background image

Review precheck.txt

14

   

 

CSPRandom=

 

This setting specifies the name of the Cryptographic Service 
Provider (CSP) to use for random number generation during 
installation. The CSP name is vendor specific, and it can 
normally be found in the documentation for the CSP.

The CSP must be installed on a machine’s Windows system 
prior to Pointsec PC installation. 

The Pointsec PC installation program will attempt to use the 
CSP specified in this setting to generate random numbers. 
The CSP’s random number generation is vendor specific, and 
it might require the presence of external hardware, for 
example, a smart card.

If the random number generation fails, the installation is 
aborted.

ShowRecoverMessages=

 

This setting specifies whether or not the message box related 
to the unavailability of the recovery path will be displayed to 
the user.

Yes = 

Display the message box related to the unavailability of 

the recovery path to the user.

 

No = 

Do not display the message box related to the 

unavailability of the recovery path to the user. 

No is the default.

SuspendEncryptionTimeout=

The amount of time, in minutes, to delay the start of 
encryption after Windows has started.

Minimum value = 4 

 

Maximum value = 60

The default value is 4. 

KeyImportDirectory=

The path to the key import directory.

Note:

 Specifying a path for this setting activates encryption 

key import.

Best practice is to specify the path in UNC format: 

\\<server>\<share>\....

Table 1-1

General Settings

Setting

Description

Summary of Contents for Pointsec PC

Page 1: ...Pointsec PC Installation Guide Version 6 3 1 B November 5 2008...

Page 2: ......

Page 3: ...s been taken in the preparation of this book Check Point assumes no responsibility for errors or omissions This publication and features described herein are subject to change without notice RESTRICTE...

Page 4: ......

Page 5: ...Installing 10 Read the Release Notes 10 Considerations for Other Programs 10 Review precheck txt 10 Changing Graphics Displayed in Preboot and License Text Displayed during Installation 21 Chapter 2...

Page 6: ...ii...

Page 7: ...istered across the network As encryption is both automatic and transparent security is enforced without requiring special efforts from users Introduction page 1 Who Should Read This Guide page 2 About...

Page 8: ...the process of installing Pointsec PC for use on an administrator s workstation Information on creating profiles deploying them administering Pointsec PC protected computers and updating Pointsec PC...

Page 9: ...is delivery method Pointsec PC is delivered directly to you by a Pointsec engineer Before you accept delivery of Pointsec PC always check the credentials of the Pointsec engineer The Pointsec PC CD RO...

Page 10: ...ckage s each contain a ZIP file containing the Pointsec product and a text file product_file_name txt which contains the information you need to verify that the package has not been tampered with To d...

Page 11: ...Contact in the Case of an Unsuccessful Delivery If your Pointsec PC delivery shows signs of having been tampered with or the MD5 checksum you generate does not match the checksum in validate txt conta...

Page 12: ...Who To Contact in the Case of an Unsuccessful Delivery 6...

Page 13: ...information on Pointsec PC administrators see the Pointsec PC Administrator s Guide Pointsec PC Environment Requirements To maximize the level of security you should ensure that the following environ...

Page 14: ...able computer we recommend you connect the computer to the AC power supply The time required to encrypt can vary depending on the size of the disk what programs are running and the speed of the proces...

Page 15: ...e usually called a dynamic token to generate a new password every time they start their workstations Dynamic tokens are intended for environments requiring better security than fixed passwords can pro...

Page 16: ...intsec PC and Entrust For information on Pointsec PC and Entrust installation and integration please see the Pointsec PC Administrator s Guide Review precheck txt precheck txt is an installation setti...

Page 17: ...if Windows XP is the operating system on the computer on which Pointsec PC is being installed The default value is No AbortOnDualBoot Yes The value can be Yes or No The default value is Yes which wil...

Page 18: ...Here you can enter a program to run before Pointsec PC is installed RunAfter Here you enter the path to scripts or execs that you want run immediately after the user logs on to Windows after the reboo...

Page 19: ...Note You can also deploy HID drivers after installation using pscontrol exe For example C pscontrol register hid hptc1100 inf C pscontrol install driver hptc1100 bin Drivers The value of this setting...

Page 20: ...er generation fails the installation is aborted ShowRecoverMessages This setting specifies whether or not the message box related to the unavailability of the recovery path will be displayed to the us...

Page 21: ...t partition keys is generated by combining partition keys with random data generated by Pointsec PC You cannot use the key import directory s PWD DAT file when using the Direct method Table 1 1 Genera...

Page 22: ...ue 120 UpdateInterval 30 Here you can specify the interval Pointsec PC waits before checking for update profiles The values are in minutes Note Immediately after installation Pointsec PC checks for up...

Page 23: ...ck for update profiles the checks will be carried out at the interval that has been specified for this setting ProfileRetryInterval Time between retries The value is in minutes ProfileRetryCount Max r...

Page 24: ...eal cycle starts The values are in minutes Minimum value 0 Maximum value 120 CentralLogUpdateInterval Update interval cycle time The values are in minutes Immediately after installation Pointsec PC ch...

Page 25: ...to the central log in one transfer The value assigned to this setting is expressed as an integer that represents the maximum number of kilobytes 1 KB 1024 bytes of data transferred The default value...

Page 26: ...present If a file has been removed Pointsec PC deletes the GINA entry in the registry For example if a user removes the file associated with nwgina dll Pointsec PC discovers that the file is missing...

Page 27: ...lar text editor 3 Edit the file to suit your installation preferences and then save it 4 To start your Pointsec PC installation right click on Pointsec for PC msi and select Install Changing Graphics...

Page 28: ...during installation except for the InstallShield progress dialog 499w 59h 256 colors Banner jpg Banner displayed in preboot Jpeg images created with Photoshop 3 0 cannot be used 447w 98h Desktop jpg...

Page 29: ...Windows Vista follows the same steps as the installations on Windows 2000 or Windows XP with one important difference The Pointsec PC installation on Vista must be run with administrator s rights in...

Page 30: ...ing Pointsec PC from step 3 on page 25 and onward Registering Pointsec PC Registering Pointsec PC involves accepting the software license confirming that you have backed up the workstation and registe...

Page 31: ...n starting The PointsecForPC msi file is signed with a digital signature for security and when this file starts Windows attempts to reach the publisher s Certificate Revocation List CRL to see if the...

Page 32: ...nly when you are certain that the information on the workstation you are installing on has been backed up click Next The following dialog box opens 6 Enter your details and license information You can...

Page 33: ...password 1 In the Add an administrator dialog box select the Fixed password option 2 Enter the following information 3 Click Next The Add User dialog box opens again If the second administrator accoun...

Page 34: ...n in the import file and click OK The Select Key token dialog box opens 4 Look for the serial number that is printed on the back of your token and find that number in the list displayed Select the num...

Page 35: ...dware legacy USB devices are not fully supported during recovery when using USB smart card authentication An example of a legacy USB device is the USB reader you might want to use for your recovery me...

Page 36: ...going to use a combined token reader for example the RSA SecurID 800 you must choose RSA SecurID 800 both under Select reader drivers and under Select card drivers 4 Click Next to continue with the in...

Page 37: ...stalled on the workstation If you need to resize a partition remove Pointsec PC completely first and then resize the partition Otherwise resizing might cause loss of data Boot Protection Select this o...

Page 38: ...on will be stored Best practice is to specify the path in UNC format server share Click Next The following dialog box opens 4 Click Next The Pointsec PC installation program checks the selected volume...

Page 39: ...em code necessary and verifies the volumes available For example During every start up Pointsec PC runs a suite of self tests to verify that its integrity has not been compromised Once Pointsec PC is...

Page 40: ...u can access the workstation After restarting and installing the system code Pointsec PC opens the User Identification dialog box 1 Enter the name and password of one of the administrator accounts you...

Page 41: ...l and you can log in to Windows Pointsec PC creates and saves the recovery file for the workstation in the location specified when installing Pointsec PC After that Pointsec PC starts to encrypt the v...

Page 42: ...prompted authenticate yourself Pointsec PC Management Console opens For more information on working in the Management Console see the Pointsec PC Administrator s Guide Encryption Progress The followin...

Page 43: ...ithout spaces or special characters for example C P4PCINST Save the changes to precheck txt and close the file 2 Install Pointsec PC as normal reboot the computer and authenticate Once the computer ha...

Page 44: ...e IBM Rescue Recovery Environment press F11 2 Pointsec PC PBA will be displayed Authenticate to Pointsec PC the following information is displayed Pointsec loading operating system To boot to the IBM...

Reviews: