Symantec Encryption Desktop 10.5 for Macos User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Symantec Encryption Desktop 10.5 for Macos User Guide Symantec Encryption Desktop for macOS User Guide 10.5 Last updated: July 2020 Copyright statement Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. Copyright© 2020 Broadcom. All Rights Reserved. The term "Broadcom" refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Contents About Symantec Encryption Desktop 10.5 for macOS 7 What's New in Symantec Encryption Desktop 10.5 for macOS 7 Using this Guide 7 “Managed” versus “Unmanaged” Users 8 Conventions Used in This Guide 8 Who Should Read This Document 9 About Symantec Encryption Desktop Licensing 9 About Symantec Encryption Desktop Licensing 9 Checking License Details 10 If Your License Has Expired 11 Technical Support 11 Symantec Encryption Desktop Basics 15 Symantec Encryption Desktop Terminology 15 Product Components 15 Terms Used in Symantec Encryption Desktop 16 Conventional and Public Key Cryptography 18 Using Symantec Encryption Desktop for the First Time 19 Installing Symantec Encryption Desktop 23 Installing and Configuring Symantec Encryption Desktop 23 Installing the Software 23 Upgrading the Software 24 Licensing Symantec Encryption Desktop 27 Running the Setup Assistant 27 Uninstalling Symantec Encryption Desktop 28 Moving Your Symantec Encryption Desktop Installation from One Computer to Another 28 The Symantec Encryption Desktop User Interface 31 Accessing Symantec Encryption Desktop Features 31 Symantec Encryption Desktop Main Screen 32 Using the PGP icon in the Menu Bar 33 Using the PGP Dock Icon 34 Using the macOS Finder 35 Notifier alerts 35 Notifier for Messaging 36 Symantec Encryption Desktop and the Finder 39 Overview 39 Encrypt, Sign, or Encrypt and Sign 39 Shred 41 Decrypt/Verify 41 ii Contents Mount or Unmount a PGP Virtual Disk Volume 42 Import a PGP Key 43 Add the Public Portion of PGP keys to Your Keyring 43 Extract the Contents of a PGP Zip Archive 43 Viewing the Encryption Desktop Log 44 Working with PGP Keys 45 Viewing Keys 45 Creating a Smart Keyring 46 Creating a Keypair 47 Expert Mode Key Settings 48 Protecting Your Private Key 49 Protecting Keys and Keyrings 50 Backing up Your Private Key 50 What if You Lose Your Key? 51 Distributing Your Public Key 51 Placing Your Public Key on a Keyserver 52 Including Your Public Key in an Email Message 53 Exporting Your Public Key to a File 53 Getting the Public Keys of Others 54 Getting Public Keys from a Keyserver 54 Getting Public Keys from Email Messages 55 Working with Keyservers 55 Using Master Keys 56 Adding Keys to the Master Key List 56 Deleting Keys from the Master Key List 57 Managing PGP Keys 59 Examining and Setting Key Properties 59 Adding and Removing Photographs 60 Managing User Names and Email Addresses on a Key 61 To delete a name/email address from your key 62 Importing Keys and X.509 Certificates 62 Importing X.509 Certificates Included in S/MIME Email Messages 62 Changing Your Passphrase 63 Deleting Keys, User IDs, and Signatures 63 Disabling and Enabling Public Keys 64 Verifying a Public Key 65 Signing a Public Key 66 Revoking Your Signature from a Public Key 67 Granting Trust for Key Validations 67 To grant trust to a key 68 Working with Subkeys 68 Using Separate Subkeys 69 Viewing Subkeys 69 Creating New Subkeys 70 Specifying Key Usage for Subkeys 70 Revoking Subkeys 71 Removing Subkeys 71 Working with ADKs 72 Adding an ADK to a Keypair 72 Contents iii Updating an ADK 72 Removing an ADK 73 Working with Revokers 73 Appointing a Designated Revoker 73 Revoking a Key 74 Splitting and Rejoining Keys 74 Creating a Split Key 74 Rejoining Split Keys 75 If You Lost Your Key or Passphrase 77 Reconstructing Keys with Symantec Encryption Management Server 77 Creating Key Reconstruction Data 77 Reconstructing Your Key if You Lost Your Key or Passphrase 79 Securing Email Messages 81 How Symantec Encryption Desktop Secures Email Messages 81 Incoming Messages 82 Understanding Annotations on Incoming Messages 83 Outgoing Messages 84 Securing Sent Items on IMAP Servers 84 Using Offline Policy 84 Services and Policies 85 Viewing Services and Policies 86 Creating a New Messaging Service 86 Editing Message Service Properties 88 Disabling or Enabling a Service 89 Deleting a Service 89 Multiple Services 89 Troubleshooting PGP Messaging Services 90 Creating a New Security Policy 91 Regular Expressions in Policies 95 Security Policy Information and Examples 96 Working with the Security Policy List 99 Editing a Security Policy 99 Editing a Mailing List Policy 99 Deleting a Security Policy 102 Changing the Order of Policies in the List 103 Symantec Encryption Desktop and SSL/TLS 103 Key Modes 105 Determining Key Mode 106 Changing Key Mode 106 Encoding Formats 107 Viewing the Encryption Desktop Log 107 Viewing Email with PGP Viewer 109 Overview of PGP Viewer 109 Supported Email Clients 110 Opening an Encrypted Email Message or File 110 Copying Email Messages to Your Inbox 111 Exporting Email Messages 111 PGP Viewer Preferences 112 Security Features in PGP Viewer 112 iv Contents Protecting Disks with Symantec Drive Encryption 115 About Symantec Drive Encryption 116 Encrypting Boot Disks 117 How does Symantec Drive Encryption Differ from PGP Virtual Disk? 117 Licensing Symantec Drive Encryption 117 Prepare Your Disk for Encryption 118 Supported Disk Types 119 Supported Keyboards 119 Best Practices Recommendation 120 Enabling and disabling System Integrity Protection in macOS version 10.11 or later 120 Ensure Disk Health Before Encryption 120 Calculate the Encryption Duration 121 Run a Pilot Test to Ensure Software Compatibility 121 Determine the Authentication Method for the Disk 121 Encrypting a Disk 122 Supported Characters 122 Encrypting the Disk 123 Encountering Disk Errors During Encryption 125 Using a Symantec Drive Encryption Encrypted Disk 125 Authenticating at the PGP BootGuard Screen 126 Authenticating With a User Name 127 Maintaining the Security of Your Disk 127 Viewing Key Information on an Encrypted Disk 127 Modifying the System Partition 127 Adding Other Users to an Encrypted Disk 127 Deleting Users From an Encrypted Disk 128 Changing User Passphrases 129 Re-Encrypting an Encrypted Disk 129 Backing Up and Restoring 129 Uninstalling Symantec Encryption Desktop from Encrypted Disks 130 Using Symantec Drive Encryption in a Symantec Encryption Management Server-Managed Environment 130 Symantec Drive Encryption Administration 130 Creating a Recovery Token in a Managed Environment 131 Using a Recovery Token 131 Recovering Data From an Encrypted Drive 132 Creating and Using Recovery Disks 132 Decrypting an Encrypted Disk 133 Moving Removable Disks to Other Systems 134 Accessing Data on Encrypted Removable Disks 134 Special Security Precautions Taken by Symantec Encryption Desktop 135 Passphrase Erasure 135 Virtual Memory Protection 135 Memory Static Ion Migration Protection 135 Other Security Considerations 136 Technical Details About Encrypting Boot Disks 136 Using PGP Virtual Disk 139 About PGP Virtual Disk 139 Creating a New PGP Virtual Disk 140 Contents v Viewing the Properties of a PGP Virtual Disk 142 Using a Mounted PGP Virtual Disk 142 Mounting a PGP Virtual Disk 143 Unmounting a PGP Virtual Disk 143 Set Mount Location 144 Compacting a PGP Virtual Disk 144 Re-Encrypting PGP Virtual Disks 144 Working with Alternate Users 145 Adding Alternate User Accounts to a PGP Virtual Disk 145 Deleting Alternate User Accounts From a PGP Virtual Disk 146 Disabling and Enabling Alternate User Accounts 146 Changing Read/Write and Read-Only Status 147 Granting Administrator Status to an Alternate User 147 Changing User Passphrases 148 Deleting PGP Virtual Disks 148 Maintaining PGP Virtual Disks 149 Mounting PGP Virtual Disk Volumes on a Remote Server 149 Backing up PGP Virtual Disk Volumes 149 Exchanging PGP Virtual Disks 150 The PGP Virtual Disk Encryption Algorithms 150 Special Security Precautions Taken by PGP Virtual Disk 151 Passphrase Erasure 151 Virtual Memory Protection 151 Memory Static Ion Migration Protection 152 Other Security Considerations 152 Using PGP Zip 155 Overview 155 Creating PGP Zip Archives 156 Opening a PGP Zip Archive 157 Verifying Signed PGP Zip Archives 158 Shredding Files with PGP Shredder 159 Using PGP Shredder to Permanently Delete Files and Folders 159 Shredding Files using the PGP Shredder icon 160 Shredding Files using the Shred Files Icon in the Symantec Encryption Desktop Toolbar 160 Shredding Files using the Shred Command from the File menu 161 Shredding Files in the Finder 161 Setting Preferences 163 Accessing Symantec Encryption Desktop Preferences 163 General Preferences 163 Keys Preferences 165 Master Keys Preferences 166 Messaging Preferences 166 Proxy Options 168 Disk Preferences 169 Notifications Preferences 170 Advanced Preferences 171 vi Contents Working with Passwords and Passphrases 173 Choosing whether to use a password or passphrase 173 The Passphrase Quality Bar 174 Creating Strong Passphrases 175 What if You Forget Your Passphrase? 176 Saving Your Passphrase in the Keychain 176 Using Symantec Encryption Desktop with Symantec Encryption Management Server 179 Overview 179 For Symantec Encryption Management Server Administrators 180 Manually binding to a Symantec Encryption Management Server 181 Index 183 About Symantec Encryption Desktop 1 10.5 for macOS Symantec™ Encryption Desktop, Powered by PGP Technology is a security tool that uses cryptography to protect your data against unauthorized access. Symantec Encryption Desktop protects your data while being sent by email.
Recommended publications
  • Internet Privacy Implications Research and Draft
    Internet Privacy Implications A Major Qualifying Project Worcester Polytechnic Institute Submitted to the Faculty of the Worcester Polytechnic Institute in partial fulfillment of the requirements for the Degree of Bachelor of Science. Submitted By: Goncharova, Masha Harnois, Jeffrey Advisors: Wills, Craig PhD Doyle, James PhD May 6, 2021 Abstract Our research focused on understanding the effectiveness of browsers, extensions, mobile applications, and search engines and their protection of user privacy. We ran test cases on the top 100 Alexa sites, using a Fiddler proxy to capture traffic, with certain configurations of tools mentioned to see which ones were efficient in blocking user tracking technologies. We found that Brave and Firefox in Strict mode are the best browsers in terms of tradeoff between percent of websites with degradation versus percent trackers remaining. uBlock Origin, Ghostery and Privacy Badger are the best browser extensions in terms of the same tradeoff. Based on our results, we created a recommendation system using a survey approach. We suggest a combination of tools that are personalized to users based on their reported privacy preferences and desire to switch their current browsing setup. In order to better understand users’ views on privacy, we additionally showed participants their own data Google has synthesized about them to evaluate if that would change their responses. A ceiling effect appeared in our responses, indicating that no matter the condition, all our participants indicated a willingness to switch to the tools that we were recommending. 1 Table of Contents Abstract 1 Table of Contents 2 List of Tables 6 List of Figures 7 Double Major Note 9 1.
    [Show full text]
  • Schumpeterian Competition and Diseconomies of Scope; Illustrations from the Histories of Microsoft and IBM
    Schumpeterian competition and diseconomies of scope; illustrations from the histories of Microsoft and IBM Timothy Bresnahan Shane Greenstein Rebecca Henderson Working Paper 11-077 Copyright © 2011 by Timothy Bresnahan, Shane Greenstein, Rebecca Henderson Working papers are in draft form. This working paper is distributed for purposes of comment and discussion only. It may not be reproduced without permission of the copyright holder. Copies of working papers are available from the author. Schumpeterian competition and diseconomies of scope; illustrations from the histories of Microsoft and IBM. Timothy Bresnahan, Shane Greenstein, Rebecca Henderson* Abstract: We address a longstanding question about the causes of creative destruction. Dominant incumbent firms, long successful in an existing technology, are often much less successful in new technological eras. This is puzzling, since a cursory analysis would suggest that incumbent firms have the potential to take advantage of economies of scope across new and old lines of business and, if economies of scope are unavailable, to simply reproduce entrant behavior by creating a “firm within a firm.” There are two broad streams of explanation for incumbent failure in these circumstances. One posits that incumbents fear cannibalization in the market place, and so under-invest in the new technology. The second suggests that incumbent firms develop organizational capabilities and cognitive frames that make them slow to “see” new opportunities and that make it difficult to respond effectively once the new opportunity is identified. In this paper we draw on two of the most important historical episodes in the history of the computing industry, the introduction of the PC and of the browser, to develop a third hypothesis.
    [Show full text]
  • ITSRM – to Identify User Needs and Wishes
    OIS Proposal for a Mac Service IT-GLM 26th July 2010 Andreas Wagner – CERN IT/OIS CERN IT Department CH-1211 Geneva 23 Switzerland www.cern.ch/it OIS Outline • Background • Proposal for Mac Service • From Mac Support to Mac Service • Next Steps and ongoing work • Summary CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 2 www.cern.ch/it OIS Background - History • Mac usage at CERN varied quite a bit over the last decades, e.g. was popular in directorate for some time and with some specific user communities • In the past due to limited resources the aim was to focus IT support efforts for Windows and SLC • Mac Support as one-man-show (2005-2009): for several years Mac Support = Patrick Herzog CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 3 www.cern.ch/it OIS Background - Motivation • Since 2002 Mac OS X – Unix based OS architecture • Mac HW architecture move to Intel – announced June 2005 – first Intel based models Jan 2006 (15" MacBook Pro & iMac Core Duo line) – Mac OS X 10.6 "Snow Leopard“ (released in 2009) was the first OS X version that did not support the PowerPC family anymore Mac became an attractive platform for physicists. CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 4 www.cern.ch/it OIS Background - Motivation Active hardware population at CERN Active devices seen on the network, July 2010 CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 5 www.cern.ch/it OIS Mac Service - Proposal • The existing number of Macs onsite is quite significant • Despite being sometimes more expensive, Macs fully satisfy a number of user communities.
    [Show full text]
  • The Electronic Frontier Foundation and Open Rights Group's
    10 June, 2019 VIA E-MAIL Consultation on the Transposition of the Fifth Money Laundering Directive (5MLD) Sanctions and Illicit Finance Team (2/27) HM Treasury 1 Horse Guards Road London, United Kingdom SW1A 2HQ London [email protected] The Electronic Frontier Foundation and Open Rights Group’s Response to HM Treasury’s Request for Consultation Regarding Transposition of the Fifth Money Laundering Directive I. Introduction The Electronic Frontier Foundation (EFF) and Open Rights Group (ORG) welcome the opportunity to respond to HM Treasury’s consultation regarding the transposition of the Fifth Money Laundering Directive (“5MLD,” EU 2018/843) into national law. EFF is a non-profit civil liberties law and technology organization. Founded in 1990, EFF champions individual privacy, free expression, and innovation. More than 31,000 individuals worldwide are dues-paying members of EFF. EFF uses public education campaigns, impact litigation, open source technology projects, policy analysis, and grassroots activism to ensure that human rights are protected in the digital age. EFF also allows supporters to make donations through Bitcoin, Ethereum, Litecoin, and Zcash. EFF’s membership includes over 560 members in the United Kingdom and has had the privilege of providing comments for Her Majesty’s government and Parliament on previous legislative proposals, including most recently the deliberations by multiple Select Committees prior to the passage of the Investigatory Powers Act,1 and the consultation held by the Home Office on the 1 See “UK Investigatory Powers Bill” EFF.org, ​ ​ https://www.eff.org/issues/uk-investigatory-powers-bill. Consultation on the Transposition of the Fifth Money Laundering Directive (5MLD) Sanctions and Illicit Finance Team (2/27) June 10, 2019 Page 2 of 11 Interception of communications and equipment interference draft codes of practice.2 With over 3,000 active supporters, ORG is a UK based digital campaigning organisation working to protect the rights to privacy and free speech.
    [Show full text]
  • Zebratester Installation Guide
    Ingenieurbüro David Fischer AG | A Company of the Apica Group http://www.apicasystem.com Installation Guide Version 5.5 Security Hint: Do not import the common CA Root Certificate delivered by the ZebraTester installation kit (file: root.cer) into your OS or into your Web browser. You have to create your own CA Root Certificate. © 2015, 2016, 2017 February 1, 2017 All Rights Reserved. ZebraTester V5.5 Installation Guide English Edition Table of Contents 1 Installation ................................................................................................................................................................................................................... 3 1.1 System Requirements .......................................................................................................................................................................................... 3 1.2 Recommendations for Load Generators (Exec Agents) ........................................................................................................................................ 3 1.3 Installation on Windows ........................................................................................................................................................................................ 4 1.3.1 Generating an own, private CA Root Certificate on Windows ........................................................................................................................ 6 1.3.2 Windows System Tuning ............................................................................................................................................................................
    [Show full text]
  • Parallels Desktop® 10 for Mac User's Guide
    Parallels Desktop® 10 for Mac User's Guide Copyright © 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com Copyright © 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. This product is protected by United States and international copyright laws. The product’s underlying technology, patents, and trademarks are listed at http://www.parallels.com/trademarks. Microsoft, Windows, Windows Server, Windows NT, Windows Vista, and MS-DOS are registered trademarks of Microsoft Corporation. Apple, Mac, the Mac logo, Mac OS, iPad, iPhone, iPod touch, FaceTime HD camera and iSight are trademarks of Apple Inc., registered in the US and other countries. Linux is a registered trademark of Linus Torvalds. All other marks and names mentioned herein may be trademarks of their respective owners. Contents Welcome to Parallels Desktop..................................................................................9 What You Can Do ........................................................................................................... 10 Set Up Your Mac to Use Windows Programs.................................................................. 10 Other Operating Systems................................................................................................10 Install or Upgrade Parallels Desktop ......................................................................12
    [Show full text]
  • About the Integration of Mac OS X Devices Into a Centrally Managed UNIX Environment Anton Schultschik – ETH, Zurich, Switzerland
    About the Integration of Mac OS X Devices into a Centrally Managed UNIX Environment Anton Schultschik – ETH, Zurich, Switzerland ABSTRACT The UNIX flavors in use today have so much in common that centralized management of UNIX systems has become almost standard. Since Mac OS X is based on BSD-UNIX it is a promising candidate for integration into a centrally managed UNIX environment. Starting from generic administration concepts, this paper develops an integrated management concept that handles fully automated installation and configuration of hosts. The concept includes a centralized application management system for console and graphical Mac OS X applications. The management concept is then implemented based exclusively on standard UNIX tools. The necessary extensions of these tools to make Mac OS X conform to UNIX standards are presented, including a proxy tool to forward AppleEvents which facilitate the interprocess communication for centrally managed graphical Mac OS X applications. Introduction implementation and deployment of such a system will be layed out built on some basic principles. The result will The increasing diversity of hardware and soft- be a management system for UNIX systems that can be ware makes system management more difficult. Shorter life-cycles of computer systems require more used to manage network-based as well as stand-alone sys- frequent upgrades or replacement of hardware and as a tems. consequence, the installed computers on a large site In system management three basic principles rarely are uniform in hardware but rather split into sev- keep appearing in tools and methods [1], and these eral uniform clusters. Automated management of such shall be used as orientation for our integrated manage- an environment is challenging as complexity grows ment system: with each new configuration of hardware and software.
    [Show full text]
  • Long-Term Observation on Browser Fingerprinting: Users' Trackability
    Proceedings on Privacy Enhancing Technologies ; 2020 (2):558–577 Gaston Pugliese*, Christian Riess, Freya Gassmann, and Zinaida Benenson Long-Term Observation on Browser Fingerprinting: Users’ Trackability and Perspective Abstract: Browser fingerprinting as a tracking technique plugins, were sufficient to uniquely recognize between to recognize users based on their browsers’ unique fea- 83.6% and 94.2% of browsers in his dataset. tures or behavior has been known for more than a Motivation. The collected browser fingerprints of decade. We present the results of a 3-year online study Panopticlick have not been published. Ten years later, on browser fingerprinting with more than 1,300 users. after many related studies [2–6], research on browser This is the first study with ground truth on user level, fingerprinting still lacks available and appropriate data. which allows the assessment of trackability based on Depending on the investigated aspects of browser finger- fingerprints of multiple browsers and devices per user. printing, the requirements for data collection are quite Based on our longitudinal observations of 88,000 mea- extensive: long-term, large-scale, fine-grained, diversi- surements with over 300 considered browser features, fied, sometimes cross-browser and cross-device. These we optimized feature sets for mobile and desktop de- requirements apply to research studying the evolution vices. Further, we conducted two user surveys to deter- of browser features over time, assessing users’ trackabil- mine the representativeness of our user sample based on ity, or examining the effectiveness of countermeasures. users’ demographics and technical background, and to At the time of writing, we are aware of only two learn how users perceive browser fingerprinting and how available datasets of browser fingerprints.
    [Show full text]