About the Integration of Mac OS X Devices Into a Centrally Managed UNIX Environment Anton Schultschik – ETH, Zurich, Switzerland

Total Page:16

File Type:pdf, Size:1020Kb

About the Integration of Mac OS X Devices Into a Centrally Managed UNIX Environment Anton Schultschik – ETH, Zurich, Switzerland About the Integration of Mac OS X Devices into a Centrally Managed UNIX Environment Anton Schultschik – ETH, Zurich, Switzerland ABSTRACT The UNIX flavors in use today have so much in common that centralized management of UNIX systems has become almost standard. Since Mac OS X is based on BSD-UNIX it is a promising candidate for integration into a centrally managed UNIX environment. Starting from generic administration concepts, this paper develops an integrated management concept that handles fully automated installation and configuration of hosts. The concept includes a centralized application management system for console and graphical Mac OS X applications. The management concept is then implemented based exclusively on standard UNIX tools. The necessary extensions of these tools to make Mac OS X conform to UNIX standards are presented, including a proxy tool to forward AppleEvents which facilitate the interprocess communication for centrally managed graphical Mac OS X applications. Introduction implementation and deployment of such a system will be layed out built on some basic principles. The result will The increasing diversity of hardware and soft- be a management system for UNIX systems that can be ware makes system management more difficult. Shorter life-cycles of computer systems require more used to manage network-based as well as stand-alone sys- frequent upgrades or replacement of hardware and as a tems. consequence, the installed computers on a large site In system management three basic principles rarely are uniform in hardware but rather split into sev- keep appearing in tools and methods [1], and these eral uniform clusters. Automated management of such shall be used as orientation for our integrated manage- an environment is challenging as complexity grows ment system: with each new configuration of hardware and software. • Reproducibility ensures that the same action produces identical results. Automation, a way to implement reproducibility, helps to exclude human error in repetitive tasks. • Comprehensibility of all actions is necessary for the administrator especially when troubleshoot- ing or modifying the configuration. • Avoidance of Redundancy helps to keep data consistent and thus easier to manage. Mac OS X is UNIX Plus . Mac OS X unites the strengths in UI and applica- tion design of previous Macintosh operating systems with the stability and flexibility of a modern UNIX platform. Integrating Mac OS X into a general UNIX environment requires a closer look at the operating Figure 1: Structure of the Mac OS X operating sys- system since not all parts in Mac OS X have their ori- tem (from [2]). gin in the UNIX world: • Darwin: Darwin is based on Free-BSD includ- Through integrated management of the clusters ing the standard UNIX network clients and common tools and common configuration information servers as well as the usual user space utilities. can be reused across the clusters thus reducing the amount The appearance of some daemons and configu- of information required to fully understand the entire site. ration files have been modified to match with Wi t h Mac OS X being a member of the UNIX family the rest of Mac OS X. integrated management of Mac OS X in a UNIX environ- • Quartz, OpenGL, QuickTime: Instead of ment comes within reach. In this paper, design, relying on the UNIX X11 standard, Apple 19th Large Installation System Administration Conference (LISA ’05) 63 About the Integration of Mac OS X Devices into a Centrally Managed UNIX Environment Schultschik decided to build an alternative graphic system. images are required when managing multiple host con- • Classic: The Classic environment provides figurations. Consequently, each image would redun- emulation support for native pre-OSX applica- dantly contain commonly installed packages making tions. These applications only work with the management of NetInstall a difficult task in a het- Apple’s HFS/HFS+ filesystem. erogeneous environment. • Carbon: The Carbon library framework pro- Net-Restore vides compatibility to pre-OSX system calls at Mike Bombich’s NetRestore [5] is a suite of GUI source code level. Carbonized applications also tools that are based on ASR, Apple’s image manage- run on non-HFS filesystems through Carbon’s ment tool [6]. An installation is started by net-booting HFS emulation although with reduced stability. a target host into the NetRestore installer in which the Cocoa: Providing an entire new standard for • administrator selects the image to be restored to the application development, Cocoa is based on local disk. The individual images are supplied through modern, UNIX compatible technologies like a network share along with post-installation scripts for XML and Java. the individual configuration of the installed host. • Aqua: The top layer of Figure 1 represents the graphical user interface on which the different Since the restored system is identical with the GUI applications run. source image the installation itself clearly is repro- ducible. However creation and maintenance of the Looking at the entire operating system, the Dar- source image is done by hand and the final system can win roots as well as modern Cocoa-based applications not be comprehensible as a whole. An administrator nei- are fully compatible with the rest of the UNIX world ther explicitly sees why a system is in the current state even though Apple did not use the X11 standards in nor completely understands the consequences of each their graphics system. Thus the key challenge in man- manual step during assembly. As with NetInstall in the aging a Mac OS X system as a UNIX is the handling previous section the management of several configura- of legacy applications and their specialties. tions implies the use of multiple disk images introducing Review of Available Tools redundancy between the manually maintained images. Sun Solaris Jumpstart Several system management tools are available under Mac OS X that focus on three different manage- Network based installation is done by net-boot- ment areas: ing an installation target into the Sun Solaris Jumpstart • Installation of the operating system [7] system. Once booted Jumpstart uses DHCP and • Configuration of operating system and appli- DNS to determine the correct configuration list of cations packages and appropriate pre/post-processing scripts. • Software distribution or installation onto an The Jumpstart configuration concept is simple installed host and yet capable of comprehensibly handling individual The management tools need to be applicable on classic configurations. Its design for completely unattended UNIX flavors while supporting the Mac OS X specific installation makes the Jumpstart system reproducible. extensions, e.g., legacy application support. Several Configuration Tools candidate tools were considered, and their strengths and To reproducibly maintain the configuration of weaknesses will be discussed in the following sections. systems, especially in a heterogeneous environment, Installation Tools automated tools are essential. However to provide the Several strategies can be chosen to install an necessary comprehensibility, configuration information operating system onto a target host. Network-based consisting of a large number of modifications for a tar- installation allows access to centralized services and is get system must be structured into modules. By postu- logistically efficient. Therefore only network-based lating module integrity, i.e., that no module destroys installer methods are considered in the choice of tools. the modifications of another, reuse of modules becomes NetInstall possible, thus controlling unwanted redundancy. The following three tools fulfill this basic requirement. Apple provides a native mechanism [3] to install multiple client machines based on the installation of Cfengine packages (.pkg bundles [4]). The target host of an One of the best known tools comes from Mark installation is net-booted from a modified disk image Burgess of Oslo University College. Cfengine [8] is a that will start an installer system. The installer then highly flexible scripting system that deducts its configu- installs packages supplied on the booted image. ration based on the context of a managed host. Cfengine The package-based approach of NetInstall yields supports various UNIX flavors including Mac OS X reproducible and certainly comprehensible results since and is equipped with its own file sharing mechanism. all changes on the installed system have their source in Provided that Cfengine is run in the same con- one of the installed packages. As the installer image can text, reproducible results can be expected, and modu- only contain a single configuration several NetInstall larization is provided through the classes construct. 64 19th Large Installation System Administration Conference (LISA ’05) Schultschik About the Integration of Mac OS X Devices into a Centrally Managed UNIX Environment However, since Cfengine does not enforce integrity of installing applications file by file into an existing actions or classes, configuration scripts can easily installation each SEPP-package encapsulates a ready- exceed the state of comprehensibility. to-use application within a separate directory. Once Radmind this package directory has been copied or mounted Radmind [9] is available on various UNIX over NFS the packaged applications are made accessi- dialects including Mac OS X. Designed for ease of ble to the user using stub scripts. By design SEPP sup- use, Radmind implements
Recommended publications
  • Dropdmg 3.6.2 Manual
    DropDMG 3.6.2 Manual C-Command Software c-command.com February 16, 2021 Contents 1 Introduction 4 1.1 Feature List..............................................4 2 Installing and Updating 6 2.1 Requirements.............................................6 2.2 Installing DropDMG.........................................7 2.3 Updating From a Previous Version.................................7 2.4 Reinstalling a Fresh Copy......................................8 2.5 Uninstalling DropDMG.......................................9 2.6 Security & Privacy Access......................................9 3 Using DropDMG 13 3.1 Basics................................................. 13 3.2 Making a Bootable Device Image of a Hard Drive......................... 14 3.3 Backing Up Your Files to CD/DVD................................ 16 3.4 Burning Backups of CDs/DVDs................................... 17 3.5 Restoring Files and Disks...................................... 18 3.6 Making Images With Background Pictures............................. 19 3.7 Protecting Your Files With Encryption............................... 20 3.8 Transferring Files Securely...................................... 21 3.9 Sharing Licenses and Layouts.................................... 21 3.10 Splitting a File or Folder Into Pieces................................ 22 3.11 Creating a DropDMG Quick Action................................ 22 4 Menus 23 4.1 The DropDMG Menu........................................ 23 4.1.1 About DropDMG...................................... 23 4.1.2 Software
    [Show full text]
  • Mac OS X Enterprise Application Management Best Practices Macosxlabs.Org
    Mac OS X Enterprise Application Management Best Practices macosxlabs.org Richard Glaser, University of Utah Philip Rinehart, Yale University June 21, 2004 Contents 1 Abstract 1 1.1 Preface . 1 1.2 Audience . 2 1.3 Factors in the enterprise . 3 1.4 Comments and Questions . 4 2 Serialization of applications 4 2.0.1 Network Detection . 5 2.0.2 Server metering . 5 2.1 Hardware serialization . 7 2.1.1 Hardware Locks . 7 2.1.2 Media verification . 9 2.1.3 Challenge/Response . 9 3 Security 10 3.1 Permissions and File Modes . 11 3.1.1 SUID . 11 3.1.2 World writable directories . 13 3.2 Unnecessary open ports . 14 3.3 Startup items and root daemons . 14 3.4 Tripwire . 14 4 Installation 16 4.1 Log Files . 17 4.2 Administrative or root rights . 17 4.3 Non-standard location . 17 4.4 Broken links . 18 4.5 Path limitations . 19 4.5.1 File name limitation . 19 4.5.2 Directory location limitations . 19 ii 5 Missing Support and Features 19 5.1 Legacy application support . 20 5.2 Human Resources software . 20 5.3 Web-based instructional software . 21 5.4 Geographic Information Systems Support . 21 5.5 Backup software . 21 5.6 Lack of any Mac OS X alternative . 21 6 Distribution issues 22 6.1 Network Home Directories . 24 6.2 Resource forks . 25 6.3 Non-standard serialization . 25 6.4 Scratch space management . 26 6.5 ByHost preferences . 26 6.6 Auto launched application preferences . 26 6.7 File Attributes .
    [Show full text]
  • The Apple Ecosystem
    APPENDIX A The Apple Ecosystem There are a lot of applications used to manage Apple devices in one way or another. Additionally, here’s a list of tools, sorted alphabetically per category in order to remain vendor agnostic. Antivirus Solutions for scanning Macs for viruses and other malware. • AVG: Basic antivirus and spyware detection and remediation. • Avast: Centralized antivirus with a cloud console for tracking incidents and device status. • Avira: Antivirus and a browser extension. Avira Connect allows you to view device status online. • BitDefender: Antivirus and malware managed from a central console. • CarbonBlack: Antivirus and Application Control. • Cylance: Ransomware, advanced threats, fileless malware, and malicious documents in addition to standard antivirus. • Kaspersky: Antivirus with a centralized cloud dashboard to track device status. © Charles Edge and Rich Trouton 2020 707 C. Edge and R. Trouton, Apple Device Management, https://doi.org/10.1007/978-1-4842-5388-5 APPENDIX A THe AppLe ECOSYSteM • Malware Bytes: Antivirus and malware managed from a central console. • McAfee Endpoint Security: Antivirus and advanced threat management with a centralized server to track devices. • Sophos: Antivirus and malware managed from a central console. • Symantec Mobile Device Management: Antivirus and malware managed from a central console. • Trend Micro Endpoint Security: Application whitelisting, antivirus, and ransomware protection in a centralized console. • Wandera: Malicious hot-spot monitoring, jailbreak detection, web gateway for mobile threat detection that integrates with common MDM solutions. Automation Tools Scripty tools used to automate management on the Mac • AutoCasperNBI: Automates the creation of NetBoot Images (read: NBI’s) for use with Casper Imaging. • AutoDMG: Takes a macOS installer (10.10 or newer) and builds a system image suitable for deployment with Imagr, DeployStudio, LANrev, Jamf Pro, and other asr or Apple Systems Restore-based imaging tools.
    [Show full text]
  • 1 Welcome to the Superduper!
    Welcome to the SuperDuper! User’s Guide! This guide is designed to get you up and running as fast as possible. We’ve taken the most common tasks people perform with SuperDuper!, each placed in its own chapter, and have provided step-by-step guidance (including lots of pictures). In here you’ll find out how to: • Back up your Macintosh for the first time • Update an existing backup • Schedule one or multiple backups • Store a backup alongside other files on a destination drive • Back up your Macintosh over a network • Exclude a folder from a backup • Restore files from a backup • Restore an entire drive in an emergency situation • Troubleshooting We’ve also included a complete program reference, and some more advanced topics, such as: • Creating a Sandbox • Maintaining a Sandbox • Applying (and recovering from) System Updates while running from a Sandbox Note that SuperDuper operates in two different “modes” – registered and unregistered. The unregistered version allows easy, complete and user- specific backup clones to partitions, FireWire drives, and image files. 1 Once registered, SuperDuper allows you to schedule backups, quickly update backups with Smart Update (saving a lot of time), select “copy modes” other than Erase, then copy, create Sandboxes, fully customize the copying process using its unique Copy Scripts, save and restore settings, and avoid authenticating every time you copy. And, on top of that, it allows us to eat. Disclaimer Although SuperDuper! has been carefully tested, and should perform its functions without data loss, you use this software at your own risk and without any warranty.
    [Show full text]
  • Mac OS X Server Introduction to Command-Line Administration Version 10.6 Snow Leopard Kkapple Inc
    Mac OS X Server Introduction to Command-Line Administration Version 10.6 Snow Leopard K Apple Inc. Apple Remote Desktop, Finder, and Snow Leopard are © 2009 Apple Inc. All rights reserved. trademarks of Apple Inc. Under the copyright laws, this manual may not AIX is a trademark of IBM Corp., registered in the U.S. be copied, in whole or in part, without the written and other countries, and is being used under license. consent of Apple. The Bluetooth® word mark and logos are registered The Apple logo is a trademark of Apple Inc., registered trademarks owned by Bluetooth SIG, Inc. and any use in the U.S. and other countries. Use of the “keyboard” of such marks by Apple is under license. Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may This product includes software developed by the constitute trademark infringement and unfair University of California, Berkeley, FreeBSD, Inc., competition in violation of federal and state laws. The NetBSD Foundation, Inc., and their respective contributors. Every effort has been made to ensure that the information in this manual is accurate. Apple is not Java™ and all Java-based trademarks and logos responsible for printing or clerical errors. are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Apple 1 Infinite Loop PowerPC™ and the PowerPC logo™ are trademarks Cupertino, CA 95014 of International Business Machines Corporation, used 408-996-1010 under license therefrom. www.apple.com UNIX® is a registered trademark of The Open Group. Apple, the Apple logo, AppleScript, FireWire, Keychain, Other company and product names mentioned herein Leopard, Mac, Mac OS, Quartz, Safari, Xcode, Xgrid, and are trademarks of their respective companies.
    [Show full text]
  • Pdfnews 17/08
    Precursor PDF News 17:08 Mac OS X 10.2.5 This version offers bug fixes, (the 1970 date bug is fixed!) security patches and feature improve- ments too numerous to name here. Available from the software update mechanism or as a download (below). Caution: some users report having kernel panics when USB hubs are attached. Mac OS X 10.2.5 Update http://docs.info.apple.com/article.html?artnum=120210 Mac OS X 10.2.5 Combo Update http://docs.info.apple.com/article.html?artnum=120211 Mac OS X 10.2 – Precursor Price $199 CDN Support your local consultant ! shop at: http://software.precursor.ca Mac OS X Server 10.2.5 The 10.2.5 Server Update delivers enhanced functionality and improved reliability to the following applications, services and technologies: Mac OS Extended (HFS+) journaling, software RAID, Fibre Channel and SCSI device compatibility, IP networking, AFP, SMB, NFS and FTP file services, Print services, Apache 2, Apache Axis, MySQL, WebMail, Mail services, QuickTime Streaming Server, DHCP, Open Directory, NetBoot, Network Install, Workgroup Manager, Net- work Image Utility, Macintosh Manager and Apple Software Restore. Available from the software update mechanism Mac OS X Server 10.2(10 user license) – Precursor Price $749 CDN Support your local consultant ! shop at: http://software.precursor.ca Apple Safari public beta 2 Apple’s excellent free browser Safari Public Beta 2 now offers tabbed browsing, autofill forms & passwords, privacy “reset”, import of Netscape and Mozilla bookmarks, increased standards compatibility, and improved AppleScript support.. http://www.apple.com/ca/safari/ StuffIt Deluxe & Standard 7.0.3 Aladdin offers a variety of improvements in version 7.03 for both StuffIt Deluxe and StuffIt Standard Edition.
    [Show full text]
  • Securing Mac OS X 10.4 Tiger V1.0.Doc
    The natural choice for information security solutions AA CCoorrssaaiirree WWhhiittee PPaappeerr:: SSeeccuurriinngg MMaacc OOSS XX Author Stephen de Vries Document Reference Securing Mac OS X 10.4 Tiger v1.0.doc Document Revision 1.0 Released Date 19 August 2005 © Copyright 2000 – 2005 Corsaire Limited All Rights Reserved A Corsaire White Paper: Securing Mac OS X Table of Contents TABLE OF CONTENTS............................................................................................................ 2 1. INTRODUCTION................................................................................................................ 3 2. USING THIS GUIDE .......................................................................................................... 3 2.1 The Common Criteria..................................................................................................... 3 3. SUMMARY OF SECURITY HARDENING......................................................................... 4 4. SECURITY HARDENING GUIDELINES ........................................................................... 4 4.1 General Security Settings ............................................................................................. 4 4.2 Patching & Maintenance................................................................................................ 7 4.3 Physical Access Controls ............................................................................................. 8 4.4 Keychain ......................................................................................................................
    [Show full text]
  • Deployment: We Need to Talk
    Deployment: We Need To Talk Anthony Reimer AnthonyReimer jazzace jazzace Inventors Self-sufficient Diverse Needs Community Terminology Thin Imaging Thin Imaging is when you… 1. Erase boot volume, apply a known good OS via a minimal disk image, then apply settings, configurations, and applications on top 2. Same as 1, except install the OS directly rather than use a disk image 3. Apply settings, configurations, and applications on top of a known good OS (e.g., OS applied at the factory) 1 & 2 3 Customizing Customizing 1. Imaging or 2. Installing OS ? Unknown Known Desired Known Desired • Jamf APFS White Paper (registration required), 2017 ‣ www.jamf.com/resources/white-papers/everything-you-need-to-know-about-apple-file-system-apfs/ • Imaging will be dead (soon-ish) — Rich Trouton, 2017 ‣ derflounder.wordpress.com/2017/01/10/imaging-will-be-dead-soon-ish/ • Managing OS X blog — Greg Neagle, 2017 ‣ managingosx.wordpress.com • Deployment: A Pedagogical Manifest(o) — Me, 2013 ‣ www.afp548.com/2013/05/21/deployment-a-pedagogical-manifesto/ • Deployment Workflows — Duncan McCracken, 2013 ‣ MacSysAdmin Conference; http://docs.macsysadmin.se/2013/pdf/DeploymentWorkflows.pdf • DeployStudio: Tips, Tricks, and Alternate Uses — Rusty Myers, Brandon Penglase ‣ Macworld Conference 2011 (no public source) 1 2 3 Jamf APFS Modular Imaging?, Thin Imaging, Modular Imaging 2017 Re-provisioning Provisioning Trouton 2017 Modular Imaging Thin Imaging Thin Imaging Installation-based Installation-based Neagle 2017 (Imaging) workflow workflow Minimal Common Customize Only, Reimer 2013 Erase and Install Image Deployment Install Only McCracken Thin Imaging (not specified) No Imaging 2013 Penglase, Thin Imaging Thin Imaging Thin Imaging Myers 2011 Monolithic Modular Imaging Deployment Workflow monolithic adjective formed of a single large block of stone: later Byzantine columns were monolithic and usually made of marble.
    [Show full text]
  • PSUMAC203: Deployment Getting Tired of Us Yet?
    PSUMAC203: Deployment Getting Tired of us yet? • Justin Elliott, Penn State University • IT Manager, Classroom and Lab Computing • Rusty Myers, Penn State University • IT Support Specialist, College of Education Overview • What is Deployment • Deployment Methods • Deployment Tools • Demo Time Quick Audience Survey • New to Deployment for Macs? • How many Macs do you need to image? • Have more than 1 network segment? • Have Mac OS X Server(s)? • Have Windows (SMB) Servers? Deployment System Image System Image Deploying System Images! Considerations • Frequency of Imaging • Amount of Data to Restore • Number of Macs to Image • Number of Staff • Budgetary Restrictions Booting Methods Local Disk Booting • Local Volumes • DVDs - Cheap, Slow • FireWire, USB Hard Drives • Fast • Relatively Inexpensive Network Booting • Network (NetBoot) • Requires fast switched networks, DHCP, Local NetBoot Server or router HelperIPs • Very convenient when it all works correctly • Sometimes difficult network requirements Image Sources Local Image Sources • Second Partition • Firewire, USB Drives • Great for larger images • Hassle to manage portable disks Network Image Sources • Network Shares • AFP, SMB, HTTP • ASR Multicast Server Prep for HTTP • Segment images served by Apache (before version 2.0) Web Server $ hdiutil segment -segmentSize 1.9g -o Image.dmg • Keep all of the .dmgpart files in the same directory Prep for ASR Multicast • Images must be “Scanned For Restore” • Re-orders and optimizes image for multicast • Images should not be compressed Deployment Tools Apple Software Restore • ASR is at the heart of all OS X system restore utilities • Disk Utility, System Image Utility • Blast Image Config, DeployStudio • Can be scripted at the command line too • Located at /usr/sbin/asr Multicast ASR Server • ASR can run as a multicast server for one image • Start asr with server mode, config, image path % asr server --source master.dmg --config configuration.plist • Can literally kill your networks.
    [Show full text]
  • Internet Privacy Implications Research and Draft
    Internet Privacy Implications A Major Qualifying Project Worcester Polytechnic Institute Submitted to the Faculty of the Worcester Polytechnic Institute in partial fulfillment of the requirements for the Degree of Bachelor of Science. Submitted By: Goncharova, Masha Harnois, Jeffrey Advisors: Wills, Craig PhD Doyle, James PhD May 6, 2021 Abstract Our research focused on understanding the effectiveness of browsers, extensions, mobile applications, and search engines and their protection of user privacy. We ran test cases on the top 100 Alexa sites, using a Fiddler proxy to capture traffic, with certain configurations of tools mentioned to see which ones were efficient in blocking user tracking technologies. We found that Brave and Firefox in Strict mode are the best browsers in terms of tradeoff between percent of websites with degradation versus percent trackers remaining. uBlock Origin, Ghostery and Privacy Badger are the best browser extensions in terms of the same tradeoff. Based on our results, we created a recommendation system using a survey approach. We suggest a combination of tools that are personalized to users based on their reported privacy preferences and desire to switch their current browsing setup. In order to better understand users’ views on privacy, we additionally showed participants their own data Google has synthesized about them to evaluate if that would change their responses. A ceiling effect appeared in our responses, indicating that no matter the condition, all our participants indicated a willingness to switch to the tools that we were recommending. 1 Table of Contents Abstract 1 Table of Contents 2 List of Tables 6 List of Figures 7 Double Major Note 9 1.
    [Show full text]
  • Symantec Encryption Desktop 10.5 for Macos User Guide
    Symantec Encryption Desktop for macOS User Guide 10.5 Last updated: July 2020 Copyright statement Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. Copyright© 2020 Broadcom. All Rights Reserved. The term "Broadcom" refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Contents About Symantec Encryption Desktop 10.5 for macOS 7 What's New in Symantec Encryption Desktop 10.5 for macOS 7 Using this Guide 7 “Managed” versus “Unmanaged” Users 8 Conventions Used in This Guide 8 Who Should Read This Document 9 About Symantec Encryption Desktop Licensing 9 About Symantec Encryption Desktop Licensing 9 Checking License Details 10 If Your License Has Expired 11 Technical Support 11 Symantec Encryption Desktop Basics 15 Symantec Encryption Desktop Terminology 15 Product Components 15 Terms Used in Symantec Encryption Desktop 16 Conventional and Public Key Cryptography 18 Using Symantec Encryption Desktop for the First Time 19 Installing Symantec Encryption Desktop 23 Installing
    [Show full text]
  • CIS Mac OS X Leopard (10.5.X) Benchmark
    Mac OS X 10.5 Leopard Level 1 & 2 Benchmark Version 1.0 May 2008 Copyright ©2008, The Center for Internet Security http://www.cisecurity.org Editor: Allan Marcus [email protected] CIS Mac OS X Leopard (10.5.x) Benchmark Table of Contents Terms of Use Agreement ........................................................................................................................... 3 1) Introduction ........................................................................................................................................ 6 1.1) Document Layout ....................................................................................................................... 6 1.2) Intended Audience ..................................................................................................................... 6 1.3) Practical Application .................................................................................................................. 7 1.4) Security Levels Explained ......................................................................................................... 7 1.5) Precursor Technical Information ............................................................................................... 7 1.6) Basic Security Principles: .......................................................................................................... 8 2) Benchmark Elements ......................................................................................................................... 9 2.1) Installation
    [Show full text]