Symantec™ Encryption Desktop for Windows User's Guide

Total Page:16

File Type:pdf, Size:1020Kb

Symantec™ Encryption Desktop for Windows User's Guide Symantec™ Encryption Desktop for Windows User's Guide 10.3 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 10.3.2. Last updated: January 2014. Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Norton Zone, PGP, Pretty Good Privacy, and the PGP logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Java is a registered trademark of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party ("Third Party Programs"). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Licensed Software does not alter any rights or obligations you may have under those open source or free software licenses. For more information on the Third Party Programs, please see the Third Party Notice document for this Symantec product that may be available at http://www.symantec.com/about/profile/policies/eulas/, the Third Party Legal Notice Appendix that may be included with this Documentation and/or Third Party Legal Notice ReadMe File that may accompany this Symantec product. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED"AS IS"AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. “Commercial Computer Software and Commercial Computer Software Documentation”, as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 Symantec Home Page (http://www.symantec.com) Contents About Symantec Encryption Desktop 10.3 for Windows 1 What's New in Symantec Encryption Desktop Version 10.3 for Windows 1 Using this Guide 3 “Managed” versus “Unmanaged” Users 3 Conventions Used in This Guide 4 Who Should Read This Document 5 About Symantec Encryption Desktop Licensing 5 Licensing Symantec Encryption Desktop for Windows 6 Checking License Details 6 If Your License has Expired 7 Technical Support 8 Contacting Technical Support 9 Licensing and registration 9 Customer service 9 Support agreement resources 10 Symantec Encryption Desktop Basics 11 Symantec Encryption Desktop Terminology 11 Product Components 11 Terms Used in Symantec Encryption Desktop 12 Conventional and Public Key Cryptography 13 Using Symantec Encryption Desktop for the First Time 14 Installing Symantec Encryption Desktop 17 Before You Install 17 System Requirements 17 Terminal Services Compatibility 19 Installing and Configuring Symantec Encryption Desktop 19 Installing the Software 20 Upgrading the Software 20 Licensing Symantec Encryption Desktop 22 Running the Setup Assistant 22 Uninstalling Symantec Encryption Desktop 22 Moving Your Symantec Encryption Desktop Installation from One Computer to Another 23 The Symantec Encryption Desktop User Interface 25 Accessing Symantec Encryption Desktop Features 25 The Symantec Encryption Desktop Main Screen 26 Using the PGP Tray Icon 27 Using Shortcut Menus in Windows Explorer 28 Using the Start Menu 30 Notifier alerts 30 Notifications on Windows 8/8.1 systems 30 Notifier for Messaging 30 Notifier for Disk features 32 ii Contents Enabling or Disabling Notifiers 33 Viewing the PGP Log 34 Working with PGP Keys 37 Viewing Keys 37 Creating a Keypair 38 Passwords and Passphrases 40 Protecting Your Private Key 40 Protecting Keys and Keyrings 41 Backing up Your Private Key 42 What if You Lose Your Key? 42 Distributing Your Public Key 42 Placing Your Public Key on a Keyserver 43 Including Your Public Key in an Email Message 44 Exporting Your Public Key to a File 44 Copying from a Smart Card Directly to Someone’s Keyring 45 Getting the Public Keys of Others 45 Getting Public Keys from a Keyserver 45 Getting Public Keys from Email Messages 46 Working with Keyservers 46 Using Master Keys 47 Adding Keys to the Master Key List 48 Deleting Keys from the Master Key List 48 Managing PGP Keys 49 Examining and Setting Key Properties 49 Working With Photographic IDs 50 Managing User Names and Email Addresses on a Key 51 Importing Keys and X.509 Certificates 52 Using the Import Certificate Assistant 52 Importing X.509 Certificates Included in S/MIME Email Messages 54 Changing Your Passphrase 54 Deleting Keys, User IDs, and Signatures 54 Disabling and Enabling Public Keys 55 Verifying a Public Key 56 Signing a Public Key 57 Revoking Your Signature from a Public Key 58 Granting Trust for Key Validations 59 Working with Subkeys 59 Using Separate Subkeys 60 Viewing Subkeys 61 Creating New Subkeys 61 Specifying Key Usage for Subkeys 62 Revoking Subkeys 63 Removing Subkeys 63 Working with ADKs 63 Adding an ADK to a Keypair 63 Updating an ADK 64 Removing an ADK 64 Working with Revokers 65 Appointing a Designated Revoker 65 Contents iii Revoking a Key 65 Splitting and Rejoining Keys 66 Creating a Split Key 66 Rejoining Split Keys 67 If You Lost Your Key or Passphrase 69 Reconstructing Keys with Symantec Encryption Server 69 Creating Key Reconstruction Data 70 Reconstructing Your Key if You Lost Your Key or Passphrase 71 Protecting Your Keys 72 Securing Email Messages 73 How Symantec Encryption Desktop Secures Email Messages 73 Incoming Messages 74 Verifying Signatures on Incoming Messages 75 Understanding Annotations on Incoming Messages 76 Outgoing Messages 77 Securing Sent Items on IMAP Email Servers 77 Sending MAPI Email with Microsoft Outlook 77 Using the Sign and Encrypt Buttons in Microsoft Outlook 78 Using Offline Policy 79 Services and Policies 80 Viewing Services and Policies 81 Creating a New Messaging Service 82 Editing Messaging Service Properties 85 Disabling or Enabling a Service 85 Deleting a Service 86 Multiple Services 86 Troubleshooting PGP Messaging Services 86 Creating a New Security Policy 88 Regular Expressions in Policies 92 Security Policy Information and Examples 93 Working with the Security Policy List 97 Editing a Security Policy 97 Editing a Mailing List Policy 98 Deleting a Security Policy 101 Changing the Order of Policies in the List 102 Symantec Encryption Desktop and SSL 102 Key Modes 104 Determining Key Mode 105 Changing Key Mode 105 Encoding Formats 106 Viewing the PGP Log 106 Viewing Email with PGP Viewer 109 Overview of PGP Viewer 109 Compatible Email Clients 110 Opening an Encrypted Email Message or File 110 Copying Email Messages to Your Inbox 111 Exporting Email Messages 111 Specifying Additional Options 112 Specifying Options in PGP Viewer 112 iv Contents Security Features in PGP Viewer 113 Protecting Disks with Symantec Drive Encryption 115 About Symantec Drive Encryption 116 How does Symantec Drive Encryption Differ from PGP Virtual Disk? 117 Licensing Symantec Drive Encryption 117 Prepare Your Disk for Encryption 118 Supported Disk Types 119 Supported Keyboards 121 Supported Input Method Editors (IME) 123 Ensure Disk Health Before Encryption 123 How to Determine if Your Windows System is Running in UEFI Mode 123 Calculate the Encryption Duration 124 Maintain Power Throughout Encryption 124 Run a Pilot Test to Ensure Software Compatibility 125 Determining the Authentication Method for the Disk 125 Passphrase and Single Sign-On Authentication 126 Public Key Authentication 126 Token-Based Authentication 126 Trusted Platform Module (TPM) Authentication 127 Setting Encryption Options 128 Partition-Level Encryption 128 Preparing a Smart Card or Token to Use For Authentication 129 Using Symantec Drive Encryption Options 132 Encrypting a Disk or Partition 132 Supported Characters for Symantec Drive Encryption Passphrases 133 Encrypting the Disk 134 Encountering Disk Errors During Encryption 136 Using a Symantec Drive Encryption-Encrypted Disk 137 Authenticating at the PGP BootGuard Screen 137 Selecting Keyboard Layouts 142 Using Symantec Drive Encryption Single Sign-On 144 Prerequisites for Using Single Sign-On 145 Encrypting the Disk to Use Single Sign-On 145 Using the 'Fast Startup' Option with Single Sign-On on Windows 8/8.1 146 Multiple Users and Single Sign-On 146 Logging in with Single Sign-On 146 Changing Your Passphrase With Single Sign-On 147 Displaying the Windows Login dialog box 147 Maintaining the Security of Your Disk 148 Getting
Recommended publications
  • Norton Antivirus™ Producthandleiding
    NortonTM AntiVirus Producthandleiding Zorg voor het milieu: een vanzelfsprekende zaak. Symantec heeft de kaft van deze handleiding verwijderd om de ecologische voetafdruk van onze producten te verkleinen. Deze handleiding is gemaakt van gerecyclede materialen. Norton AntiVirus™ Producthandleiding De software die in deze handleiding wordt beschreven, wordt geleverd met een licentieovereenkomst en mag alleen worden gebruikt in overeenstemming met de voorwaarden in deze overeenkomst. Documentatieversie 21.0 Copyright © 2013 Symantec Corporation. Alle rechten voorbehouden. Symantec, het Symantec-logo, LiveUpdate, Norton 360 en Norton zijn handelsmerken of gedeponeerde handelsmerken van Symantec Corporation of haar aangesloten ondernemingen in de Verenigde Staten en andere landen. Delen van dit product Copyright 1996-2011 Glyph & Cog, LLC. Andere namen kunnen handelsmerken zijn van hun respectieve eigenaars. Het product dat in dit document wordt beschreven, wordt gedistribueerd onder licenties waarmee het gebruik, het kopiëren, het distribueren en het decompileren/toepassen van reverse-engineering ervan wordt beperkt. Geen enkel deel van dit document mag worden gereproduceerd in enige vorm op enige wijze zonder voorafgaande schriftelijke toestemming van Symantec Corporation en zijn eventuele licentiegevers. DE DOCUMENTATIE WORDT ALS ZODANIG GELEVERD EN ALLE EXPLICIETE OF IMPLICIETE VOORWAARDEN, REPRESENTATIES EN GARANTIES, WAARONDER IMPLICIETE GARANTIES VAN VERHANDELBAARHEID, GESCHIKTHEID VOOR EEN BEPAALD DOEL OF NIET-INBREUKMAKENDHEID, WORDEN
    [Show full text]
  • Numbers Are Footnotes for Positions Referenced Below
    Gary L. Wade 320 Crescent Village Circle Unit 1396 San Jose, CA 95134 [email protected] 949-505-3223 KEY EXPERIENCES • Passion for developing solutions for Apple Inc.’s platforms (macOS, iOS, tvOS, watchOS) • Innovative in usability design and testing, and refactoring for performance • Design and development of multi-platform client/server/cloud software solutions • Facilitate instruction for technical and non-technical staff including one-on-one mentoring CURRENT TALENT SUMMARY (numbers are footnotes for positions referenced below) • Adobe Photoshop (24,17,10,9,8,1) • Macintosh (Mac OS X) SDK (28,27,26,21,20, • AppKit/macOS (28,27,26,21,20,19,18,17,1) 19,18,17,16,15,14,13,12,11,8,7,6,5,4,2,1) • C (28,27,26,24,23,22,21,20,19,18,17,16,15,14, • Objective-C (28,27,26,24,23,22,21,20,19,18, 13,12,11,8,7,6,5,4,1) 17,1) • C++ (21,20,18,17,16,15,14,13,12,11,8,7,6,5,1) • Perforce (21,20,15) • Client/Server/Cloud (28,27,26,25,24,22,21,20, • Quality Assurance (25,24,17,3,1) 19,18,17,16,13,7,6,4) • QuickTime/AVKit (25,24,22,17,13,10,9,6,5) • Cocoa (28,27,26,25,24,23,22,21,20,19,18,17,1) • REST (28,27,26,25,24,22,21) • CoreFoundation (28,27,26,22,21,20,18,17,16, • Sales support (21,10,9,6,1) 15,14,13,12,1) • sqlite (23) • Cross-platform (28,27,21,20,17,15,14,13,12,8, • Subversion (27,22,19,18,1) 7,6,5,4,2) • Swift (28,27,26,25,24) • git (28,27,26,25,24,23,22) • UIKit/iOS (28,27,26,24,23,22,1) • HTML (28,27,26,25,17,14,12,10,9,1) • UIKit/tvOS (25) • Int.
    [Show full text]
  • Cyber Risk Mitigation 57 • Mitigation for Small-Sized Organizations 60 • Mitigation for Medium-Sized Organizations 67 • Mitigation for Large-Sized Organizations 72
    Media Impact International CYBER SECURITY REPORT Media Impact International Revised February 14, 2017 Media Impact International TABLE OF CONTENTS 1. Executive Summary 2 2. Introduction: Cyber Security in the Missional Context 5 3. Cyber Threats 8 4. Cyber Security Survey 28 5. Cyber Risk Assessment 50 6. Cyber Risk Mitigation 57 • Mitigation for Small-sized Organizations 60 • Mitigation for Medium-sized Organizations 67 • Mitigation for Large-sized Organizations 72 7. Appendix 75 • A – Small Business Implementation of the CSCS Part 1 • B – Small Business Implementation of the CSCS Part 2 • C – Critical Controls Poster 2016 • D – IBM MaaS360 Bundles • E – Vetted Service Providers • F – Models of Social Media / Communication Policies • G – Model of Password Policy • H – Phishing Training Model • I – Sensitive Information Reduction • J – Survey Questions • K – C3 Guidelines for Email • L – C3 Guidelines for VPN • M – C3 Guidelines for Messaging • N – Additional Country Profiles Copyright © 2017 Media Impact International MII would like to acknowledge and thank 100fold and its Director for serving as the lead researcher for this report, and the countless hours committed to this important project. MII also appreciates the many cyber professionals – inside and outside of the missional world – that provided counsel and expertise for this report. Revised February 14, 2017 1 Media Impact International EXECUTIVE SUMMARY Overview While Cyber Security breaches are often in the news, the impact of cyber security breaches on field ministry is often kept secret. In our su - vey of 30 key MENA ministries, we found that mission organizations were not only experi- encing financial loss (perhaps in the millions of dollars), but more than 50% had staff or seek- ers that experienced arrest or harassment, prison, expulsion – and even death – due to cyber security breaches.
    [Show full text]
  • OSINT Handbook September 2020
    OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 Aleksandra Bielska Noa Rebecca Kurz, Yves Baumgartner, Vytenis Benetis 2 Foreword I am delighted to share with you the 2020 edition of the OSINT Tools and Resources Handbook. Once again, the Handbook has been revised and updated to reflect the evolution of this discipline, and the many strategic, operational and technical challenges OSINT practitioners have to grapple with. Given the speed of change on the web, some might question the wisdom of pulling together such a resource. What’s wrong with the Top 10 tools, or the Top 100? There are only so many resources one can bookmark after all. Such arguments are not without merit. My fear, however, is that they are also shortsighted. I offer four reasons why. To begin, a shortlist betrays the widening spectrum of OSINT practice. Whereas OSINT was once the preserve of analysts working in national security, it now embraces a growing class of professionals in fields as diverse as journalism, cybersecurity, investment research, crisis management and human rights. A limited toolkit can never satisfy all of these constituencies. Second, a good OSINT practitioner is someone who is comfortable working with different tools, sources and collection strategies. The temptation toward narrow specialisation in OSINT is one that has to be resisted. Why? Because no research task is ever as tidy as the customer’s requirements are likely to suggest. Third, is the inevitable realisation that good tool awareness is equivalent to good source awareness. Indeed, the right tool can determine whether you harvest the right information.
    [Show full text]
  • Norton 360TM
    Norton 360TM Manuel du produit Prenons soin de notre environnement. Nous avons décidé de supprimer la couverture de ce manuel afin de réduire l'empreinte écologique de nos produits. Ce manuel est constitué à partir de matériaux recyclés. Manuel du produit Norton 360™ Le logiciel décrit dans ce manuel est fourni dans le cadre d'un contrat de licence et ne peut être utilisé qu'en accord avec les conditions de ce contrat. Documentation version 21.0 Copyright © 2013 Symantec Corporation. Tous droits réservés. Symantec, le logo Symantec, LiveUpdate, Norton 360 et Norton sont des marques commerciales ou déposées de Symantec Corporation ou de ses sociétés affiliées aux Etats-Unis et dans d'autres pays. Copyright sur les parties de ce produit 1996-2011 Glyph & Cog, LLC. Les autres noms peuvent être des marques de leurs détenteurs respectifs. Le produit décrit dans ce document est distribué aux termes d'une licence limitant son utilisation, sa copie, sa distribution et sa décompilation/ingénierie inverse. Ce document ne peut, en tout ou partie, être reproduit sous aucune forme et par aucun moyen sans l'autorisation préalable écrite de Symantec Corporation et de ses concédants éventuels. LA DOCUMENTATION EST FOURNIE "EN L'ETAT" ET TOUTE GARANTIE OU CONDITION D'AUCUNE SORTE, EXPRESSE OU IMPLICITE, Y COMPRIS, SANS QUE CELA SOIT LIMITATIF, LES GARANTIES OU CONDITIONS IMPLICITES DE QUALITE MARCHANDE, D'ADEQUATION A UN USAGE PARTICULIER OU DE RESPECT DES DROITS DE PROPRIETE INTELLECTUELLE EST REFUTEE, EXCEPTÉ DANS LA MESURE OÙ DE TELLES EXCLUSIONS SERAIENT TENUES POUR LEGALEMENT NON VALIDES. SYMANTEC CORPORATION NE PEUT ETRE TENUE POUR RESPONSABLE DES DOMMAGES DIRECTS OU INDIRECTS RELATIFS AU CONTENU OU A L'UTILISATION DE LA PRESENTE DOCUMENTATION.
    [Show full text]
  • List of New Applications Added in ARL #2576
    List of New Applications Added in ARL #2576 Application Name Publisher NetCmdlets 4.0 /n software NetCmdlets 3.1 /n software SecureBlackbox.NET 8.0 /n software NetCmdlets 3.0 /n software EldoS SFTP Net Drive 1.0 /n software Tenup 20190117 1010data Tendo 20151112 1010data Tendo 20160205 1010data Tendo 20190905 1010data Tendo 20170723 1010data Tendo 20161207 1010data 1042-S Pro 2016 Professional 1099 Pro Manager (10ZiG Manager) 3.0 10ZIG Technology DataParser 7.5 17a-4 1E Agent 7.2 1E SyncBackSE 8.2 2BrightSparks 2c8 Modeling Tool 4.2 2conciliate Business Solutions TaxACT 2017 2nd Story Software TaxACT 2018 2nd Story Software Complete Anatomy 5.0 3D4Medical Clean-Trace Hygiene Management 1.3 3M Core Grouping Software 2019 3M Core Grouping Software Client 2019 3M DWG DXF Converter 1.1 3nity Softwares Studio 3T 2020.9 3T Software Labs MongoChef 4.5 3T Software Labs MP4 to MP3 Converter 6.8 4Media Software Studio SendLater 3.4 4Team Disk Dril 3.7 508 Software Disk Dril 1.0 508 Software Disk Dril 3.5 508 Software Disk Dril 3.6 508 Software DoublePane 1.7 5am Code 7-PDF Maker 1.5 7-PDF Network Utility 2.2 8x8 Virtual Office Desktop 6.1 8x8 Virtual Office Desktop 6.4 8x8 Virtual Office Desktop 5.6 8x8 Virtual Office Desktop 6.7 8x8 ASAP Utilities 7.8 A Must in Every Office SafeSign 3.5 A.E.T. Europe BestSRQ Services 2015 A.M. Best Company BestESP Services Workstation 2012 A.M. Best Company BestESP Services Workstation A.M.
    [Show full text]
  • Report on Digital and Physical Security Trainings Held from 16Th to 19Th October, 2019 at Kilifi Bay Hotel
    REPORT ON DIGITAL AND PHYSICAL SECURITY TRAININGS HELD FROM 16TH TO 19TH OCTOBER, 2019 AT KILIFI BAY HOTEL OCTOBER, 2019. Prepared by: Tom Bicko Ooko, Project Officer, CJGEA Contents 1.0 DIGITAL SECURITY TRAINING NARRATIVE REPORT ...................................... 1 Wednesday October 16th. ........................................................................................................ 1 Introduction .............................................................................................................................. 1 Objectives of the training ........................................................................................................ 1 Commencement of the training .............................................................................................. 2 Introduction ............................................................................................................................ 2 Threat modelling ...................................................................................................................... 3 Threat assessment .................................................................................................................... 4 Threat actors ............................................................................................................................ 5 Forms of threats ....................................................................................................................... 5 Threat Analysis .......................................................................................................................
    [Show full text]
  • Norton 360TM
    Norton 360TM Produkthandbuch Umweltschutz ist wichtig. Symantec hat dieses Handbuch ohne Umschlag gestaltet, um die Einwirkung auf die Umwelt durch unsere Produkte zu reduzieren. Dieses Handbuch wurde aus recycelten Stoffen hergestellt. Norton 360™ Produkthandbuch Die in diesem Handbuch beschriebene Software wird unter einer Lizenzvereinbarung bereitgestellt und darf nur gemäß den Bedingungen der Lizenzvereinbarung verwendet werden. Dokumentationsversion 21.0 Copyright © 2013 Symantec Corporation. Alle Rechte vorbehalten. Symantec, das Symantec-Logo, LiveUpdate und Norton 360 sind Marken oder eingetragene Marken der Symantec Corporation oder ihrer Tochtergesellschaften in den USA und anderen Ländern. Das Copyright für Teile dieses Produkts liegt bei Glyph & Cog, LLC. 1996–2011. Andere Bezeichnungen können Marken anderer Rechteinhaber sein. Die in diesem Handbuch beschriebene Software wird Ihnen im Rahmen einer Lizenzvereinbarung zur Verfügung gestellt und darf nur unter den darin beschriebenen Bedingungen eingesetzt, kopiert, verteilt, dekompiliert und zurückentwickelt werden. Kein Teil dieser Veröffentlichung darf ohne ausdrückliche schriftliche Genehmigung der Symantec Corporation und ihrer Lizenzgeber vervielfältigt werden. DIE DOKUMENTATION WIRD "OHNE MÄNGELGEWÄHR" GELIEFERT. ALLE AUSDRÜCKLICHEN ODER STILLSCHWEIGENDEN BEDINGUNGEN, DARSTELLUNGEN UND GEWÄHRLEISTUNGEN EINSCHLIESSLICH DER STILLSCHWEIGENDEN GEWÄHRLEISTUNG DER MARKTGÄNGIGKEIT, EIGNUNG FÜR EINEN BESTIMMTEN ZWECK ODER NICHTÜBERTRETUNG SIND UNGÜLTIG, SOFERN DIESER HAFTUNGSAUSSCHLUSS
    [Show full text]
  • Podręcznik Użytkownika
    Podręcznik użytkownika Troska o środowisko to słuszna sprawa. Firma Symantec usunęła okładkę z tego podręcznika, aby zmniejszyć niekorzystny wpływ swych produktów na środowisko. Do produkcji tego podręcznika użyto surowców wtórnych. Podręcznik użytkownika programu Norton™ Internet Security Oprogramowanie opisane w niniejszym podręczniku jest dostarczane w ramach umowy licencyjnej i może być używane jedynie zgodnie z postanowieniami tej umowy. Wersja dokumentacji 21.0 Copyright © 2013 Symantec Corporation. Wszystkie prawa zastrzeżone. Nazwa Symantec i logo Symantec, nazwy LiveUpdate, Norton 360 oraz Norton to znaki towarowe lub zastrzeżone znaki towarowe firmy Symantec Corporation lub jej oddziałów, zarejestrowane w USA i innych krajach. Prawa autorskie do części tego produktu: Copyright 1996-2011 Glyph & Cog, LLC. Inne nazwy mogą być znakami towarowymi należącymi do odpowiednich właścicieli. Produkt opisany w tym dokumencie jest dystrybuowany na licencji ograniczającej jego używanie, kopiowanie, dystrybucję i dekompilację/inżynierię odwrotną. Żadnej części tego dokumentu nie wolno powielać w jakiejkolwiek postaci za pomocą jakichkolwiek środków bez wcześniejszej pisemnej zgody firmy Symantec Corporation i jej oddziałów. TA DOKUMENTACJA JEST DOSTARCZANA W STANIE, „W JAKIM JEST” I WSZELKIE JAWNE LUB DOROZUMIANE WARUNKI, ZOBOWIĄZANIA I GWARANCJE, WŁĄCZNIE Z DOROZUMIANYMI GWARANCJAMI PRZYDATNOŚCI HANDLOWEJ, PRZYDATNOŚCI DO JAKIEGOKOLWIEK OKREŚLONEGO CELU I GWARANCJAMI NIENARUSZANIA PRAW WŁASNOŚCI INTELEKTUALNEJ SĄ WYKLUCZONE W STOPNIU DOPUSZCZALNYM
    [Show full text]
  • List of Versions Added in ARL #2576
    List of Versions Added in ARL #2576 Publisher Product Version /n software NetCmdlets 4.0 /n software NetCmdlets 3.1 /n software SecureBlackbox.NET 8.0 /n software NetCmdlets 3.0 /n software EldoS SFTP Net Drive 1.0 1010data Tendo 20151112 1010data Tendo 20160205 1010data Tendo 20190905 1010data Tendo 20170723 1010data Tendo 20161207 1010data Tenup 20190117 1099 Pro 1042-S Pro 2016 10ZIG Technology Manager (10ZiG Manager) 3.0 17a-4 DataParser 7.5 1E 1E Agent 7.2 2BrightSparks SyncBackSE 8.2 2conciliate Business Solutions 2c8 Modeling Tool 4.2 2nd Story Software TaxACT 2018 2nd Story Software TaxACT 2017 3D4Medical Complete Anatomy 5.0 3M Clean-Trace Hygiene Management 1.3 3M Core Grouping Software 2019 3M Core Grouping Software Client 2019 3nity Softwares DWG DXF Converter 1.1 3T Software Labs Studio 3T 2020.9 3T Software Labs Studio 3T 4.5 4Media Software Studio MP4 to MP3 Converter 6.8 4Team SendLater 3.4 508 Software Disk Dril 3.6 508 Software Disk Dril 1.0 508 Software Disk Dril 3.5 508 Software Disk Dril 3.7 5am Code DoublePane 1.7 7-PDF 7-PDF Maker 1.5 8x8 Network Utility 2.2 8x8 Virtual Office Desktop 6.1 8x8 Virtual Office Desktop 6.4 8x8 Virtual Office Desktop 5.6 8x8 Virtual Office Desktop 6.7 A Must in Every Office ASAP Utilities 7.8 A.E.T. Europe SafeSign 3.5 A.M. Best Company BestSRQ Services 2015 A.M. Best Company BestESP Services Workstation 2012 A.M. Best Company BestESP Services Workstation Unspecified A.M.
    [Show full text]
  • Young,Gifted–Anddigitallysavvy
    FT SPECIAL REPORT The Connected Business Wednesday January 29 2014 www.ft.com/reports | @ftreports Inside » Tricky customers Understanding data about consumers will be the next big differentiator Page 2 Lack of clarity on paybacks Normal metrics ‘don’t always apply’ to digital initiatives Page 2 Cloud cover Hybrid approach gives companies greater control over processes Bold is beautiful: analysts say organisations will not maximise the benefits of their digital strategies unless they think holistically and avoid a piecemeal approach. See Page 2 Oivind Hovland Page 3 Takeover is snug fit for Wolverine Cloud helps US shoemaker handle Young, gifted – and digitally savvy $1bn purchase Page 3 Trends for 2014 rate policy that restricted use of Jive to make internal communica- vacy. “If you are working on an M&A just another set of software tools. IT departments have their own mobile devices at work. tions more efficient. deal, you can create a group on the When done right, they will flatten Mobility and Some 70 per cent said they had used a “In many cases, adoption is driven platform that is entirely private, that organisational structures and open up analytics will be long been wary of the personal account on a cloud storage by the fact that a younger generation you would never know existed unless the way companies communicate.” under-30s but are provider such as Dropbox for work is coming in. It is a generation that you were invited to join it,” says Mr These are big claims which may or high on corporate purposes. does not use email in their personal Antebi.
    [Show full text]
  • Norton Zone: Symantec's Secure Cloud Storage System
    Norton Zone: Symantec’s Secure Cloud Storage System Walter Bogorad Scott Schneider Haibin Zhang Symantec Inc Symantec Research Labs University of North Carolina at Chapel Hill walter [email protected] [email protected] [email protected] Abstract—Cloud storage services are the way of the future, if Some less popular file hosting and sharing services, such not the present, but broad adoption is limited by a stark trade-off as Mega [31], SpiderOak [40], and Wuala [44], provide on- between privacy and functionality. Many popular cloud services premise security. These systems guarantee much better user provide search capabilities, but make only nominal efforts to keep user data fully private. Alternatives that search private user data privacy. They simply allow clients to encrypt their own data on an untrusted server sacrifice functionality and/or scalability. and then upload the ciphertext. These services have no access We describe Norton Zone, Symantec’s secure and scalable to user plaintext, so they cannot search user data with a public storage system based on our valet security model. Whereas strictly server-side implementation. None support encrypted most commercial cloud storage systems secure user data with search, perhaps because of its complexity or perhaps because access control and legal mechanisms, Zone’s cryptographic techniques provide proven privacy guarantees. This gives users of the computational requirements it puts on the client. This an extra layer of security without compromising functionality. requirement is particularly prohibitive for devices such as Zone’s performance is comparable to unencrypted cloud storage tablets and mobile phones. systems that support search and sharing.
    [Show full text]