Your XyLoc Package ............................................................................................................................... 4
Support Information ................................................................................................................................. 4
How XyLoc Works ........................................................................................................................................... 7
XyLoc Secure Login and Password Overview ......................................................................................... 8
Windows 2000/XP ............................................................................................................................................ 8
Getting Started ............................................................................................................................... 9
Using the XyLoc Lock ............................................................................................................................. 9
Installing the XyLoc Lock (USB) ............................................................................................................ 9
Placement of the XyLoc Lock ........................................................................................................................... 9
The XyLoc Lock Status Light ......................................................................................................................... 11
Using the XyLoc Key ............................................................................................................................. 12
Installing the XyLoc Software ............................................................................................................... 14
User ......................................................................................................................................................... 28
Configuring the XyLoc Software ........................................................................................................... 30
Security Configuration and User Preferences .................................................................................................. 30
User Setup ....................................................................................................................................................... 31
User Name ............................................................................................................................................... 31
What It Does: ......................................................................................................................................... 32
Key ID ..................................................................................................................................................... 32
Allow Password Override (No Key) ....................................................................................................... 34
Unlock to Key Only for up to x seconds/minutes .................................................................................... 34
Range ...................................................................................................................................................... 35
Range Refinement ................................................................................................................................... 35
Personal Name ........................................................................................................................................ 35
Advanced User Settings .................................................................................................................................. 36
Auto Logoff Time ................................................................................................................................... 37
User can logoff locked workstation ......................................................................................................... 37
Key ID ..................................................................................................................................................... 37
What It Does: ......................................................................................................................................... 39
Sets the XyLoc password. ...................................................................................................................... 39
Note: This box will only appear if this key is part of a Kiosk Account. ............................................... 39
Lock in Password Override ..................................................................................................................... 39
Run Application Integration Logoff ........................................................................................................ 39
Setting the Active Zone ........................................................................................................................... 40
Adding New Users .................................................................................................................................. 42
Adding New Keys ................................................................................................................................... 46
PC Setup .......................................................................................................................................................... 48
XyLoc Lock Attached To ........................................................................................................................ 48
XyLoc Security Server Search Order ...................................................................................................... 48
Log Records To Upload .......................................................................................................................... 49
Advanced PC Settings ..................................................................................................................................... 50
XSS Client Port ....................................................................................................................................... 50
User Activity Log .................................................................................................................................... 51
NOTE: This option will only be available to a XyLoc Administrator. ................................................. 51
Sequence number .................................................................................................................................... 53
Range ...................................................................................................................................................... 54
Key Voltage ............................................................................................................................................ 54
Overriding the XyLoc System ................................................................................................................ 55
User Forgets Their Key… ............................................................................................................................... 55
User Does Not Have a XyLoc Key… ............................................................................................................. 56
Unlocking using Password Override… ........................................................................................................... 56
Replacing the XyLoc Battery ................................................................................................................. 57
Electronic version of XyLoc User’s Guide in Adobe Acrobat format
Introduction
Adobe Acrobat Reader installer
Support Information
We are available to answer any questions or provide any needed assistance. Please contact:
Ensure Technologies
Technical Support
(734) 547-1631
support@ensuretech.com
FCC Compliance
This device complies with Part 15 of the FCC Rules and with RSS-210 of Industry Canada.
Operation of this device is subject to the following two conditions:
1. This device may not cause harmful interference, and
2. This device must accept any interference received, including interference that may cause
undesired operation.
Warning: Changes or modifications not expressly approved by Ensure Technologies for compliance could
void the user’s authority to operate the equipment. The term “IC:” before the radio certification number
only signifies that Industry Canada technical specifications were met.
Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x
The XyLoc Solo is a flexible hardware/software platform with expanding capabilities. Below
is an overview of the core capabilities in the XyLoc Solo and future capabilities.
CapabilityFunctionality
Full-Time Access Control
Proximity-Based ID and
Authentication
Automatic Network Logon
Multi-User Support
Access Methods
Transparent Operation
Programmable Range
Management
System Connection
OS Support
Continuously monitors for the presence or absence of authorized users, secures the PC
when user leaves Active Zone, and unlocks when user returns
Confirms the user’s identity and verifies authorized access to the PC based on user’s
proximity to PC
Provides automatic logon to pre-configured network services; maintains network
sessions when the user leaves Active Zone.
One Key can be programmed to unlock hundreds of Locks (for system administrators or
department managers); One Lock can support multiple Keys (for shared PC
environments); Kiosk accounts
Single factor security: Hands-Free, Select User Name
Dual factor security (recommended): Must Enter Password
Protects PC without requiring any action or intervention by the user
User-definable Active Zone for maximum flexibility
User or administrator locally manages and administers XyLoc system
Connects via the USB port
Windows 2000, and XP. NOTE: Windows 95, Windows 98, NT4 and Windows ME
are not supported
Key Type
Installation
Screen Saver Support
Scalable Management
KeyCard
Installs in minutes using only one cable and simple installation Wizard
Any windows screen saver is supported. NOTE: Since XyLoc takes over the security
of the workstation a password protected screen saver in Windows 2000/XP is no longer
available or needed. XyLoc will secure the workstation for the user immediately when
they exit the Active Zone.
XyLoc Security Server for central management and audit log tracking of the users
Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x
XyLoc Solo delivers desktop security that positively identifies authorized users and permits
access to PCs and portables as appropriate.
The focus of XyLoc Solo is three-fold:
1. Providing full-time access control to PCs and portables
2. Taking the burden of compliance off the end user
3. Making the computer more convenient for the user
XyLoc Solo runs on Windows 2000 and Windows XP. It has been designed with careful
consideration to the varying security dynamics of these operating systems. XyLoc provides
an additional layer of protection to the built-in security capabilities of Windows 2000 and XP.
The XyLoc System
XyLoc Solo Overview
XyLoc KeyCard
Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x
XyLoc is a microprocessor-based turnkey solution. Its patented technology is based on
wireless radio frequency (RF) technology that continuously monitors authorized users based
on their proximity to the PC and grants access to the PC as appropriate. The XyLoc system
consists of:
•XyLoc Software: authenticates and identifies multiple users and controls the lock and
key;
• XyLoc Lock: a small ultra-low power receiver that plugs into a USB port;
• XyLoc Key: a small, wireless transmitter with unique user ID that can be clipped to a
belt or key ring, worn on a neck lanyard, or attached to an ID badge.
How XyLoc Works
The XyLoc Lock and Key are in constant, encoded two-way wireless communication with
each other. As an authorized user approaches the PC, the XyLoc Key identifies and
authenticates the user, and unlocks the PC when the user enters the pre-set Range. Then,
when the authorized user moves out of the Active Zone, XyLoc automatically secures the
desktop. The PC is instantly secured and remains so until an authorized user returns to within
a user-configured unlock range. Background tasks, such as printing and downloading,
however, may continue while the PC is securely locked.
Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x
The Windows NT based Operating Systems (2000/XP) are designed with more inherent
security. There is already a GINA in place which controls the logins, profiles and security
permissions on the workstation. The XyLoc system also has a GINA, which takes over the
primary windows logon and in turn “calls” the Microsoft GINA. Most of the inherent
Microsoft security is still in place, and XyLoc enhances that security with a proximity based
solution.
The XyLoc Secure Login will be the first screen that is displayed on the PC, and the same
basic login process will be used. The exception is that hitting “CTRL+ALT+DEL” on the
keyboard will allow access to the standard Microsoft/Novell login box and a user can login
with a valid local or domain account and override XyLoc. This is to allow an Administrator
to still gain access to the PC, even if that Administrator does not have a XyLoc account.
There is a registry setting that can be enabled which will block all non-XyLoc accounts from
gaining access to the system, even Administrators, however this setting is disabled on the
default installation.
Also, the F8 keystroke at boot up is not disabled at login. This is due to the security of
Windows itself, and only an Administrator should have access to truly bypass XyLoc in Safe
Mode.
Lastly, in Windows 2000/XP, the password-protected screensaver is no longer password
protected. Because XyLoc takes control of the security of the workstation, XyLoc also
handles the locking action of the PC. Since the system will lock immediately when the user
leaves his/her active range the password protection on the screensaver is no longer needed. It
will still function as a standard screensaver, but will no longer have a password.
XyLoc Password
For flexibility and security, the XyLoc system provides an additional password, the XyLoc
Password (sometimes referred to as a PIN). The XyLoc password is only used in a Kiosk
account and has two possible applications:
1. It is used by the Kiosk Account feature to provide multi-factor authentication in a shared
log-on account. NOTE: Starting in version 8.2.4, this is the only password that is
accepted in conjunction with a user’s XyLoc key.
2. It is used in conjunction with the user’s Personal Name when performing a Password
Override in a Kiosk account to ensure individual security even when a XyLoc Key is not
present.
NOTE: In a XyLoc Solo, when used in a unique account environment, the XyLoc Password
(PIN) will synchronize with the user’s unique account password. The Kiosk account is the
only type that will have a XyLoc password that can differ from the user’s system account
password. If it is desired to use at PIN with a unique account, XyLoc 8.3.6 with
must be used. Earlier version of either will not support this functionality.
XSS 4.2.4
Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x
The XyLoc Lock included in this package is a low power receiver that is connected to the PC
through a USB interface.
Note: Windows 2000/XP users must have local Administrator privileges to complete the
installation.
Installing the XyLoc Lock (USB)
1. Close all open applications.
2. Please wait to attach USB XyLoc lock until prompted by XyLoc software
install wizard.
3. Insert the XyLoc CD into the CD drive.
4. Install the XyLoc System Software. If the Auto Run does not start the CD,
please go to the CD and click on the “Install.exe” file and follow the instructions.
USB Plug
Placement of the XyLoc Lock
XyLoc uses advanced wireless technology to make PC security more convenient for the user.
The proper placement of the XyLoc Lock will ensure that users get the best performance
from XyLoc. For additional guidelines and suggestions, please view the “XyLoc Positioning Tutorial” included on the installation CD.
Ideal placement is with the face of the Key parallel to the LED on the front of the Lock. The
best performance of the system will be achieved by trying to maintain this positioning while
you are seated at your PC doing your work.
The primary factor in deciding where to place the XyLoc Lock is to determine where the user
will wear the XyLoc Key the majority of the time. The Key can be clipped to a shirt pocket or
belt or worn on a lanyard around the user’s neck.
Once you’ve identified where the Key will be worn, place the Lock at the same height as
where the Key will be when the user is at the PC. You should also make sure that the path
between the Lock and Key is unobstructed (such as obstruction caused by your arm that
might occur while using your mouse or keyboard).
For example, if the user will wear the Key on the left side of the shirt, use the Velcro strip to
secure the Lock to the left side of the user’s monitor at the same height as the Key will be
when the user is seated.
Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x
If the user will wear the Key on the right side of the belt, use the Velcro strip to secure the
Lock to the underside of the user’s desk. The Lock should be at the same height as the Key
will be when the user is seated. The user should keep the face of the Key pointing at the LED.
Ideal Lock Placement Acceptable Lock Placement
Less Desirable Lock Placement
Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x
The XyLoc Key is a low power radio transmitter with a unique non-volatile and noncloneable user identification code.
LED Status Light
ON Button
The KeyCard is powered by single coin cell that last approximately twelve to twenty-four
months. The KeyCard has two switches on its front panel marked “O” and “X”. The “O”
turns the Key ON and “X” manually turns the Key OFF. The Status LED flashes green
when the system is turned ON and red when it is turned OFF. The OFF action requires an
extended depression of the “X” button to turn the Key OFF, but to turn the key ON just press
and release the “O” button.
The KeyCard uses sophisticated power management technology and will automatically turn
OFF approximately 9 hours after it was first turned ON. You may extend this automatic turn
OFF time up to 4 additional hours by pressing the “O” button one time for each additional
hour, any time after the Key has been turned ON.
The Status LED also functions as a battery tester. As long as the LED functions, the
KeyCard has sufficient battery power. The XyLoc software also incorporates a Battery
Voltage Meter with which the user may check the battery life through the XyLoc
configuration software (See the section for Testing the XyLoc Keys). Also, the XyLoc
Security Server (XSS) at any time has a status log that reports when a battery is running low
on battery life. Please review the XSS User Guide for more details.
OFF Button
Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x
The Key must be in the possession of the user at all ti mes. The XyLoc system provides tools
to help ensure user compliance. XyLoc is capable of identifying a Key that has been left
stationary. The XyLoc system can be configured to automatically secure the workstation,
should a Key be left unattended. This action is also recorded in the Audit Logs.
NOTE: To insert the battery into the KeyCard, place the KeyCard with the XyLoc logo
face down, remove the two retaining screws and slide open the lid. Replace the CR 3032
coin cell with the “+” up.
Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x
The XyLoc software controls the operation of the Lock/Key and their interaction with the
PC’s operating system. The software offers flexible configuration
desktop preferences to meet the users varying needs. Installation is accomplished via a
simple-to-use wizard.
Except where noted, the following instructions apply to all supported Microsoft
Windows systems.
NOTE: Windows 2000/XP users must have local Administrator privileges to complete
the installation.
NOTE: The Windows XPe version of the XyLoc client only supports English. The
other language versions have been removed to keep the install package small enough to
be installed on a Windows XPe Thin Client device.
NOTE: In version 8.2.4 the installation program was changed to an MSI based
installer. This has changed some of the installation process slightly as well as the
screens that are displayed. The instructions below are for this new installer, except
where indicated.
1. Exit any applications that are currently running.
options and selectable
2. Place the XyLoc CD-ROM into the CD-ROM drive. Choose Install XyLoc Software.
3. If the installer does not automatically launch, use either My Computer or Windows
Explorer to select the CD-ROM drive, and run install.exe to execute the Installation
Wizard and then follow the Wizard’s instructions.
4. Select the language for the installation.
Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x
6. Please review the terms of the Software License Agreement. If you accept all of the
terms of the Software License Agreement, click Yes, and the installation will continue.
If you do not accept all of the terms of the Software License Agreement, click No to
cancel the installation process.
Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x
9. Login Account Selection: Select the desired user name from the list. This list is created
by examining the Users database on the PC. If XyLoc is to be configured for a network
logon account, type the account name here, being careful to enter the name exactly as it
appears for your normal logon. Please create a user via the Users control panel in
Windows.
10. Lock Identification: XyLoc will attempt to find the port to which the Lock is attached.
Click OK to continue. On a new installation, the Lock should not be connected yet,
therefore XyLoc will not find the Lock. The Port Selection screen will appear. Please
confirm that the correct port has been selected and correct it if necessary. Click “Next”.
Ensure Technologies – User’s Guide for XyLoc Client ver 8.x.x