EntryMode.UserName=0
Option.EntryMode.Password=0
Option.EntryMode.Domain=0
[NWNP.9x.LogonDialog]
OS.MajorVersion=4
OS.MinorVersion=Any
OrigDll.Name=NOVELLNP.DLL
OrigDll.FileVersion=x.x.x.x
Window.Title=Any
Window.Class=#32770
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=1202
Dlg.CtrlId.Password=1204
Dlg.CtrlId.Domain=1001
Option.CaptureFromDlg=Yes
Option.EntryMode.UserName=0
Option.EntryMode.Password=1
Option.EntryMode.Domain=0
[NWNPJP.9x.LogonDialog]
OS.MajorVersion=4
OS.MinorVersion=Any
OrigDll.Name=NOVELLNP.DLL
OrigDll.FileVersion=x.x.x.x
Window.Title=Any
Window.Class=#32770
Dlg.CtrlId.OK=1
Dlg.CtrlId.UserName=3002
Dlg.CtrlId.Password=3004
Dlg.CtrlId.Domain=1001
Option.CaptureFromDlg=Yes
Option.EntryMode.UserName=0
Option.EntryMode.Password=1
Option.EntryMode.Domain=0
sberrors.ini
This file is used to increase the detail available in on-screen error messages. You can
add further descriptions to errors by amending this file.
| 91
Endpoint Encryption Configuration Files
sbhelp.ini
This file is used to match on-screen windows to their help file sections.
sbfeatur.ini
This file controls the feature set available to Endpoint Encryption. This file is digitally
signed by the Endpoint Encryption team and must not be modified.
scm.ini
Configuration manager file, controls options such as which directory to connect to, and
which group to install into.
[Install]
GroupID=the ID of the group this machine will relate to
[Databases]
DatabaseID1=1
TryLastGoodFirst=Yes
LastGoodConnection=1
[Uninstall]
Sbsetup.exe=sbsetup.exe
You can specify the maximum number of lines to hold in the SCMLOG.txt file using the
following parameters. If scmlog reaches a size of beyond 10,000 lines, performance of
your machine can suffer.
[Log]
MaxSize=number of KB keep in log (128).
PurgeSize=number of KB to delete when log reaches MaxSize (16).
You can specify the pre-configuration connection behavior by setting the following
parameters
[Defaults]
;this section defines settings that apply before the SafeBoot is
;actually active on the machine.
minutes
SynchInterval=0 ; time between automatically retrying synch
You can turn on tracing of the Endpoint Encryption client with the following section.
Trace is output to SBCM.log in the same directory of the application.
[Debug]
Trace=1 ;Trace activity, 1 = on, 0 = off
You can set a message to be displayed and a timeout when an administrator performs
a remote shutdown of the client (using the machine/Reboot menu option).
[Reboot]
Message=some text to display
Timeout=10 (seconds)
92 |
Endpoint Encryption Configuration Files
[disk]
Sbfs.defaultsize=10 ;Default size of SafeBoot.FS (in
MB)
Install.clearcryptlist=1(0) ;Determines whether to clear the
cryptlist
[boot]
Hookflags=… ;Internal use only –
do not change.
defscm.ini
You can pre-set parameters used in the SCM.ini file created within install sets by
creating a file “defscm.ini” in the Administration system directory containing the lines
and sections you want to pre-define. defscm.ini is used as a seed to create the unique
scm.ini file for the install set.
sdmcfg.ini
This file is used by the Endpoint Encryption Client to control the connection to the
Object Directory. There may be many connections listed in the file, the multi-
connection behavior is controlled through scm.ini.
[Databases]
Database1=192.168.20.57
The ip address for
the remote server.
This can be a DNS
name.
[Database1]
Description=SH-DELL-W2K
IsLocal=No
Authenticate=Yes
Port=5555
ServerKey=…
The public key for
the remote
Server. This is
used to stop a
hacker putting a
rogue server in
place and
intercepting the
traffic.
ExtraInfo=…
Padding for the
| 93
Endpoint Encryption Configuration Files
serverkey.
TrivialPwds.dat
This file provides a dictionary of forbidden passwords. Simply create a Unicode text
file, with one password per line, and deploy it to the client machines. You need to
enable the user template option “no simple passwords”
NOTE: It is more effective to restrict passwords using a template which insists on numeric or special
characters, rather than supply a long list of forbidden words.
Bootcode.ini
Bootcode.ini defines the behaviour of the Endpoint Encryption pre-boot environment.
This file is not commonly modified by the end user as it is a system only file. The file is
stored in Endpoint Encryption’s pre-boot environment in the \boot directory.
[TokenSelect]
; the token type id of the last token the user selected.
Default=0x01000000
[Locale]
;
; the user selected language to use (reference a key in the [Languages]
section
; of the \Locale\Locale.ini file).
;
Language=EnglishUS
;
; the user selected keyboard to use (reference a key in the [Keyboards]
section
; of the \Locale\Locale.ini file).
;
Keyboard=US
[Audit]
;
; The maximum alllowed audit events
;
MaxEvents=3000
;
; The number of events to remove when the maximum is reached
;
PurgeCount=300
BootManager.INI
This file controls the partition names specified when the Endpoint Encryption Boot
Manager is enabled. The file is stored in Endpoint Encryption’s pre-boot environment in
the \boot directory.
[Partition.Names]
Partition0=My secure partition
Partition1=My Insecure partition
94 |
Endpoint Encryption Configuration Files
Errors.XML
This is an XML version of SBErrors.ini to allow Unicode translation. Endpoint Encryption
for PC uses SBErrors.XML instead of SBErrors.ini if both exist.
AutoBoot.ini
The autoboot.ini file allows you to set a unique default password for the $autoboot$
user(s). The file is created in the [appdir]\Boot directory in the following format:
[AutoBoot]
Password=mypassword
SbClientFileSet.ini
The SbClientFileSet.ini file is used to define what files are imported into the database.
SBWinLogonOpts.XML
This file can be used to exclude users from single-sign-on logon, e.g. VMware user
accounts can overwrite the single-sign-on even though the “Must Match the Window
user name” option has been selected.
- <SafeBoot>
- <SetSbPwd>
- <Exclusions>
<User name="__Vmware_User__" />
</Exclusions>
</SetSbPwd>
</SafeBoot>
SBCP.INI
Microsoft has introduced a new logon method for the Vista operating system: a
credential provider (CP) that will replace the MSGina.dll. This CP works differently to
the MSGina, for example, each credential provider, rather than be cascaded, can be
active next to each other. If you enable the Require Endpoint Encryption logon
option in the Machine Æ General Æ Windows Logon options, then the Endpoint
Encryption credential provider is activated on the client's Windows logon; be aware
that all other credential providers will also be available.
The SBCP.ini activates the CP. If a customer requires another CP to run in parallel,
this can be defined in the SbCp.ini (in the Endpoint Encryption client directory).
[CredentialProvider.Filter]
DefaultAction=Enable
If you want to enable/disable specific credential providers, then add entries to the
section [CredentialProvider.Filter.Providers] containing the credential provider's
| 95
Endpoint Encryption Configuration Files
GUID on the left and either "Enable" or "Disable" on the right. For example, to enable
just MS password credential provider you would add:
[CredentialProvider.Filter]
DefaultAction=Disable
[CredentialProvider.Filter.Providers]
{6f45dc1e-5384-457a-bc13-2cd81b0d28ed}=Enable
The content of this section will determine what appears in the logon dialog box. See
example below.
[WindowsCredentials.Domains]
;
; Lists the domains to be added to the domain list. Note that the left
side of the equals can be any value - it is ignored (of course it must be
unique for this section).
;
1=MyDomain1
2=MyDomain2
3=MyDomain3
[WindowsCredentials.Options]
;
; Set this to "No" to prevent the local computer name automatically being
added to the list of domains.
;
AddLocalComputerToDomains=Yes
;
; Sets the domain to select as the default. If this is not specified, the
current domain for the system is selected if there is one or the local
computer name if there is not.
;
DefaultDomain=MyDomain1
;
; If set to "Yes", the domain box will only list domains that the system
marks as domain controllers. If set to "No" (the default), all servers
will be listed.
;
DomainControllersOnly=No
;
; If set to "Yes", then the username and the domain of the last logged on
user is automatically filled in (if it is available).
;
SelectLastUsed=Yes
96 |
Endpoint Encryption Program and Driver Files
Setup
Setup.exe is the core executable in Endpoint Encryption’s' packaging mechanism. It is
used as an exe stub for the install package and also handles the de-install process.
Setup takes one parameter "-Uninstall" which prompts it to walk through
sbfiles41.lst, deleting files (or marking them for deletion if they are in use) and
reversing registry settings. Setup also re-runs any installation executables with the -
Uninstall flag to remove programs. The order of removal is reverse to the install, i.e.
Installation executables, registry settings, files.
SBTokWatch
The SBTokWatch.exe file notifies Endpoint Encryption for PC when a token has been
removed. This is for Vista installations only.
DLL Files
sbalgxx
The Utility Encryption algorithm module.
sbgina
Windows login pass through GINA driver for NT / 2000.
Usually Endpoint Encryption monitors the GINA settings in the registry to ensure that
nothing removes or disables the login system. You can change the behavior of this
system by editing the SB-NoUpdateGina DWORD key in
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]. The following
values can be set:
| 97
Endpoint Encryption Program and Driver Files
You can use these settings to force compatibility with other GINA replacement login
systems. If you use option 1,2,3 you are responsible for keeping the GINA chain
correct, as Endpoint Encryption will not be monitoring some aspects of it .
SYS Files
SafeBoot.SYS
The core device driver for Endpoint Encryption, handling crypt of the disk, and
management functions.
You can block the use of Safe Mode when Endpoint Encryption is installed by setting
the following parameters. These options are included in the BlockSafeMode file group
option in Endpoint Encryption for PC.
[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SafeBoot]
;Prevent Safe Mode access if SafeBoot is activated
PreventSafeMode=dword:00000001
;The warning message to display (default if not set)
;PreventSafeModeMsg=""
Endpoint Encryption for PC uses several sectors of the hard disk between 1 and 63 -
commonly termed the “partition gap” - to store power fail information while encryption
and decryption is in progress. If you have other applications also using these sectors,
you can exclude them from the range used by specifying registry settings as below.
For each sector you need to exclude, add a DWORD value of 1 with a name of the
decimal sector number to the following registry key as follows:
[HKLM\Software\SafeBoot
International\SafeBoot\DiskManager\ExcludedSectors]
14=dword:1
15=dword:1
You can specify any number of exclusions using this method, but be aware that at
least two sectors are required, and the smaller the number available, the slower
encryption processes will run.
You can add this information to the client NTDRV.SRG registry file to ensure it is
applied on all machines at point of install.
SBALG.SYS
This file is Endpoint Encryption’s device driver crypto algorithm module.
98 |
Endpoint Encryption Program and Driver Files
SafeBoot.CSC/RSV
Endpoint Encryption pre-boot sector chain for the boot loader. The SafeBoot.csc file
was renamed to SafeBoot.RSV in v5.01 for better defrag protection.
SafeBoot.FS
This file is the encrypted pre-boot environment (stored as a single file).
SbRegFlt
This file is applicable to Vista installations only. It allows the administrator to properly
support auto logon, i.e. ensure the control-alt-delete behavior is correct for single sign
on.
Other Files
srg files
Endpoint Encryption registry files – these are standard regedit files which are
processed into the registry by Endpoint Encryption, without using the windows regedit
utility.
| 99
WinTech and SafeTech
• Decrypt the drive using information obtained from the Endpoint Encryption
Manager.
These tools should only be used by trained Endpoint Encryption staff. For more
information, and access to the WinTech and SafeTech Administration Guide, please
contact your McAfee representative.
100 |
Themes & Localization
You can also restyle almost any aspect of the pre-boot interface, from changing colors
and graphics, to moving buttons and text on the screen.
Endpoint Encryption provides full localization and customization services, but for those
interested, the following information is provided to help you gain experience of how all
the components fit together. We provide numerous languages and graphical layouts
(themes) with our product. Readers are strongly advised to look to those while
reading these sections to understand how they work.
A tip to future theme designers – the Endpoint Encryption for PC client will synchronize
any file changes found in the [appdir]\locale and [appdir]\graphics trees into the
Endpoint Encryption pre-boot file system on every policy sync event, so, rather than
making your changes and uploading them to the Endpoint Encryption Manager, you
can simply change the files directly on a Endpoint Encryption client and perform a sync
event to load them into the pre-boot. A successful sync is not required – only an
attempt.
Themes
Endpoint Encryption for PC uses graphical “Themes” to control the look and feel of the
pre-boot environment. These Themes are stored as “Client File” type file sets within
the Endpoint Encryption Object Directory. Only one theme can be assigned to a
machine at any time.
To assign a theme to a Endpoint Encryption for PC machine, simply enable its file set
from the “Files” tab of either the machine, or machine group properties.
File or Directory Description
Graphics Master definition file for the graphical theme. This file
dictates the overall look of the theme, the button an d
Graphics.ini window positions, and the various graphical elements which
are used for each resolution.
ENGLISH The English language font files
| 101
Themes & Localization
File or Directory Description
640x480 Images for this resolution
800x600 Images for this resolution
1024x768 Images for this resolution
1280x960 Images for this resolution
1280x1024 Images for this resolution
1400x1050 Images for this resolution
1440x900 Images for this resolution
1440x1050 Images for this resolution
1600x1200 Images for this resolution
1680x1050 Images for this resolution
1680x1280 Images for this resolution
1920x1440 Images for this resolution
Shared Shared images used in all modes
Locale Language Translations. This file sets all the options re various
language and keyboard support options. The options in
Locale.ini Local.ini determine which font sets from Graphics.ini are
used.
Table 6. Theme Overview
For information about the parameters in the Graphics.ini and Local.ini files, see the
example theme which has fully commented versions.
Keyboards
Physical Keyboard Layouts
Endpoint Encryption for PC supports many physical keyboard layouts, and also
supports automatic detection of the Windows keyboard layout in an attempt to choose
the most appropriate pre-boot layout.
102 |
Themes & Localization
Having the correct pre-boot layout selected is essential when authenticating, for
example, imagine the user has the French keyboard enabled in Windows, but has the
USA keyboard enabled in Endpoint Encryption for PC Pre-Boot.
Row 2 of the French keyboard begins “azerty…” whereas row 2 of a USA keyboard
begins “qwerty…” – so if the users password contains either “a” or “z”, then they will
not be able to press the same keys in pre-boot to authenticate.
The PBA determines which layouts are installed by considering the Locale\Locale.ini
file in the pre-boot environment. This file is synchronised along with the entire [app-
dir]\locale directory each time the machine performs a sync operation.
Node Description
;Norwegian Stub
;B5100
[Settings] Defines the default keyboard if no mapping in
[LanguageIDMap] can be determined
DefaultKeyboard=0414
[Keyboards] Defines the list of possible keyboards. In this
example, two keyboards are defined (0414 and
0414=Keyboard.0414
043B), which are described in the sections
043B=Keyboard.043B keyboard.0414 and keyboard.043b. The definition
names and section names are arbitary, but we
recommend you use the actual keyboard ID for
consistency.
[Keyboard.0414] This is a keyboard definition section, it describes
the name of the keyboard (displayed in the
name=Norwegian
selection list), the map file to use (stored in
mapfile=0414_E.MAP \Locale), and the On screen keyboard file to use
OSK=0414_OSK.XML (again, stored in \locale)
Instead of using the “name” tag, you can use
NameW which takes a comma separated list of
| 103
Themes & Localization
Node Description
hex char codes, for example:
NameW=32,54,23,6A,43DF
With NameW you can display Unicode chars which
are useful when defining double‐byte languages.
[Keyboard.043B]
name=Norwegian with
Sami
mapfile=043B_E.MAP
OSK=043B_OSK.XML
[LanguageIDMap] This section describes how the client should
attempt to map the selected Windows keyboard
0414.Keyboard=0414
to the pre‐boot keyboards.
043B.Keyboard=043B
0414.Keyboard=0414 indicates if Windows is using
a keyboard with the ID 0414, Endpoint Encryption
should use the keyboard described in [keyboards]
under the definition name 0414.
Table 7. Keyboard definition in Locale.ini
Locale.ini
Normally Language and keyboard layouts are defined within the Endpoint Encryption
Database, and each language has a locale.ini file configured as a Merge INI. This
system enables administrators to add and remove languages without having to define
the exact set prior to distribution. As all keyboards and Languages are defined in the
same Locale.ini file, without merge INIs you would have to create a locale.ini file
describing the exact combination of keyboards and locales prior to sending it to a
Endpoint Encryption for PC client.
For examples of how to define a Locale.ini, see one of the supplied languages stored in
the Endpoint Encryption Manager install directory \Languages tree.
NOTE: If the language is changed in Windows, then auto detect will not work. The new language file for
preboot and keyboard should be deployed using file groups. Select the language file from file groups and
apply it to the machine or group. The machine or machine group must then synchronize with the admin
system.
104 |
Themes & Localization
The user(s) must then restart their machines. In the preboot screen they must select
“Options”. This will load a menu. They must then select “Options” from this menu.
From the “Options” screen you can then specify the preboot language and the
keyboard language.
flags=0x8000007C
NAME=Norwegian with Sami
;----
0x02=0x0031,0x009F,0x0000 ;-normal
0x02=0x0021,0x009F,0x0010 ;-shift
0x02=0x0000,0x009F,0x0009 ;-altgr
0x02=0x0031,0x009F,0x0080 ;-caps
0x02=0x0000,0x009F,0x0090 ;-shiftcaps
0x02=0x0000,0x009F,0x0019 ;-shiftaltgr
0x02=0x0000,0x009F,0x0089 ;-altgrcaps
0x02=0x0000,0x009F,0x0099 ;-shiftaltgrcaps
Node Description
flags Operational flags which control the behaviour of this
keyboard map. Defined flags include:
0x00000001 Caps is Shift
0x00000002 Shift unsets Caps
0x00000004 Acute
0x00000008 Grave
0x00000010 Circumflex
0x00000020 Umlaut (Diaresis)
0x00000040 Tilde
0x00000080 Caron
0x00000100 Apostrophe
| 105
Themes & Localization
Node Description
0x00000200 Cedliia
0x00000400 Breve
0x00000800 Ogonek
0x00001000 Dotabove
0x00002000 DoubleAcute
0x00004000 Degree
0x00008000 Tonos
0x00010000 Middle Dot
0x00020000 Low Nine
0x00040000 Dialytika
0x00080000 Quotation
0x00100000 Polish Programmers Tilde
0x00200000 Ring Above
0x00400000 Macron
0x80000000 Extended Mode (should always be enabled)
Name The keyboard name
Key definitions Each key (scan code) behaviour is defined in a number of
entries which state the Unicode character which should be
produced. Each key may have many states (normal, shifted,
caps etc) so there may be multiple entries per key.
The possible states are defined with a mask (which keys to
consider) and a state (the key state itself)
The possible keys you can use in the mask and keystate are:
RIGHT_ALT_PRESSED 0x0001
LEFT_ALT_PRESSED 0x0002
106 |
Themes & Localization
Node Description
RIGHT_CTRL_PRESSED 0x0004
LEFT_CTRL_PRESSED 0x0008
SHIFT_PRESSED 0x0010
NUMLOCK_ON 0x0020
SCROLLLOCK_ON 0x0040
CAPSLOCK_ON 0x0080
ENHANCED_KEY 0x0100
So as an example, to define key 2 (the number 1 key on a
USA keyboard) you would add an entry for scan code 0x02
(the scan code of this key) followed by a number of
possible key states.
0x02=0x0031,0x009F,0x0000
Would define the number 1 key to display the char “1” in
the situation that none (keystate of 0x000) of the modifiers
capslock, shift, left‐alt, right‐ctrl, left‐ctrl and right‐alt
(0x09F) is pressed.
To define the behaviour of this key when shift alone is
pressed we use the following line:
0x02=0x0021,0x009F,0x0010
As above, if key 2 is pressed, create a quotation mark
(Unicode char 21) if shift (0x0010) is pressed out of the
combination of capslock, shift, left‐alt, right‐ctrl, left‐ctrl
and right‐alt (0x09F).
| 107
Themes & Localization
Node Description
Of course, in both the cases above, the keys not considered
in the keystate must not be pressed.
The Mask defines which keys to consider, and the keystate
defines the state of each of those keys.
Table 8. Keyboard map source file
If you wish to create a custom keyboard map, you will need to have it compiled by
Endpoint Encryption before it can be used.
On Screen Keyboards
On-Screen keyboards provide visual representation of the physical keyboard. Each
keyboard map can be defined to provide either its own OSK, or, the system default
OSK (US English). The symbols on each key can be defined for the normal, alt, altgr,
shift, caps, and ctrl states, and also any combination of states.
OSK’s are defined in Endpoint Encryption pre-boot using an XML file which controls the
layout (key spacing, number of rows etc), and the display char for each key. The OSK
file (keyboardID_OSK.XML) is usually stored in the SBFS\Locale directory.
The can be many OSK’s installed, and each physical keyboard map can choose one of
the installed OSK’s to display on request.
Administrators can choose to always display an OSK for the user by selecting the
“always display on-screen keyboard” option of the Machine/General properties.
NOTE: Though the OSK displays the character for each possible state, the OSK sends the scan code and
modifier (shift/alt etc) to the selected keyboard driver for conversion, so the actual character printed will be
a result of the keyboard driver, NOT necessarily the one displayed on the OSK.
108 |
Themes & Localization
Node Description
Options/font The name of the font used by this OSK. This should be
defined in graphics.ini and needs to be an OnTime Binary
font
Layout ID The name of this OSK layout – displayed in the title bar of
the OSK
Key/ID
A decimal representation of the key – usually the decimal
scan code ID
Key/Obey‐Caps If this key is subject to any caps state switching, this
should be set to true.
Key/Scancode The Scancode produced by this key
Key/default The default display char
Key/shifted The shifted display char
Key/caps The caps lock state char
Key/alt_gr The alt_gr state char
Key/text/state The combination states for this key – The text/state
attribute takes precedence over the key/default key/shift
| 109
Themes & Localization
Node Description
etc states. You can specify single states, for example
Text state=”shift” display=”Q”
Or combination states, for example
Text state=”shift+altgr” display=”%”
For any key to consider any caps behaviour, the
key/obey_caps needs to be true.
Table 9. On Screen Keyboard Source
To set which OSK is displayed per keyboard map, add an “OSK=” tag to the keyboard
definition in locale.ini, for example:
[Keyboard.043B]
name=Norwegian with Sami
mapfile=043B_E.MAP
OSK=043B_OSK.XML
Node Description
Name The display name of the Keyboard
Mapfile The name of the map file to use to map the key presses to
chars
OSK The name of the OSK file to display
Table 10. On Screen Keyboard Definition
Pre-Boot Language
Endpoint Encryption for PC supports many languages, and also supports automatic
detection (Note: this is only during Endpoint Encryption activation) of the Windows
Language in an attempt to choose the most appropriate pre-boot language.
NOTE: If the language is changed in Windows, then auto detect will not work. The new language file for
preboot and keyboard should be deployed using file groups. Select the language file from file groups and
apply it to the machine or group. The machine or machine group must then synchronize with the admin
system.
110 |
Themes & Localization
The user(s) must then restart their machines. In the preboot screen they must select “Options”. This will
load a menu. They must then select “Options” from this menu. From the “Options” screen you can then
specify the preboot language and the keyboard language.
The selectable languages are defined in the SBFS Locale\Locale.ini file, for example:
Node Description
Chinese Stub
;B5100
[Settings] The default language to use if no mapping
DefaultLanguage=0804 is found in the [LanguageIDMap] section
[Languages] The defined languages – Both the
0804=Lang.0804 definition name and section name are
arbitrary.
0404=Lang.0404
[LanguageIDMap] The Windows language to Endpoint
0804.Language=0804 Encryption Pre‐Boot language map.
0404.Language=0404 For example, if Windows is using the
Locale 0404, then the Pre‐boot should use
0004.Language=0804
the definition 0404 for its language.
0C04.Language=0404
Both the major and minor language can be
0404.Keyboard=0404
checked, so in this example both Windows
0804.Keyboard=0804 languages 0804 and 0004 use the Endpoint
Encryption pre‐boot definition section
0804. If the primary variant for example
0F04 is found in Windows, then 0004 will
be used in Endpoint Encryption
[Lang.0804] This section defines a language.
;Name=Chinese Simplified (PRC)
The Name tag is the name displayed in the
NameW=,0020,0050,0052,0043,0029 pre‐boot selection list. You can supply a
NameW tag instead which takes a comma
ID=0804
separated list of char codes. This enables
StringFile=0804.STR you to set a Unicode name for the list.
FontSection=Fonts.SuperFont
The ID describes the Locale ID, this should
be the ANSI recognised ID for this
| 111
Themes & Localization
Node Description
languages.
The StringFile describes the actual
compiled definition file to use (stored in
\locale).
The FontSection describes the section in
Graphics.ini which contains the fonts to be
used for this particular language.
Each language can use its own fonts, or can
use fonts shared by other languages.
Table 11. Pre‐Boot Language Definition
Name=Chinese (Simplified)
ID=0804
1=确定
2=取消
3=SafeBoot
4=是
5=否
50=请插入一张引导用的软盘或者按取消从硬盘引导。
100=SafeBoot登录
101=用户名:
102=密码:
103=修改密码
51=您不允许从软盘引导,系统将从硬盘引导。
You can obtain a pre-boot English master text file from your Endpoint Encryption
distributor. Once translated, the file needs to be compiled by Endpoint Encryption.
Normally Language and keyboard layouts are defined within the Endpoint Encryption
Database, and each language has a locale.ini file configured as a “Merge Ini”. This
system enables administrators to add and remove languages without having to define
the exact set prior to distribution. As all keyboards and Languages are defined in the
same Locale.ini file, without merge INIs you would have to create a locale.ini file
describing the exact combination of keyboards and locales prior to sending it to a
Endpoint Encryption for PC client.
112 |
Themes & Localization
For examples of how to define a Locale.ini, see one of the supplied languages stored in
the Endpoint Encryption Manager install directory \Languages tree.
The definition file for each token is described in an XML file with the name
Token_tokenID.xml as follows:
Node Description
<SbTokenInformation>
<PromptName>prompr The text to display in the login box
text</PromptName>
<ListName>list The text to display in the list of
text</ListName> tokens
</Token>
</SbTokenInformation>
Table 12. Token Translation File
Windows Languages
Endpoint Encryption for PC uses resource DLL’s and other files to convert its Windows
components to display in alternate languages.
| 113
Themes & Localization
114 |
Troubleshooting PCs
Troubleshooting PCs
For the latest information on Endpoint Encryption issues, patches and information
please see our web site, www.mcafee.com. We maintain several sections with the
latest tips from our implementation teams, and any suggested changes and updates.
You can also subscribe to an update list which uses e-mail to keep you informed of any
significant issues.
| 115
Error Messages
Error Messages
Please see the file sberrors.ini for more details of these error messages. You can also
find more information on error messages on our web site, www.mcafee.com.
Module codes
The following codes can be used to identify from which Endpoint Encryption module
the error message was generated.
Error Code Module
1c00 IPC
5501 SBHTTP Page Errors
5502 SBHTTP User Web Recovery
5c00 SBCOM Protocol
5c02 SBCOM Crypto
a100 ALG
c100 Scripting
db00 Database Misc
db01 Database Objects
db02 Database Attributes
e000 Endpoint Encryption General
e001 Endpoint Encryption Tokens
e002 Endpoint Encryption Disk
e003 Endpoint Encryption SBFS
e004 Endpoint Encryption BootCode
e005 Endpoint Encryption Client
e006 Endpoint Encryption Algorithms
e007 Endpoint Encryption Users
116 |
Error Messages
Error Code Module
e010 Endpoint Encryption Keys
e011 Endpoint Encryption File
e012 Endpoint Encryption Licenses
e013 Endpoint Encryption Installer
e014 Endpoint Encryption Hashes
e015 Endpoint Encryption App Control
e016 Endpoint Encryption Admin
[1c000001] Timeout during IPC
[1c000002] IPC terminated
[1c000003] Unable to initialise IPC
[1c000004] Unknown or unsupported function
[1c000005] Request to send data that is too big
[1c000006] Timeout sending data
[1c000007] Timeout waiting for reply
[1c000008] Out of memory
[5c000000] Unsupported version
The server and client are not talking the same communications
protocol version
[5c000005] Out of memory
| 117
Error Messages
Code Message and Description
[5c000008] A corrupt or unexpected message was received
[5c000009] Unable to load the Windows TCP/IP library (WSOCK32.DLL)
Check that the TCP/IP protocol is installed
[5c00000a] Communications library not initialised
This is an internal programmatic error
[5c00000c] Unable to create TCP/IP socket
[5c00000d] Failed while listening on a TCP/IP socket
[5c00000e] Unable to convert a host name to an IP address
Check the host file or the DNS settings
[5c00000f] Failed to connect to the remote computer
The computer may not be listening or it is too busy to accept
connections
[5c000010] Failed while accepting a new TCP/IP connection
[5c000011] Failed while receiving communications data
The remote computer may have reset the connection
[5c000012] Failed while sending communications data
[5c000013] Invalid communications configuration
[5c000014] Invalid context handle
[5c000015] A connection has already been established
[5c000016] No connection has been established
[5c000017] Request for an unknown function has been received
[5c000018] Unsupported or corrupt compressed data received
[5c000019] Data block is too big
[5c00001a] Data of an unexpected length has been received
118 |
Error Messages
Code Message and Description
[5c00001b] Message too big to be received
This may occur if an attempt is made to import large amounts of
data into the database (e.g. a file)
[5c00001c] Unable to create thread mute
[5c00001d] Message too big to be sent
This may occur if an attempt is made to import large amounts of
data into the database (e.g. a file)
[5c00001e] Wrong Endpoint Encryption Communications Protocol Version
You are most likely trying to connect to a v4 Endpoint Encryption
Server using a v5 Server definition with server authentication
enabled.
Check that you do not have both v4 and v5 servers running
(perhaps as a service) at the same time.
[5c020000] The Diffie‐Hellmen data is invalid or corrupt
[5c020001] An unsupported encryption algorithm has been requested
[5c020002] An unsupported authentication algorithm has been requested
[5c020003] Unable to sign data
[5c020004] Authentication signature is not valid
[5c020005] Authentication parameters are invalid or corrupt
[5c020006] Failed while generating DSA parameters
[5c020007] No session key has been generated
[5c020008] Unable to authenticate user
[5c020009] Session key too big
| 119
Error Messages
[a1000000] Not enough memory
[a1000001] Unknown or unsupported function
[a10000002] Invalid handle
[a1000003] Encryption key is too big
[a1000004] Encryption key is too small
[a1000005] Unsupported encryption mode
[a1000006] Invalid memory address
[a1000007] Invalid key data
[db000000] Out of memory
[db000001] More data is available
[db000002] The database has not been created or initialised yet
Check the database path or create a new database. To force the
new database wizard to be run, delete the SDMCFG.INI file and
restart the administration program.
[db000003] Invalid context handle
[db000004] The name was not found in the database
db000005] Authentication was not successful.
Check that you have the correct token for this database
[db000006] Unknown database
[db000007] Invalid database type
[db000008] The database could not be found. Check the database path
120 |
Error Messages
Code Message and Description
settings
[db000009] Database already exists.
Choose a different database path
[db00000a] Unable to create the database
Check the path settings and make sure you have write access to
the directory
[db00000b] Invalid database handle
[db00000c] The database is currently in use by another entity
You cannot delete a database while someone is using it
[db00000d] Unable to initialise the database
[db00000e] User aborted
[db00000f] Memory access violation
[db000010] Invalid string
[db000011] No default group has been defined
[db000012] The group could not be found
[db000013] File not found
[db000014] Unable to read file
[db000015] Unable to create file
[db000016] Unable to write to file
[db000017] File corrupt
[db000018] Invalid function
[db000019] Unable to create mutex
[db00001a] Invalid license
| 121
Error Messages
Code Message and Description
The license has been modified so that the signature is now invalid
[db00001b] License has expired
[db00001c] The license is not for this database
Check the database ID and ensure it is the same as the one
specified in the license. Each time you create a new database, a
different ID is generated. There is no way to change the ID of a
database.
[db00001d] You do not have permission to access the object
[db00001e] Endpoint Encryption is currently busy with another task. Please
wait for it to complete and try again.
This usually means that your hard disks are in the process of
being encrypted or decrypted. You can check the current
Endpoint Encryption status from the right‐click menu of the
Endpoint Encryption task bar icon.
[db00001f] Endpoint Encryption is still installed on this machine
[db000020] Buffer too small
[db000021] The requested function is not supported
[db000022] Unable to update the boot sector
The disk may be in use by another application or Explorer itself.
The disk may be protected by an anti‐virus program.
[db010000] The object is locked
Someone else is currently updating the same object
[db010001] Unable to get the object ID
[db010002] Unable to change the object's access mode
Someone else may by accessing the object at the same time. If
122 |
Error Messages
Code Message and Description
you are trying to write to the object while someone else has the
object open for reading, you will not be able to change to write
mode.
[db010003] Object is in wrong access mode
[db010004] Unable to create the object in the database
The disk may be full or write protected
[db010005] Operation not allowed on the object type
[db010006] Insufficient privilege level
You do not have the access rights required to access the object.
[db010007] The object status is disabled
This is usually associated with User objects. Disabling the user's
object prevents them logging on until their account is re‐enabled.
[db010008] The object already exists
[db01000f] The object is in use
[db010010] Object not found
The object has been deleted from the database
[db010011] License has been exceeded for this object type
Check that your licenses are still valid and if not obtain further
licenses if necessary
[db020000] Attribute not found
[db020001] Unable to update attribute
[db020002] Unable to get attribute data
[db020003] Invalid offset into attribute data
| 123
Error Messages
Code Message and Description
[db020004] Unable to delete attribute
[db020005] Incorrect attribute length
[db020006] Attribute data required
[e0000000] User aborted
[e0000001] Insufficient memory
[e0000002] Invalid date/time
[e0000010] Invalid date/time. Clock is reporting a time before 1992 or after
2038.
E001 Tokens
Code Message and Description
[e0010000] General token error
[e0010001] Token not logged on
[e0010002] Token authentication parameters are incorrect
[e0010003] Unsupported token type
[e0010004] Token is corrupt
[e0010005] The token is invalidated due to too many invalid logon attempts
[e0010006] Too many incorrect authentication attempts
[e0010007] Token recovery key incorrect
[e0010010] The password is too small
[e0010011] The password is too large
[e0010012] The password has already been used before. Please choose a
124 |
Error Messages
Code Message and Description
new one.
[e0010013] The password content is invalid
[e0010014] The password has expired
[e0010015] The password is the default and must be changed.
[e0010016] Password change is disabled
[e0010017] Password entry is disabled
[e0010020] Unknown user
[e0010021] Incorrect user key
[e0010022] The token is not the correct one for the user
[e0010023] Unsupported user configuration item
[e0010024] The user has been invalidated
[e0010025] The user is not active
[e0010026] The user is disabled
[e0010027] Logon for this user is not allowed at this time
[e0010028] No recovery key is available for the user
[e0010030] The algorithm required for the token is not available
[e0010040] Unknown token type
[e0010041] Unable to open token module
[e0010042] Unable to read token module
[e0010043] Unable to write token module
[e0010044] Token file not found
[e0010045] Token type not present
[e0010046] Token system class is not available
| 125
Error Messages
Code Message and Description
[e0018000] Sony Puppy requires fingerprint
[e0018001] Sony Puppy requires password
[e0018002] Sony Puppy not trained
[e0000002] Invalid date/time
[e0020000] No more data is available
[e0020001] No more data is available
[e0020002] Unsupported disk driver function
[e0020003] Invalid disk driver request
[e0020004] Disk request buffer too small
[e0020005] Unsupported encryption algorithm
[e0020006] Unknown disk number
[e0020007] Error reading disk sector
[e0020008] Error writing disk sector
[e0020009] Unable to get disk partition information
[e002000a] Endpoint Encryption disk information not present
[e002000b] Not enough space for the Endpoint Encryption disk information
[e002000c] The Endpoint Encryption disk information is invalid
[e002000d] Sector not valid for Endpoint Encryption disk information use
[e002000e] Sector chain is invalid
[e002000f] Sector chain type incorrect
[e0020010] Sector chain sequence number incorrect
126 |
Error Messages
Code Message and Description
[e0020011] Sector chain checksum invalid
[e0020012] Crypt state information too big for available space
[e0020013] Crypt list full
[e0020014] Crypt range too big.
[e0020015] Attempt to crypt while in power fail state not allowed
[e0020016] Attempt to crypt in‐progress I/O
[e0020017] Error communicating with Endpoint Encryption disk driver
[e0020018] Endpoint Encryption disk driver not present
[e0020019] Unsupported disk driver version
[e002001a] No encryption has been key set
[e002001b] Unable to find the system boot disk
[e002001c] Unknown message slot
[e002001d] Message slot data too large
[e002001e] Unable to lock floppy disk driver for access
[e002001f] Unable to access floppy disk
[e0020020] The boot disk type is not supported
[e0020021] Access to driver not permitted
[e0030001] The SafeBot File System is already mounted
[e0030002] Unable to mount the Endpoint Encryption File System
[e0030003] Unable to unmount the Endpoint Encryption File System
[e0030004] The Endpoint Encryption File System is not mounted
| 127
Error Messages
Code Message and Description
[e0030005] Error reading Endpoint Encryption File System sector
[e0030006] Error writing Endpoint Encryption File System sector
[e0030007] Endpoint Encryption File System too fragmented
[e0030008] Endpoint Encryption File System size invalid
[e0030009] Error creating Endpoint Encryption File System host file
[e003000a] Error reading Endpoint Encryption File System host file
[e003000b] Error writing Endpoint Encryption File System host file
[e003000c] Error setting Endpoint Encryption File System host file pointer
[e003000d] Unable to locate sectors corresponding to the Endpoint
Encryption File System host file
[e003000e] No host driver found for the Endpoint Encryption File System
[e0040001] Unable to open boot code image file
[e0040002] Error reading boot code image file
[e0040003] Boot code image file too big
[e0040004] Error creating boot code image host file
[e0040005] Error reading boot code image host file
[e0040006] Error writing boot code image host file
[e0040007] Error setting boot code image host file pointer
[e0040008] Unable to locate boot code image host file sectors
[e0040009] No host driver found for boot code image file
[e004000a] Unhandled instruction
128 |
Error Messages
[e004000b] Invalid instruction
[e004000c] Protected mode General Protection Fault
E005 Client
Code Message and Description
[e0050001] Endpoint Encryption Client not activated
[e0050002] The Endpoint Encryption Client is already activated
[e0050003] The Endpoint Encryption Client activation is already in progress
[e0050004] The wrong version of the Endpoint Encryption Client is currently
active
[e0050005] Unable to save original MBR
[e0050006] Disk Manager not open
[e0050007] Unable to load MBR copy
[e0050008] Unable to load the Endpoint Encryption MBR
[e005000a] Too many work items to perform encryption.
[e005000b] Endpoint Encryption MBR invalid
[e005000c] Endpoint Encryption Client sync failed to start
[e005000d] Endpoint Encryption Client sync already in progress
[e005000e] Key not available to the Endpoint Encryption Client
[e005000f] The recovery key is incorrect
[e0050010] Failed to start cryption
[e0050011] Cryption already in progress
[e0050012] The hard disk key is incorrect
[e0050013] The machine configuration is corrupt or invalid
[e0050014] Unable to load string data
| 129
Error Messages
Code Message and Description
[e0050015] String data is invalid
[e0050016] Incorrect user logon
[e0050017] The isolation period has expired
[e0050018] A possible virus has been detected
[e0050019] Recovery data is invalid
[e005001a] Recovery file version unsupported
[e005001b] Invalid recovery command
[e005001c] Invalid recovery type
[e005001d Recovery data not found
[e005001d] Client not initialized for emergency boot
[e0050020] Unable to open the client data store
[e0050021] The client data store is not open
[e0050022] The client data store already exists
[e0050023] Error creating client data store
[e0050024] Unable to create client data store directory
[e0050025] Client data store in use
[e0050026] Unable to delete client data store
[e0050027] The client data store is corrupt
[e0050028] Unsupported client data store version
[e0050030] Client data store object not found
[e0050031] Client data store object not open
[e0050032] Client data store object not exclusive
[e0050033] Client data store object ID invalid
130 |
Error Messages
Code Message and Description
[e0050034] Client data store object ID already exists
[e0050035] Unable to create client data store object directory
[e0050036] Client data store object name already exists
[e0050037] Unable to read client data store object name
[e0050038] Unable to write client data store object name
[e0050040] Unable to remove client data store object
[e0050041] Client data store attribute not found
[e0050042] Client data store attribute not open
[e0050043] Unable to open client data store attribute
[e0050044] Unable to create client data store attribute
[e0050045] Unable to read client data store attribute
[e0050046] Unable to write data store attribute
[e0050047] Client data store attribute version incorrect
[e0050048] Client data store attribute corrupt
[e0050049] Invalid size of client data store attribute
[e005004a] Access denied to client data store attribute
[e0050060] Upgrade of client is not possible
[e0050061] Upgrade old SbFs is invalid
[e0050062] Upgrade old SbFs not found
[e0050063] Upgrade old SbFs drive not found
[e0050064] Upgrade, unable to read old SbFs
[e0050065] Upgrade, old machine configuration invalid
[e0050066] Upgrade, invalid user data.
| 131
Error Messages
Code Message and Description
[e0050067] Upgrade, user directory version invalid
[e0050068] Upgrade, invalid user directory
[e0050069] Upgrade, unable to get original MB
[e005006a] Upgrade, unable to get audit data
E006 Algorithms
Code Message and Description
[e0060001] Unknown encryption algorithm
[e0060002] Unable to install pre‐boot encryption algorithm module
[e0060003] Error relocation 16‐bit encryption algorithm code
[e0060004] Error initializing 16‐bit encryption algorithm module
[e0060005] 16‐bit encryption algorithm module invalid
E007 Readers
Code Message and Description
[e0070001] Unknown reader type
[e0070002] Unable to open reader module
[e0070003] Unable to read reader module
[e0070004] Unable to write reader module
[e0070005] Reader failure
[e0070006] Unable to create reader context
[e0070007] Invalid reader parameter
[e0070008] Reader not present
[e0070009] Reader timeout
[e007000a] Reader sharing violation
132 |
Error Messages
Code Message and Description
[e007000b] Token not present in reader
[e007000c] Reader protocol mismatch
[e007000d] Reader communications error
[e007000e] Token not powered in reader
[e007000f] Token not reset in reader
[e0070010] Token removed from reader
E008 Users
Code Message and Description
[e0080001] User configuration invalid or corrupt
[e0080002] User information field index invalid
[e0080003] User has no hard disk encryption key
E010 Keys
Code Message and Description
[e0100001] Encryption key too big
[e0100002] Encryption key size invalid
E011 Files
Code Message and Description
[e0110001] Unable to create file
[e0110002] Unable to open file
[e0110003] Error reading file
[e0110004] Error writing file
[e0110005] Error setting file pointer
| 133
Error Messages
Code Message and Description
[e0110006] Error getting file size
E012 Licences
Code Message and Description
[e0120001] License invalid
[e0120002] License expired
[e0120003] License is not for this database
[e0120004] License count exceeded
E013 Installer
Code Message and Description
[e0130002] No installer executable stub found
[e0130003] Unable to read installer executable stub
[e0130004] Unable to create file
[e0130005] Error writing file
[e0130006] Error opening file
[e0130007] Error reading file
[e0130008] Installer file invalid
[e0130009] No more files to install
[e013000a] Install archive block data too large
[e013000b] Install archive data not found
[e013000c] Install archive decompression failed
[e013000d] Unsupported installer archive compression type
[e013000e] Installation error
134 |
Error Messages
Code Message and Description
[e013000f] Unable to create temporary directory
[e0130010] Error registering module
E014 Hashes
Code Message and Description
[e0140001] Insufficient memory
[e0140002] Error opening hashes file
[e0140003] Error reading hashes file
[e0140004] Hashes file invalid
[e0140005] Unable to create hashes file
[e0140006] Error writing hashes file
[e0140007] Hashes file is not open
[e0140008] Hashes file data invalid
[e0140009] Hashes file data too big
[e014000a] User aborted
[e0150001] Insufficient memory
[e0150002] Application control invalid parameter
[e0150003] Error communicating with application control driver
[e0150004] Application control driver not installed
[e0150005] Error opening application control log file
[e0150006] Invalid hashes object list
| 135
Error Messages
[e0160001] Invalid plugin information
xxH: BIOS
If Endpoint Encryption’s boot loader detects a hardware error from the BIOS, it reports
the standard error code in the format “Endpoint Encryption ?? Error code H??”
Code Message and Description
01H Invalid function call
02H Address mark not found
03H Disk is write protected
04H Sector not found
05H Reset failed (hard disk)
06H Diskette has been changed
07H Drive parameter activity failed (hard disk)
08H DMA overrun
09H DMA attempted across 64K boundary
0AH Bad sector flag detected (hard disk)
0BH Bad track detected (hard disk)
0CH Unsupported track or invalid media
0DH Invalid number of sectors for Format (hard disk)
0EH Control data address mark detected (hard disk)
0FH DMA arbitration level out of range (hard disk)
10H Uncorrectable CRC or ECC error on read
11H ECC corrected data error (hard disk)
136 |
Error Messages
Code Message and Description
20H Disk controller failure
31H No media in drive
32H Drive does not support media type
40H Seek failed
80H Timeout (disk not ready)
AAH Drive not ready
B0H Volume not locked in drive (INT 13 extensions)
B1H Volume locked in drive (INT 13 extensions)
B2H Volume not removable (INT 13 extensions)
B3H Volume in use (INT 13 extensions)
B4H Lock count exceeded (INT 13 extensions)
B5H Valid eject request failed (INT 13 extensions)
BBH Undefined error (hard disk)
CCH Write fault (hard disk)
E0H Status register error (hard disk)
FFH Sense failed (hard disk)
| 137
Technical Specifications and Options
Encryption Algorithms
Endpoint Encryption supports many custom algorithms. Only one algorithm can be
used in a Endpoint Encryption Enterprise.
RC5-12 (FASTEST)
CBC Mode, 1024 bit key, 12 rounds, 64 bit blocks. PassMark 20.7 (100%)
RC5-18
CBC Mode, 1024 bit key, 18 rounds, 64 bit blocks, PassMark 20.7 (100%)
The 18 round RC5 variant is designed to prevent the theoretical “Known Plaintext”
attack.
138 |
Technical Specifications and Options
• Universal CCID USB smart card reader support (supports all industry standard
CCID readers)
Tokens
Please see the Using Tokens with Endpoint Encryption for PC chapter for further
information.
For the latest list of authentication methods using smart cards, tokens, fingerprint
readers please consult your McAfee representative.
Language Support
Client
Pre‐Boot Languages (auto detect)
Arabic Italian
Czech Japanese
Chinese (Simplified) Korean
Chinese (Traditional) Polish
Dutch Portuguese
| 139
Technical Specifications and Options
English (United Kingdom) Russian
English (United States) Slovak Republic
Estonian Swedish
German Spanish
Hungarian Turkish
Pre‐Boot Keyboards (auto detect)
Arabic 101 Greek 319
Arabic 102 Greek 220 Latin
Arabic AZERTY Greek 319 Latin
Belgian Comma Hebrew
Belgian Period Hungarian
Canadian Multilingual Italian
Canadian French Icelandic
Canadian French Legacy Irish
Chinese Bopomofo Japanese
Chinese ChaiJei Kazakh
Croatian Korean
Czech (Czech Republic) Latin American
Czech (QWERTY) Norwegian
Czech (Programmers) Norwegian with Sami
Danish Polish 214
Dutch Polish Programmers
English (United States) Portuguese Brazil
English (United Kingdom) Portuguese Portugal
140 |
Technical Specifications and Options
Pre‐Boot Keyboards (auto detect)
English (US International) Romanian
English (UK Extended) Russian
Estonian Russian Typewriter
French (Belgium) Slovak
French (France) Slovak QWERTY
French (Canada) Slovenian
French (Swiss) Spanish (Spain)
Finnish Spanish (International)
Gaelic Spanish Variant
German (Standard) Swedish
German (IBM) Swiss German
Greek Thai Kedmanee
Greek Latin Turkish F
Greek 220 Turkish Q
US Dvorak
Please note – other languages are available on request. We are continuously updating
our language translations and encourage feedback from our users.
Windows Languages (auto detect)
English (United Kingdom)
English (United States)
System Requirements
Implementation documentation discussing appropriate hardware for typical
installations of Endpoint Encryption is available from your representative.
| 141
Technical Specifications and Options
Client
• Windows 2000, XP, 2003 Server, Vista 32bit (all versions), Vista 64bit (all
versions)
• 5-35MB Free hard disk space depending on localization and number of desired
users)
142 |
Appendix
Appendix
Legal Notices:
McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, 888.847.8766,
www.mcafee.com
McAfee, SafeBoot and/or other noted McAfee related products contained herein are
registered trademarks or trademarks of McAfee, Inc., and/or its affiliates in the US
and/or other countries. McAfee Red in connection with security is distinctive of McAfee
brand products. Any other non-McAfee related products, registered and/or
unregistered trademarks contained herein is only by reference and are the sole
property of their respective owners. © 2007 McAfee, Inc. All rights reserved.
Your rights to install, run, copy, reproduce, distribute or make any other use of the
accompanying software is subject to your license agreement with McAfee, Inc. If you
have any questions, please review your software license or contact your McAfee
representative.
McAfee SafeBoot products make use of the following third party open source
technologies:
License
/* zlib.h -- interface of the 'zlib' general purpose compression library
version 1.2.2, October 3rd, 2004
1. The origin of this software must not be misrepresented; you must not
| 143
Appendix
claim that you wrote the original software. If you use this software
in a product, an acknowledgment in the product documentation would
be
appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not
be
misrepresented as being the original software.
3. This notice may not be removed or altered from any source
distribution.
*/
LICENSE ISSUES
==============
The OpenSSL toolkit stays under a dual license, i.e. both the
conditions of
the OpenSSL License and the original SSLeay license apply to the
toolkit.
See below for the actual license texts. Actually both licenses are BSD-
style
Open Source licenses. In case of any license issues related to OpenSSL
please contact [email protected].
OpenSSL License
---------------
/* ====================================================================
* Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. All advertising materials mentioning features or use of this
* software must display the following acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
*
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used
to
144 |
Appendix
| 145
Appendix
146 |
Appendix
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
/*-
* Copyright (c) 1994
* The Regents of the University of California. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
| 147
Appendix
LDAP Connector
==========
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
/*-
* Copyright (c) 1994
* The Regents of the University of California. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the
distribution.
* 3. All advertising materials mentioning features or use of this
software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
148 |
Appendix
| 149
Appendix
2. To verify that the registry has been updated properly the user must install a
registry editor and navigate to
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RsvLoc
k\Verifier and verify the value of FipsMode equals 1. .
3. All application databases and external media on the device where McAfee
Endpoint Encryption for PCs has been installed MUST be fully encrypted. This is
performed by setting the module’s internal memory encryption parameter to
Encrypt Entire Device.
4. The PC used to run McAfee Endpoint Encryption for PCs Client must be built
using production grade components and configured in a single operator
• Terminal services
150 |
Appendix
• Telnet service
REGEDIT4
[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RsvLock\Ver
ifier]
"FipsMode"=dword:00000001
[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RsvLock\Ver
ifier\1]
"Path"="c:\\windows\\system32\\drivers\\SafeBoot.sys"
[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RsvLock\Ver
ifier\2]
"Path"="c:\\windows\\system32\\drivers\\SbAlg.sys"
| 151
Index
Index
decrypt, 31
A Default Password, 13, 14, 37, 74
deploy, 10, 11, 44, 45, 52, 61
Active Directory, 10
disable, 40, 57, 58
ActivIdentity, 20, 141
disabling users. See Users
algorithm, 5, 8, 12, 83, 99, 100, 140
DNS, 29, 95
Attributes
DSA, 7
explained, 6
Auditing, 66
authentication, 5, 7, 9 E
Authentication
enabling users. See Users
with a smart card, 5
encryption, 35
AutoBoot User, 33, 34
Encryption
Auto‐boot users
algorithms, 140
autoboot user, 14, 37
windows swap file, 5
Encryption Algorithm, 5, 8, 12, 99, 100, 140
B Encryption Algorithms
RC5, 140
BIOS
Endpoint Encryption. See Client
Error codes, 138
Endpoint Encryption CE Server, 8
boot once, 73
Endpoint Encryption Components
boot process, 60
Endpoint Encryption File Encryptor, 4
boot protection status, 31
VDisk, 4
Endpoint Encryption File Encryptor, 4
C Endpoint Encryption Server
cache, 66 overview of, 7
CE Server, 8 Entities
challenge / response, 71 explained, 6
Client error codes, 93, 118, 138
creating an install set, 51 error messages, 118
installing, 56
overview of, 8 F
synchronising, 60
File Encryption
using, 59
overview of, 9
Connector Manager
file group management, 44
overview of, 10
Files
cryptography, 2
deleting and exporting, 45
Cryptography
importing new, 45
decryption, 60
ini files, 85
encryption, 5, 9, 35, 100
program and driver files, 99
properties, 46
D FIPS Approved, 152
Data Recovery, 5 force sync, 15, 50, 77
152 |
Index
Force Sync, 29, 40, 50, See Machines Q
G quickstart guide, 3
groups, 13, 28, 30, 31, 37, 41, 44, 49, 51, 68, 80 R
I RC5, 140
Reboot Machine. See Machines
Importing Machines recovery, 5, 8, 9, 36, 38, 71, 72, 73, 74, 99
Importing a transfer database. See Offline Installs Recovery
IP Address, 6, 7, 8, 29, 144 offline, 71
online, 77
L registry, 11, 47, 49, 99, 101
Registry File, 49
LDAP, 8, 10 relogon, 65
removing Endpoint Encryption, 56
M reset password, 73
RSA, 8, 9
Machines
adding users to, 37
configuring, 31
S
creating, 28 SafeTech, 99
Forcing Syncronization, 29 SBAdmCL, 66
rebooting, 30 screen saver, 61
recovering, 71 service, 39
synchronisation of, 39 smart card. See Authentication
Microsoft, 5, 55, 61, 99 smartport, 141
Smarty, 140
N synchronising machines, 39
NT Domain, 10
T
O TCP/IP, 6, 7, 8, 144
Tokens
object directory, 6, 7, 8, 9, 10, 11, 12, 15, 28, 33, 35, 39, changing during recovery, 74
40, 46, 49, 52, 54, 59, 60, 63, 65, 66, 73, 95 transport database, 53
Objects troubleshooting, 117
explained, 6
Offline Installs, 52
U
P US legislation 508, 61
user status, 6
Password Users
Default, 13, 14, 37, 74 device access, 15
passwords, 5, 7, 9, 32, 61, 63 enabling and disabling, 14
Reset, 73 recovering, 71
Pentium, 144
performance, 8, 140
Placeholder, 28, 52, 53
V
Pocket Windows virus protection, 33
2002, 8
privileges, 7
| 153
Index
W Windows Logon
how it works, 64
warning text, 38
Windows 2000, 47 X
Windows CE, 8
windows logon, 32, 61, 63 X500, 8, 10
154 |