Symantec Encryption Desktop 10.4.2 For Windows User Guide

1y ago
8 Views
2 Downloads
1.39 MB
285 Pages
Last View : 22d ago
Last Download : 3m ago
Upload by : Sutton Moon
Transcription

Symantec Encryption Desktop forWindowsUser's Guide10.4

The software described in this book is furnished under a license agreement and may be used only inaccordance with the terms of the agreement.Version 10.4.2. Last updated: March 2018.Legal NoticeCopyright (c) 2018 Symantec Corporation. All rights reserved.Symantec, the Symantec Logo, the Checkmark Logo,PGP, Pretty Good Privacy, and the PGP logo aretrademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.Java is a registered trademark of Oracle and/or its affiliates. Other names may be trademarks of theirrespective owners.This Symantec product may contain third party software for which Symantec is required to provideattribution to the third party ("Third Party Programs"). Some of the Third Party Programs are available underopen source or free software licenses. The License Agreement accompanying the Licensed Software does notalter any rights or obligations you may have under those open source or free software licenses. For moreinformation on the Third Party Programs, please see the Third Party Notice document for this Symantecproduct that may be available at as/, the Third PartyLegal Notice Appendix that may be included with this Documentation and/or Third Party Legal NoticeReadMe File that may accompany this Symantec product.The product described in this document is distributed under licenses restricting its use, copying, distribution,and decompilation/reverse engineering. No part of this document may be reproduced in any form by anymeans without prior written authorization of Symantec Corporation and its licensors, if any.THE DOCUMENTATION IS PROVIDED"AS IS"AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONSAND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR APARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCHDISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FORINCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, ORUSE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TOCHANGE WITHOUT NOTICE.The Licensed Software and Documentation are deemed to be commercial computer software as defined inFAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial ComputerSoftware - Restricted Rights" and DFARS 227.7202, et seq. “Commercial Computer Software and CommercialComputer Software Documentation”, as applicable, and any successor regulations. Any use, modification,reproduction release, performance, display or disclosure of the Licensed Software and Documentation by theU.S. Government shall be solely in accordance with the terms of this Agreement.Symantec Corporation350 Ellis StreetMountain View, CA 94043

ContentsAbout Symantec Encryption Desktop 10.4 for WindowsWhat's New in Symantec Encryption Desktop Version 10.4 for WindowsUsing this Guide“Managed” versus “Unmanaged” UsersConventions Used in This GuideWho Should Read This DocumentAbout Symantec Encryption Desktop LicensingLicensing Symantec Encryption Desktop for WindowsChecking License DetailsIf Your License has ExpiredTechnical SupportContacting Technical SupportLicensing and RegistrationCustomer SupportSupport Agreement ResourcesSymantec Encryption Desktop BasicsSymantec Encryption Desktop TerminologyProduct ComponentsTerms used in Symantec Encryption DesktopConventional and Public Key CryptographyUsing Symantec Encryption Desktop for The First TimeInstalling Symantec Encryption DesktopBefore You InstallInstalling and Configuring Symantec Encryption DesktopInstalling the SoftwareUpgrading the SoftwareLicensing Symantec Encryption DesktopRunning the Setup AssistantUninstalling Symantec Encryption DesktopMoving Your Symantec Encryption Desktop Installation from One Computer to AnotherThe Symantec Encryption Desktop User InterfaceAccessing Symantec Encryption Desktop FeaturesThe Symantec Encryption Desktop Main ScreenUsing the PGP Tray IconUsing Shortcut Menus in Windows ExplorerUsing the Start MenuNotifier alertsNotifications on Windows 8/8.1/10 systemsNotifier for MessagingNotifier for Disk featuresEnabling or Disabling NotifiersViewing the PGP 2232426262626282930

iiContentsWorking with PGP KeysViewing KeysCreating a KeypairPasswords and PassphrasesProtecting Your Private KeyProtecting Keys and KeyringsBacking up Your Private KeyWhat if You Lose Your Key?Distributing Your Public KeyPlacing Your Public Key on a KeyserverIncluding Your Public Key in an Email MessageExporting Your Public Key to a FileCopying from a Smart Card Directly to Someone’s KeyringGetting the Public Keys of OthersGetting Public Keys from a KeyserverGetting Public Keys from Email MessagesWorking with KeyserversUsing Master KeysAdding Keys to the Master Key ListDeleting Keys from the Master Key ListManaging PGP KeysExamining and Setting Key PropertiesWorking With Photographic IDsManaging User Names and Email Addresses on a KeyTo delete a name/email adress from your keyImporting Keys and X.509 CertificatesUsing the Import Certificate AssistantImporting X.509 Certificates Included in S/MIME Email MessagesChanging Your PassphraseDeleting Keys, User IDs, and SignaturesDisabling and Enabling Public KeysVerifying a Public KeySigning a Public KeyRevoking Your Signature from a Public KeyGranting Trust for Key ValidationsWorking with SubkeysUsing Separate SubkeysViewing SubkeysCreating New SubkeysSpecifying Key Usage for SubkeysRevoking SubkeysRemoving SubkeysWorking with ADKsAdding an ADK to a KeypairUpdating an ADKRemoving an ADKWorking with RevokersAppointing a Designated RevokerRevoking a 2

ContentsSplitting and Rejoining KeysCreating a Split KeyRejoining Split KeysIf You Lost Your Key or PassphraseReconstructing Keys with Symantec Encryption ServerCreating Key Reconstruction DataReconstructing Your Key if You Lost Your Key or PassphraseProtecting your KeysSecuring Email MessagesHow Symantec Encryption Desktop Secures Email MessagesIncoming MessagesVerifying Signatures on Incoming MessagesUnderstanding Annotations on Incoming MessagesOutgoing MessagesSecuring Sent Items on IMAP Email ServersSending MAPI Email with Microsoft OutlookUsing the Sign and Encrypt Buttons in Microsoft OutlookUsing Offline PolicyServices and PoliciesViewing Services and PoliciesCreating a New Messaging ServiceEditing Messaging Service PropertiesDisabling or Enabling a ServiceDeleting a ServiceMultiple ServicesTroubleshooting PGP Messaging ServicesCreating a New Security PolicyRegular Expressions in PoliciesSecurity Policy Information and ExamplesWorking with the Security Policy ListEditing a Security PolicyEditing a Mailing List PolicyDeleting a Security PolicyChanging the Order of Policies in the ListSymantec Encryption Desktop and SSL/TLSKey ModesDetermining Key ModeChanging Key ModeEncoding FormatsViewing the PGP LogViewing Email with PGP ViewerOverview of PGP ViewerCompatible Email ClientsOpening an Encrypted Email Message or FileCopying Email Messages to Your InboxExporting Email MessagesSpecifying Additional OptionsSpecifying Options in PGP ViewerSecurity Features in PGP 106107107108108109iii

ivContentsProtecting Disks with Symantec Drive EncryptionAbout Symantec Drive EncryptionHow does Symantec Drive Encryption Differ from PGP Virtual Disk?Licensing Symantec Drive EncryptionPrepare Your Disk for EncryptionSupported Disk TypesSupported KeyboardsSupported Input Method Editors (IME)Ensure Disk Health Before EncryptionHow to Determine if Your Windows System is Running in UEFI ModeCalculate the Encryption DurationMaintain Power Throughout EncryptionRun a Pilot Test to Ensure Software CompatibilityDetermining the Authentication Method for the DiskPassphrase and Single Sign-On AuthenticationPublic Key AuthenticationToken-Based AuthenticationTrusted Platform Module (TPM) AuthenticationSetting Encryption OptionsPartition-Level EncryptionPreparing a Smart Card or Token to Use For AuthenticationUsing Symantec Drive Encryption OptionsEncrypting a Disk or PartitionSupported Characters for Symantec Drive Encryption PassphrasesEncrypting the DiskEncountering Disk Errors During EncryptionUsing a Symantec Drive Encryption-Encrypted DiskAuthenticating at the PGP BootGuard ScreenSelecting Keyboard LayoutsUsing Symantec Drive Encryption Single Sign-OnPrerequisites for Using Single Sign-OnEncrypting the Disk to Use Single Sign-OnUsing the 'Fast Startup' Option with Single Sign-On on Windows 8/8.1/10Multiple Users and Single Sign-OnLogging in with Single Sign-OnChanging Your Passphrase With Single Sign-OnDisplaying the Windows Login dialog boxMaintaining the Security of Your DiskGetting Disk or Partition InformationAdding Other Users to an Encrypted Disk or PartitionDeleting Users From an Encrypted Disk or PartitionChanging User PassphrasesRe-Encrypting an Encrypted Disk or PartitionIf You Forgot Your PassphraseBacking Up and RestoringUninstalling Symantec Encryption Desktop from Encrypted Disks or PartitionsWorking with Removable DisksEncrypting Removable DisksUsing Locked (Read-Only) Disks as Read-OnlyMoving Removable Disks to Other SystemsReformatting an Encrypted Removable 9150150

ContentsUsing Symantec Drive Encryption in a Symantec Encryption Server-Managed Environment151Symantec Drive Encryption Administration151Accessing an Encrypted Device Using a Whole Disk Recovery Token152Creating a Recovery Token in a Managed Environment152Creating a Recovery Token in a Standalone Environment153Using a Recovery Token153Recovering Data From an Encrypted Drive154Creating and Using a Recovery Disc154Creating and Using a Recovery USB Drive for Microsoft Windows 7 and Windows 8 UEFI-BasedSystems155Decrypting a Symantec Drive Encryption-Encrypted Disk156Special Security Precautions Taken by Symantec Encryption Desktop157Passphrase Erasure157Virtual Memory Protection158Hibernation vs Standby (Sleep)158Memory Static Ion Migration Protection158Other Security Considerations158Using the Windows Preinstallation Environment159Using PGP Virtual DiskAbout PGP Virtual DiskCreating a New PGP Virtual DiskViewing the Properties of a PGP Virtual DiskFinding PGP Virtual DisksUsing a Mounted PGP Virtual DiskMounting a PGP Virtual DiskUnmounting a PGP Virtual DiskCompacting a PGP Virtual DiskRe-Encrypting PGP Virtual DisksWorking with Alternate UsersAdding Alternate User Accounts to a PGP Virtual DiskDeleting Alternate User Accounts from a PGP Virtual DiskDisabling and Enabling Alternate User AccountsChanging Read/Write and Read-Only StatusGranting Administrator Status to an Alternate UserChanging User PassphrasesDeleting PGP Virtual DisksMaintaining PGP Virtual DisksMounting PGP Virtual Disk Volumes on a Remote ServerBacking up PGP Virtual Disk VolumesExchanging PGP Virtual DisksThe PGP Virtual Disk Encryption AlgorithmsSpecial Security Precautions Taken by PGP Virtual DiskPassphrase ErasureVirtual Memory ProtectionHibernationMemory Static Ion Migration ProtectionOther Security 5Using Symantec File Share Encryption177About Symantec File Share Encryption177v

viContentsSymantec File Share Encryption RolesIntegrating with Symantec Data Loss PreventionIntegrating with DropboxLicensing Symantec File Share EncryptionAuthorized User KeysUsing a Group KeyEstablishing a Symantec File Share Encryption Admin (Owner)"Blacklisted" and "Whitelisted" Files, Folders, and Applications“Blacklisted” and Other Files You Cannot Protect"Blacklisted" and "Whitelisted" Folders Specified by Symantec Encryption ServerApplication-based Encryption and Decryption Bypass ListsWorking with Protected FoldersChoosing the Location for a Protected FolderCreating a New Symantec File Share Encryption Protected FolderUsing Files in a Symantec File Share Encryption Protected FolderUnlocking a Protected FolderDetermining the Files in a Protected FolderAdding Subfolders to a Protected FolderChecking Folder StatusCopying Protected Folders to Other LocationsWorking with Symantec File Share Encryption UsersAdding a Symantec File Share Encryption UserChanging a User's RoleDeleting a User from a Protected FolderImporting Symantec File Share Encryption Access ListsWorking with Active Directory GroupsSetting up Symantec File Share Encryption to Work with GroupsAdding an Active Directory Group to a Protected FolderRefreshing GroupsDecrypting Symantec File Share Encryption-Protected FoldersRe-Encrypting a FolderClearing a PassphraseProtecting Files Outside of a Protected FolderBacking Up Symantec File Share Encryption-Protected FilesAccessing Symantec File Share Encryption Features using the Shortcut MenuSymantec File Share Encryption in a Symantec Encryption Server-managed EnvironmentAccessing the Properties of a Protected File or FolderUsing the Symantec File Share Encryption Menus in Symantec Encryption DesktopThe File MenuThe Edit MenuThe Symantec File Share Encryption MenuWorking with DropboxSystem Requirements for Integrating with DropboxEncrypting FilesActivating a Dropbox PolicyResolving Users' KeysAdding Encrypted Files to a Dropbox FolderIdentifying an Encrypted FileSharing Encrypted Dropbox FilesDecrypting 08209

ContentsUsing PGP ZipOverviewCreating PGP Zip ArchivesEncrypting to Recipient KeysEncrypting with a PassphraseCreating a PGP Self-Decrypting Archive (SDA)Creating a Sign Only ArchiveOpening a PGP Zip ArchiveOpening a PGP Zip SDAEditing a PGP Zip ArchiveVerifying Signed PGP Zip ArchivesShredding Files with PGP ShredderUsing PGP Shredder to Permanently Delete Files and FoldersShredding Files using the PGP Shredder Icon on Your DesktopShredding Files From Within Symantec Encryption DesktopShredding Files in Windows ExplorerUsing the PGP Shredder Free Space AssistantScheduling Free Space ShreddingStoring Keys on Smart Cards and TokensAbout Smart Cards and TokensRecognizing Smart CardsExamining Smart Card PropertiesGenerating a PGP Keypair on a Smart CardCopying your Public Key from a Smart Card to a KeyringCopying a Keypair from Your Keyring to a Smart CardWiping Keys from Your Smart CardUsing Multiple Smart CardsSetting Symantec Encryption Desktop OptionsAccessing the PGP Options dialog boxGeneral OptionsKeys OptionsMaster Keys OptionsMessaging OptionsProxy OptionsSymantec File Share Encryption OptionsDisk OptionsNotifier OptionsAdvanced OptionsWorking with Passwords and PassphrasesChoosing whether to use a password or passphraseThe Passphrase Quality 43245247247249250253253254vii

viiiContentsCreating Strong PassphrasesWhat if You Forget Your Passphrase?Using Symantec Encryption Desktop with Symantec Encryption ServerOverviewFor Symantec Encryption Server AdministratorsManually binding to a Symantec Encryption ServerUsing Symantec Encryption Desktop with IBM Lotus NotesAbout Lotus Notes and MAPI CompatibilityUsing Symantec Encryption Desktop with Lotus NotesSending email to recipients inside your Lotus Notes organizationSending email to recipients outside your Lotus Notes organizationBinding to a Symantec Encryption ServerPre-BindingManual BindingNotes AddressesNotes Client SettingsThe Notes.ini Configuration FileUsing Lotus Notes Native 2263263264264264265267

1About Symantec Encryption Desktop10.4 for WindowsSymantec Encryption Desktop, Powered by PGP Technology is a security tool that usescryptography to protect your data against unauthorized access.Symantec Encryption Desktop protects your data while being sent by email. It lets youencrypt your entire hard drive or hard drive partition—so everything is protected all thetime—or just a portion of your hard drive, via a virtual disk on which you can securelystore your most sensitive data. You can use it to share your files and folders securelywith others over a network. It lets you put any combination of files and folders into anencrypted, compressed package for easy distribution or backup. Finally, use SymantecEncryption Desktop to shred (securely delete) sensitive files—so that no one canretrieve them—and shred free space on your hard drive, so there are no unsecuredremains of any files.Use Symantec Encryption Desktop to create PGP keypairs and manage both yourpersonal keypairs and the public keys of others.To make the most of Symantec Encryption Desktop, you should be familiar withSymantec Encryption Desktop Terminology (on page 9). You should also understandconventional and public-key cryptography, as described in Conventional and Public KeyCryptography (on page 11).In This ChapterWhat's New in Symantec Encryption Desktop Version 10.4 for Windows . 1Using this Guide . 1Who Should Read This Document . 4About Symantec Encryption Desktop Licensing . 4Technical Support . 6What's New in Symantec Encryption Desktop Version 10.4for WindowsBuilding on Symantec Corporation’s proven technology, Symantec Encryption Desktop10.4 for Windows includes numerous improvements and new features. For moreinformation on what's new in Symantec Encryption Desktop Version 10.4 for Windows,see Symantec Encryption Desktop Version 10.4 for Windows Release Notes.Using this GuideThis Guide provides information on configuring and using the components withinSymantec Encryption Desktop. Each chapter of the guide is devoted to one of thecomponents of Symantec Encryption Desktop.

2About Symantec Encryption Desktop 10.4 for WindowsUsing this Guide“Managed” versus “Unmanaged” UsersA Symantec Encryption Server can be used to control the policies and settings used bycomponents of Symantec Encryption Desktop. This is often the case in enterprisesusing PGP software. Symantec Encryption Desktop users in this configuration areknown as managed users, because the settings and policies available in their SymantecEncryption Desktop software are pre-configured by a Symantec Encryption Serveradministrator and managed using a Symantec Encryption Server. If you are part of amanaged environment, your company may have specific usage requirements. Forexample, managed users may or may not be allowed to send plaintext email, or may berequired to encrypt their disk with Symantec Drive Encryption.Users not under the control of a Symantec Encryption Server are called unmanaged orstandalone users.This document describes how Symantec Encryption Desktop works in both situations;however, managed users may discover while working with the product that some of thesettings described in this document are not available in their environments. For moreinformation, see Using Symantec Encryption Desktop with Symantec Encryption Server(on page 257).Features Customized by Your Symantec Encryption Server AdministratorIf you are using Symantec Encryption Desktop as a "managed" user in a SymantecEncryption Server-managed environment, there are some settings that can be specifiedby your administrator. These settings may change the way features are displayed inSymantec Encryption Desktop. Disabled features. Your Symantec Encryption Server administrator can enable ordisable specific functionality. For example, your administrator may disable theability to create PGP Zip archives, or to create Symantec File Share Encryptionprotected folders (on Windows systems).When a feature is disabled, the control item in the left side is not displayed and themenu for that feature is not available. The Symantec Encryption Desktop interfacemay look different if your administrator has customized the features available. Customized BootGuard. If you are using Symantec Encryption Desktop in aSymantec Encryption Server-managed environment, your Symantec EncryptionServer administrator may have customized the Symantec Drive EncryptionBootGuard screen to include additional text or a custom image such as yourorganization's logo. Your actual login screen may look different if youradministrator has customized the screen.Conventions Used in This GuideNotes, Cautions, and Warnings are used in the following ways.Notes: Notes are extra, but important, information. A Note calls your attention toimportant aspects of the product. You will be able to use the product better if youread the Notes.Cautions: Cautions indicate the possibility of loss of data or a minor security breach.A Caution tells you about a situation where problems could occur unless precautionsare taken. Pay attention to Cautions.

About Symantec Encryption Desktop 10.4 for WindowsUsing this GuideWarnings: Warnings indicate the possibility of significant data loss or a majorsecurity breach. A Warning means serious problems are going to happen unless youtake the appropriate action. Please take Warnings very seriously.Conventions Used on Microsoft Windows 8/8.1/10 SystemsIf you are using Symantec Encryption Desktop on a Microsoft Windows 8/8.1/10system, the following sections provide information on how to access basic tasks in theWindows 8/8.1/10 style interface:Naming ConventionsUse the following table to interpret the terms used in this document in a Windows8/8.1/10 environment:Term used in this DocumentIn Windows 8/8.1/10Start MenuAvailable as Start ScreenWindows ExplorerAvailable as File ExplorerAdd or Remove ProgramsAvailable as Programs and FeaturesClick or SelectWhen using a touch screen system, means tapBasic TasksUse the following table to learn how to perform the basic tasks of Symantec EncryptionDesktop on Windows 8/8.1/10 systems:ToDoOpen Symantec Encryption DesktopDo one of the following: On the Start screen, type SymantecEncryption Desktop and press Enter. On the Start screen, select the SymantecEncryption Desktop tile.Open System TrayOn the Start screen, click the Desktop tile.Open File ExplorerOn the Start screen, type File Explorer and pressEnter.Open PGP TrayOn the Start screen, click the Desktop tile,then clickthe Symantec Encryption Desktop icon located at theright side of the task bar. (If you have combined taskbar items you may need to click the arrow to displayhidden items.)Uninstall Symantec Encryption DesktopIn the Control Panel, select Programs andFeatures, select Symantec Encryption Desktopand click Uninstall.3

4About Symantec Encryption Desktop 10.4 for WindowsWho Should Read This DocumentWho Should Read This DocumentThis document is for anyone who is going to be using the Symantec Encryption Desktopfor Windows software to protect their data.About Symantec Encryption Desktop LicensingA license is used within the PGP software to enable the functionality you purchased,and sets the expiration of the software. Depending on the license you have, some or allof the Symantec Encryption Desktop family of applications will be active. Once youhave entered the license, you must then authorize the software with SymantecCorporation, either manually or online.There are three types of licenses: Evaluation: This type of license is typically time-delimited and may not include allSymantec Encryption Desktop functionality. Subscription: This type of license is typically valid for a subscription period of oneyear. During the subscription period, you receive the current version of PGPsoftware and all upgrades and updates released during this period. Perpetual: This type of license allows you to use Symantec Encryption Desktopindefinitely. With the addition of the annual Software Insurance policy, whichmust be renewed annually, you also receive all upgrades and updates releasedduring the policy term.Licensing Symantec Encryption Desktop for WindowsTo license Symantec Encryption DesktopDo one of the following: If you are a managed user, you are most likely already using a licensed copy ofSymantec Encryption Desktop. Check your license details as described in CheckingLicense Details (on page 5). If you have questions, please contact your SymantecEncryption Server administrator. If you are an unmanaged user, or a Symantec Encryption Server administrator,check your license details as described in Checking License Details (on page 5). Ifyou need to authorize your copy of Symantec Encryption Desktop, do so asdescribed in Authorizing Symantec Encryption Desktop for Windows (on page 5).

About Symantec Encryption Desktop 10.4 for WindowsAbout Symantec Encryption Desktop LicensingChecking License DetailsTo see the details of your Symantec Encryption Desktop license1Double-click the Symantec Encryption Desktop icon in the system tray.2Select Help License. The Symantec Encryption Desktop License dialog boxdisplays the following details:ItemDescriptionLicense TypeThe name of the licensed product.License SeatsThe number of seats available for this license.License ExpirationThe date when the license will expire.Product InformationThe components that are active in your license. Move yourcursor over the product name to see information about theproduct and to find out if you are currently licensed to useit.Note: If you do not authorize your copy of Symantec Encryption Desktop, onlylimited features will be available to you (PGP Zip and PGP Keys).Authorizing Symantec Encryption Desktop for WindowsIf you need to change to a new license number, or if you skipped the licenseauthorization process during configuration, follow these instructions to authorize yoursoftware.To authorize Symantec Encryption Desktop for WindowsIf you purchased Symantec Encryption Desktop, you received an order confirmationwith licensing information.1Double-click the Symantec Encryption Desktop icon in the System Tray.2Select Help License. The Symantec Encryption Desktop License dialog box isdisplayed.3Click Change License. The PGP Licensing Assistant dialog box is displayed.4Do one of the following: Type your 28-character license number in the provided fields (for example,DEMO1-DEMO2-DEMO3-DEMO4-DEMO5-ABC).Note: To avoid typing errors and make the authorization easier, copy the entirelicense number, put the cursor in the first “License Number” field, and paste.Your license number will be correctly entered into all six “License Number”fields. To use Symantec Encryption Desktop without a license, select Use without alicense and disable most functionality. The only feature of SymantecEncryption Desktop you can use without a license is PGP Zip and PGP Keys.5

6About Symantec Encryption Desktop 10.4 for WindowsTechnical Support5Click Next to authorize.6When PGP is authorized, the features enabled by your license will be displayed.Click Next, and then click Finish to complete the process.If Your License has ExpiredIf your Symantec Encryption Desktop license has expired, you will receive a PGPLicense Expiration message when you launch Symantec Encryption Desktop. See thefollowing sections for information on how an expired license affects the functionality ofSymantec Encryption Desktop.Symantec Desktop Email Outgoing email messages are no longer sent encrypted.Symantec File Share Encryption Symantec File Share Encryption protected folders can be accessed however theprotected files remain encrypted. (To view the encrypted files, manually decryptthe folders and files.) New Symantec File Share Encryption protected folders cannot be created. Files moved into a protected folder are not encrypted. Keys cannot be added or removed from Symantec File Share Encryption protectedfolders. PGP Virtual Disks are still accessible in Read-Only mode. Read-Only allows data tobe copied from a PGP Virtual Disk, however no data can be copied to a PGP VirtualDisk.PGP Virtual DiskSymantec Drive Encryption Any fixed disks that have been encrypted with Symantec Encryption Desktopusing an evaluation license are automatically decrypted 90 days after theexpiration of the evaluation.Technical SupportSymantec Technical Support maintains support centers globally. Technical Support’sprimary role is to respond to specific queries about product features and functionality.The Technical Support group also creates content for our online Knowledge Base. TheTechnical Support group works collaboratively with the other functional areas withinSymantec to answer your questions in a timely fashion. For example, the TechnicalSupport group works with Product Engineering and Symantec Security Response toprovide alerting services and virus definition updates.Symantec’s support offerings include the following:

About Symantec Encryption Desktop 10.4 for WindowsTechnical Support A range of support options that give you the flexibility to select the right amountof service for any size organization Telephone and/or web-based support that provides rapid response andup-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7 days aweek basis Premium service offerings that include Account Management ServicesFor information about Symantec’s support offerings, you can visit our website at thefollowing URL:https://support.symantec.com/content/unifiedw

About Symantec Encryption Desktop 10.4 for Windows 1 What's New in Symantec Encryption Desktop Version 10.4 for Windows 1 Using this Guide 1 "Managed" versus "Unmanaged" Users 2 . Securing Email Messages 69 How Symantec Encryption Desktop Secures Email Messages 69 Incoming Messages 70

Related Documents:

Symantec Endpoint Encryption Policy Administrator Guide Version 11.3.1 Introduction About Symantec Endpoint Encryption Symantec Endpoint Encryption v11.3.1 provides full disk encryption, removable media protection, and centralized management. Powered by PGP technology, the drive encryption client renders data at rest inaccessible to unauthorized

Endpoint Encryption Management Server computer. If you use Microsoft SQL authentication, Symantec Endpoint Encryption uses this account to create and configure the Symantec Endpoint Encryption Management Server database during installation. Symantec Endpoint Encryption does not store the credentials for this Microsoft SQL account.

SYMANTEC VISION 2012 SYMANTEC ENCRYPTION 16 Mobile email encryption for iOS and Android Protects confidential data and sets user access policies on file sharing services, Dropbox Symantec File Share Encryption, Powered by PGP Technology Access encrypted data on iPhone and iPad while keeping info protected Symantec O 3 #ITTRENDS

What is Symantec Encryption Management Server? 1 Symantec Encryption Management Server Product Family 1 Who Should Read This Guide 2 Common Criteria Environments 2 Using the Symantec Encryption Management Server with the Command Line 2 Symbols 3 Getting Assis

For Symantec Encryption Management Server to create the SMSA, you must configure your mail server correctly. In this placement, your Symantec Encryption Management Server sits between your email users and their email server. 1 Symantec Encryption Management Server internally placed 2 Exampl

Symantec Endpoint Encryption Policy Administrator Guide Version 11.4.0 Introduction Getting Started with Symantec Endpoint Encryption This topic provides an overview of Symantec Endpoint Encryption, including the key features and the feature benefits.

26) The encryption process starts. Once you see the following window you may close the Symantec Encryption Desktop Application and the encryption process will continue in the background. The machine may be rebooted and used normally during the encryption process, which will take between 4-14 hours to complete.

Keyboards Together 2 Music Medals Bronze Ensemble Pieces (ABRSM) B (T) In the Meadow Stood a Little Birch Tree Trad. Russian, arr. Mike Cornick: p. 3 B (T) Jazz Carousel Jane Sebba: p. 4 B (T) Heading for Home John Caudwell: p. 5 B (T) Don’t Mess with Me! Peter Gritton: p. 6