background image

 

 

 

User’s Guide 

 

XyLoc Client 

(ver 8.x.x)

 

                         

 

 
 
 

Содержание XyLoc Client

Страница 1: ...User s Guide XyLoc Client ver 8 x x ...

Страница 2: ...istrative Levels 27 Administrator 27 User 28 Guest 28 AutoLogon 28 Authentication Methods 28 Login Authentication 28 Unlock Authentication 29 Configuring the XyLoc Software 30 Security Configuration and User Preferences 30 User Setup 31 User Name 31 Add User 32 What It Does 32 Delete User 32 Key ID 32 Add Key 32 Delete Key 32 Login Authentication 32 Allow Password Override No Key 33 Unlock Authent...

Страница 3: ...c Keys 52 Find Specific Key Mode 53 Find Strongest Key Mode 53 Sequence number 53 Range 54 Key Voltage 54 Key Revision 54 Overriding the XyLoc System 55 User Forgets Their Key 55 User Does Not Have a XyLoc Key 56 Unlocking using Password Override 56 Replacing the XyLoc Battery 57 Software Removal 57 Troubleshooting 58 System Functionality 60 Normal Operational Mode 60 Hardware Architecture 60 Radi...

Страница 4: ...wer any questions or provide any needed assistance Please contact Ensure Technologies Technical Support 734 547 1631 support ensuretech com FCC Compliance This device complies with Part 15 of the FCC Rules and with RSS 210 of Industry Canada Operation of this device is subject to the following two conditions 1 This device may not cause harmful interference and 2 This device must accept any interfe...

Страница 5: ...ators or department managers One Lock can support multiple Keys for shared PC environments Kiosk accounts Access Methods Single factor security Hands Free Select User Name Dual factor security recommended Must Enter Password Transparent Operation Protects PC without requiring any action or intervention by the user Programmable Range User definable Active Zone for maximum flexibility Management Use...

Страница 6: ...s of XyLoc Solo is three fold 1 Providing full time access control to PCs and portables 2 Taking the burden of compliance off the end user 3 Making the computer more convenient for the user XyLoc Solo runs on Windows 2000 and Windows XP It has been designed with careful consideration to the varying security dynamics of these operating systems XyLoc provides an additional layer of protection to the...

Страница 7: ...eiver that plugs into a USB port XyLoc Key a small wireless transmitter with unique user ID that can be clipped to a belt or key ring worn on a neck lanyard or attached to an ID badge How XyLoc Works The XyLoc Lock and Key are in constant encoded two way wireless communication with each other As an authorized user approaches the PC the XyLoc Key identifies and authenticates the user and unlocks th...

Страница 8: ...tself and only an Administrator should have access to truly bypass XyLoc in Safe Mode Lastly in Windows 2000 XP the password protected screensaver is no longer password protected Because XyLoc takes control of the security of the workstation XyLoc also handles the locking action of the PC Since the system will lock immediately when the user leaves his her active range the password protection on th...

Страница 9: ...t performance from XyLoc For additional guidelines and suggestions please view the XyLoc Positioning Tutorial included on the installation CD Ideal placement is with the face of the Key parallel to the LED on the front of the Lock The best performance of the system will be achieved by trying to maintain this positioning while you are seated at your PC doing your work The primary factor in deciding...

Страница 10: ...r will wear the Key on the right side of the belt use the Velcro strip to secure the Lock to the underside of the user s desk The Lock should be at the same height as the Key will be when the user is seated The user should keep the face of the Key pointing at the LED Ideal Lock Placement Acceptable Lock Placement Less Desirable Lock Placement ...

Страница 11: ...Lock Status Light The LED indicator light on the XyLoc Lock has three possible states 1 Green The indicator light is green when the computer is unlocked and available for access 2 Red The indicator light is red when the computer is locked or disabled 3 Off The indicator light is off if the XyLoc system is not receiving power LED Status Light ...

Страница 12: ...y ON just press and release the O button The KeyCard uses sophisticated power management technology and will automatically turn OFF approximately 9 hours after it was first turned ON You may extend this automatic turn OFF time up to 4 additional hours by pressing the O button one time for each additional hour any time after the Key has been turned ON The Status LED also functions as a battery test...

Страница 13: ...ensure user compliance XyLoc is capable of identifying a Key that has been left stationary The XyLoc system can be configured to automatically secure the workstation should a Key be left unattended This action is also recorded in the Audit Logs NOTE To insert the battery into the KeyCard place the KeyCard with the XyLoc logo face down remove the two retaining screws and slide open the lid Replace ...

Страница 14: ...e Windows XPe version of the XyLoc client only supports English The other language versions have been removed to keep the install package small enough to be installed on a Windows XPe Thin Client device NOTE In version 8 2 4 the installation program was changed to an MSI based installer This has changed some of the installation process slightly as well as the screens that are displayed The instruc...

Страница 15: ...Ensure Technologies User s Guide for XyLoc Client ver 8 x x Drawing 510 0100 003 Drawing Rev 0 08 Rev Date 04 25 2006 Page 15 of 62 5 Click Next on the welcome screen to continue with installation ...

Страница 16: ...4 25 2006 Page 16 of 62 6 Please review the terms of the Software License Agreement If you accept all of the terms of the Software License Agreement click Yes and the installation will continue If you do not accept all of the terms of the Software License Agreement click No to cancel the installation process ...

Страница 17: ...5 2006 Page 17 of 62 7 Once the program is ready to install the files the Ready to Install window will display Click Install on this screen when you are ready to install NOTE This screen does not come up in 8 2 3 and earlier 8 For NT4 users the Question window will be presented Select Yes when using the USB lock ...

Страница 18: ...n account type the account name here being careful to enter the name exactly as it appears for your normal logon Please create a user via the Users control panel in Windows 10 Lock Identification XyLoc will attempt to find the port to which the Lock is attached Click OK to continue On a new installation the Lock should not be connected yet therefore XyLoc will not find the Lock The Port Selection ...

Страница 19: ...03 Drawing Rev 0 08 Rev Date 04 25 2006 Page 19 of 62 11 If you are using the USB version connect the lock to the computer at this time NOTE On Windows XP the Found New Hardware Wizard will appear Leave the default for Install the software automatically Recommended and click Next ...

Страница 20: ...drivers and install automatically 13 If for some reason Windows XP does not find the driver it will likely prompt the user to Insert the disk labeled XyLocUSB Installation Diskette If this occurs click OK and then click Browse Point to C WINDOWS System32 Drivers directory which should contain the XyLocUSB sys file necessary to install the USB device Click OK ...

Страница 21: ...Ensure Technologies User s Guide for XyLoc Client ver 8 x x Drawing 510 0100 003 Drawing Rev 0 08 Rev Date 04 25 2006 Page 21 of 62 14 Click Finish to complete the new device installation ...

Страница 22: ... Once Windows has finished installing the device click Continue 16 Confirm XyLoc Key ID XyLoc will attempt to identify the closest Key and insert that Key ID into this field Refer to the label on your XyLoc Key and verify that it matches the Key ID shown If no Key ID is shown or if it is not the correct Key ID please enter it manually ...

Страница 23: ...OTE This field is an optional field If the name is left blank the actual Account Name will be used instead 18 XSS IP Configuration This screen has a field to enter the address of the XSS XyLoc Security Server if there is one If there is no XSS this field can be left blank NOTE XyLoc 8 2 4 also added the ability to use the server s DNS name for the address instead of the IP address You can enter ei...

Страница 24: ...yLoc Client ver 8 x x Drawing 510 0100 003 Drawing Rev 0 08 Rev Date 04 25 2006 Page 24 of 62 19 XyLoc Configuration Summary This screen provides a summary of the features you just selected Choose Finish to complete the Installation Wizard ...

Страница 25: ...with the XyLoc key 23 Your network provider logon screen Microsoft or Novell will then appear Enter your system account password Unless your system account password periodically expires this will be the last time you will be asked to enter your Microsoft or Novell password from the network provider logon screen 24 Once the desktop appears you will also see a XyLoc Status message that will appear b...

Страница 26: ...ping away from your PC and watch to see if it secures If it does you re all set and ready to go You can also adjust the range at which the XyLoc locks and unlocks your PC see Setting the Active Zone in the section for Advanced User Settings 27 To further customize your installation follow the directions under Configuring the XyLoc Software NOTE The XyLoc icon in the System Tray can be used to view...

Страница 27: ...ager see Getting Started User Setup Only an Administrator can access the Administrative Levels settings User Setup PC Setup Administrator Full access to Configuration Manager and all Users settings User Only Range Settings and Personal Name can be changed No changes can be made Guest No access to XyLoc Configuration Manager A User can only access his her own settings no one else s settings will be...

Страница 28: ...the logon process for the user The first time a user successfully logs in to XyLoc using any of the methods described below they will be prompted to enter their network logon and password The next time the user logs in XyLoc will automatically log the user in to their network account Authentication Methods There are two types of authentication settings available in the User Setup tab of the XyLoc ...

Страница 29: ...r name from the list of users found Must Enter Password This setting requires that a user enter his her password before that user can unlock The system will display all the authorized keys in the area and once the user selects their name from the list they will be prompted for their password At Unlock the user must select their name from the list regardless of how many keys are found Unlike at Log...

Страница 30: ...ouble click on the ET XyLoc icon in the System Tray The XyLoc Configuration Manager has two tabs from which XyLoc s operating parameters are set User Setup PC Setup NOTE The XyLoc system is NOT disabled when the XyLoc Configuration Manager is running If the system locks while the configuration manager is open any unsaved changes will be lost NOTE Starting with XyLoc version 8 3 5 if an XSS address...

Страница 31: ...selected account Click Add Key to use the Key Wizard to add a new key Click Delete Key to delete the selected key Click Advanced Settings to access additional settings Select Login Authentication method Select Unlock Authentication method for the Select Allow Password Override No Key to allow override access at the initial login Select Allow Password Override No Key to enable override access to th...

Страница 32: ...be removed Also see Disable this Account Key ID What It Does Recommended Use Shows the unique number of the Key or Keys issued to a particular login account See Adding New Keys and Kiosk Accounts Add Key What It Does Recommended Use Enables you to add a new key for the selected user or kiosk account See Adding New Keys and Kiosk Accounts Delete Key What It Does Recommended Use Enables you to delet...

Страница 33: ... security Allow Password Override No Key What It Does Recommended Use Allows the user to login to the PC without requiring an authorized key Administrators should enable this setting if they want to allow user access without the XyLoc Key e g when the user forgets his Key If this option is unchecked the account cannot be accessed without a key This provides maximum security especially when used in...

Страница 34: ...ettings for maximum security Allow Password Override No Key What It Does Recommended Use Allows the user to unlock the PC without requiring an authorized key Administrators should enable this setting if they want to allow the user to unlock without the XyLoc Key e g when the user forgets his Key If this option is unchecked the account cannot be unlocked without a key This provides maximum security...

Страница 35: ...or XyLoc operation based on user preference and office size environment Range Refinement What It Does Recommended Use Permits fine adjustment of the Active Zone by opening the Range Setting box Select when minor adjustments of the Active Zone are desired Personal Name What It Does Recommended Use Specifies the user s full name Enter the user s full name if you prefer additional user information be...

Страница 36: ...ive Level for the selected user and key Select to play the Default system sound when XyLoc secures the PC Select to enable the Pass Key option for Administrators Select Disable Key to disable specific key from log on account Select the Auto Logoff Time to close an account after a period of inactivity after screen is locked Select to assist with preventing users from leaving key unattended Allows t...

Страница 37: ...d of logging off users Auto Logoff allows you to prevent a locked PC from staying logged on indefinitely This feature can work independently or in conjunction with the User can logoff locked workstation function User can logoff locked workstation What It Does Recommended Use Allows the user to log off another user who logged on to and locked a workstation For fastest multi user access also see Kio...

Страница 38: ...ocking What It Does Recommended Use Plays the Default system sound when XyLoc secures the PC Enable this setting initially to provide users with audio feedback when their PCs are secured After users are familiar with XyLoc s operation they may no longer need or desire this feature Lock if the Key is Stationary for What It Does Recommended Use Secures the computer s desktop automatically if the use...

Страница 39: ...ended Use Locks the PC after a period of inactivity in password override mode Enable this for when the users key has been forgotten and you wish the PC to lock after a period of inactivity This is NOT the recommended use of XyLoc as it does not take advantage of XyLoc s full time proximity based security capabilities Run Application Integration Logoff What It Does Recommended Use Executes a logoff...

Страница 40: ...tive Zone by selecting the appropriate Range for your environment You can further refine this range with Range Refinement The top bar labeled Active Zone shows the approximate range where the computer will remain unlocked Below this is an adjustable range scale This permits the setting of Initial Unlock and the Lock The Initial Unlock setting shown in Green sets the ...

Страница 41: ...where the computer will secure as the user steps away NOTE Given the nature of RF communications and the differing environmental characteristics of each user s office or cubicle environment the precise Active Zone setting will vary for each user s environment Ensure recommends that users initially selecting Short and then decide if Medium or Long is a more appropriate setting Further adjustments c...

Страница 42: ... machine will appear in the User Name window of the Configuration Manager for an administrator to create XyLoc accounts from You can also add existing network accounts to XyLoc by using the XyLoc Configuration Manager s Add User button NOTE This will only add existing Microsoft or Novell network accounts to XyLoc This does not actually create a new network account The Network Administrator on the ...

Страница 43: ...Rev 0 08 Rev Date 04 25 2006 Page 43 of 62 2 To create a new network user enter a valid user name in the field and then click Next to proceed 3 Select the Administrative Level for the new user Click Next to proceed 4 Enter the identification number for the XyLoc Key assigned to the new user ...

Страница 44: ...ver 8 x x Drawing 510 0100 003 Drawing Rev 0 08 Rev Date 04 25 2006 Page 44 of 62 5 Select the Range setting for this Key 6 Select the Authentication Methods for this Key 7 Finally enter a personal name to be used to more identify the owner of this Key ...

Страница 45: ... Sixth Grade Math account in a school You may easily set up such a kiosk account by adding multiple keys to the same account In this Kiosk account all users share the same XyLoc preferences except for Range and XyLoc Password This enables the shared use of a single account while still tracking individual users access of the account in the XyLoc activity logs Switching among users is fast and conve...

Страница 46: ...d on the label on the back of the Key and click Next to proceed 2 Select the Range for the new Key and click Next to continue 3 Enter and confirm a unique Password for the new Key and click Next to continue NOTE This password is the XyLoc Password or XyLoc PIN that has been referenced in this document already Starting in version 8 2 4 this password is the only password that is accepted when used i...

Страница 47: ...epping away from the PC It is also possible to have a button available on the desktop to manually lock the desktop without having to right click the icon By default this button is disabled To activate this feature right click on the XyLoc icon and on the popup menu click on Show Lock PC Button This will put a lock button right above the system tray on the desktop The user can click this button at ...

Страница 48: ...installation to be centrally managed through a XyLoc Security Server XSS Not used with XyLoc Solo installations but offers easy expansion and management of larger XyLoc installations Please refer to XSS User Guide for additional details Select the port to which XyLoc is attached Click Advanced Settings to access additional settings such as Logging Level Click Save to keep any settings changes you ...

Страница 49: ...at It Does Recommended Use Specifies the number of log records to upload to the XSS at a time Provides an Administrator the ability to manage traffic on the network between the XyLoc client and the XSS Advanced Settings What It Does Recommended Use Opens the Advanced PC Settings window Click the Advanced Settings button to modify XSS and Password settings ...

Страница 50: ...ls XyLoc Mode What It Does Recommended Use Provides two modes of operation normal use Security or third party software development SDK NOTE This must be set to Security in order for the XyLoc to lock the PC Min Password Length What It Does Recommended Use Determines the minimum acceptable password length for the XyLoc Password This should be set to at least 4 to provide robust security Settings fo...

Страница 51: ...t data to track User Activity This encrypted log may be accessed under the Tools menu of the XyLoc Configuration Manager User Activity Log What It Does Recommended Use Displays a history of each user that has logged on and logged off of the machine Track user activity including dates and times NOTE This option will only be available to a XyLoc Administrator ...

Страница 52: ...c Client ver 8 x x Drawing 510 0100 003 Drawing Rev 0 08 Rev Date 04 25 2006 Page 52 of 62 Testing XyLoc Keys Selecting Display Key Info from the Tools menu provides administrators with a diagnostic tool for identifying and testing XyLoc Keys ...

Страница 53: ...strator can view other keys and therefore change this setting from the active key Find Strongest Key Mode What It Does Recommended Use Allows you to test the XyLoc Key with the strongest signal within 50 feet of the XyLoc Lock Select Find Strongest Key mode and click Start Search to identify the XyLoc Key with the strongest signal you can also use this function to determine or verify a Key ID by p...

Страница 54: ...p determine the optimal Range for your environment Key Voltage What It Does Recommended Use Displays the current voltage of keys that support this function While the system is searching for the key press the O button on the key and the voltage will be displayed Key Revision What It Does Recommended Use Displays the current revision of the key Use to determine the revision of the key when instructe...

Страница 55: ...e key is not present The XyLoc system software ensures that there is always at least one administrator that can password override into a machine NOTE Make sure that your XyLoc installation is working with the Allow Password Override No Key checked before un checking the option You will not be able to gain access to your computer if the Key is missing or not functioning properly or if you forget yo...

Страница 56: ...r PC Administrators or Helpdesk staff mostly use this to allow them access to a PC when they don t have a XyLoc key There is a registry setting available to disable any non XyLoc user from gaining access to a XyLoc protected PC however this is not recommended unless the centralized server XSS is available as this does restrict ALL non XyLoc users including Administrator Contact Ensure Technologies...

Страница 57: ...ity indicators side up 6 Slide compartment cover to close and replace the screws Software Removal In the event that you have to remove the XyLoc client software please use the following instructions 1 Before you can remove the software you must stop the XyLoc service This can be done through the Services applet in the Control Panel in Windows or through the XyLoc Configuration Manager under Tools ...

Страница 58: ...onment reference Microsoft TechNet article Q294739 Ensure Technologies supports Windows XP in a network environment The XyLoc Kiosk account provides this type of functionality Please contact Ensure Technologies for further information 6 The XyLoc icon in the System Tray can be used to view the status of your system and to help troubleshoot the system Simply move your cursor over the XyLoc icon to ...

Страница 59: ...v Date 04 25 2006 Page 59 of 62 11 Windows XP Embedded Thin Clients The XPe version of the XyLoc client does not support languages other than English at this time Earlier versions did erroneously allow the user to select other languages However English is the only option that will install successfully ...

Страница 60: ...ew features can be added The Lock can receive firmware updates via the USB port This firmware is stored in flash memory and is used to control the operation of the system The communications controller controls the Lock to host communications and is permanently programmed The Lock also incorporates an EEPROM that stores operational parameters such as channel allocations The Key has a similar archit...

Страница 61: ...e same frequencies at exactly the same time Time Division Multiple Access TDMA Keys that are within range of each other can also reuse the same channel allocation by the use of time division multiple access This allows several hundred Keys to coexist within a 50 foot radius As the Keys move through the building they adaptively find new time slots to avoid interference with other Keys in that area ...

Страница 62: ...ved support for Windows ME RS 0 03 01 26 2005 Updated RS 0 04 02 21 2005 Added removal instructions RS 0 05 05 09 2005 Removed XyCrypt RS 0 06 07 18 2005 Added changes to installer and Kiosk account that were done in XyLoc version 8 2 4 RS 0 07 04 25 2006 Added support for PINs in a Unique account and added more detail on XPe support RS 0 08 XX XX 2008 Update drawings contact information removed W...

Отзывы: