McAfee EBCACE-AA-HA Product Manual

Page 1
PRODUCT GUIDE
E-Business Client Administration
VERSION 7.1.1
Page 2
COPYRIGHT
© 2002 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Networks Associates Technology, Inc., or its suppliers or affiliate companies. To obtain this permission, write to the attention of the Network Associates legal department at: 3965 Freedom Circle, Santa Clara, California 95054, or call +1-972-308-9960.
TRADEMARK ATTRIBUTIONS
Active Security, ActiveHelp, ActiveShield, AntiVirus Anyware and design, Bomb Shelter, Building a World of Trust, Certified Network Expert, Clean-Up, CleanUp Wizard, Cloaking, CNX, CNX Certification Certified Network Expert and design, CyberCop, CyberMedia, CyberMedia UnInstaller, Data Security Letter and design, Design (logo), Design (Rabbit with hat), design (stylized N), Disk Minder, Distributed Sniffer System, Distributed Sniffer System (in Katakana), Dr Solomon’s, Dr Solomon’s label, Enterprise SecureCast, EZ SetUp, First Aid, ForceField, Gauntlet, GMT, GroupShield, Guard Dog, HelpDesk, HomeGuard, Hunter, I C Expert, ISDN TEL/ SCOPE, LAN Administration Architecture and design, LANGuru, LANGuru (in Katakana), LANWords, Leading Help Desk Technology, LM1, M and design, Magic Solutions, Magic University, MagicSpy, MagicTree, MagicWord, McAfee Associates, McAfee, McAfee (in Katakana), McAfee and design, NetStalker, MoneyMagic, More Power To You, MultiMedia Cloaking, myCIO.com, myCIO.com design (CIO design), myCIO.com Your Chief Internet Officer & design, NAI & design, Net Tools, Net Tools (in Katakana), NetCrypto, NetOctopus, NetRoom, NetScan, NetShield, NetStalker, Network Associates, Network General, Network Uptime!, NetXray, NotesGuard, Nuts & Bolts, Oil Change, PC Medic, PC Medic 97, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, PowerLogin, PowerTelNet, Pretty Good Privacy, PrimeSupport, Recoverkey, Recoverkey – International, Registry Wizard, ReportMagic, RingFence, Router PM, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, SmartDesk, Sniffer, Sniffer (in Hangul), SniffMaster, SniffMaster (in Hangul), SniffMaster (in Katakana), SniffNet, Stalker, Stalker (stylized), Statistical Information Retrieval (SIR), SupportMagic, TeleSniffer, TIS, TMACH, TMEG, TNV, TVD, TNS, TSD, Total Network Security, Total Network Visibility, Total Service Desk, Total Virus Defense, Trusted MACH, Trusted Mail, UnInstaller, Virex, Virus Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker, WebWall, Who’s Watching Your Network, WinGauge, Your E-Business Defender, ZAC 2000, Zip Manager are registered
trademarks of Network Associates, Inc. and/or its affiliates in the US and/or other countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners.
LICENSE AGREEMENT
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO NAI OR THE PLACE OF PURCHASE FOR A FULL REFUND.
Issued February 2002 / McAfee E-Business Client Administration software version 7.1.1
Page 3
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Getting more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Contacting McAfee and Network Associates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Chapter 1 Introducing E-Business Client Administration . . . . . . . . . . . 9
Chapter 2 Installing E-Business Client Administration . . . . . . . . . . . . 11
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Installing E-Business Client Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Uninstalling E-Business Client Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Chapter 3 Installing E-Business Client . . . . . . . . . . . . . . . . . . . . . . . . . 15
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Installing E-Business Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Uninstalling E-Business Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Chapter 4 Working with E-Business Client Administration . . . . . . . . . 17
Starting E-Business Client Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Exporting E-Business Server public keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Creating client packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Defining client profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Selecting company logos (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Specifying the use of client keys (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Specifying the file transfer method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Creating client packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Sending packages to clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Validating keys in E-Business Client Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Chapter 5 Working with E-Business Client . . . . . . . . . . . . . . . . . . . . . . 23
Starting E-Business Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Generating keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Product Guide iii
Page 4
Contents
Encrypting and sending sensitive data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Decrypting data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Validating keys in E-Business Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Changing passphrases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Viewing the log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Closing E-Business Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
iv McAfee E-Business Client Administration software version 7.1.1
Page 5
Preface
Purpose
Audience
This Product Guide introduces McAfee E-Business Client Administration software version 7.1.1. This guide provides the following information: system requirements, detailed instructions for installing the software, descriptions of all product features, detailed instructions for creating and distributing client packages, and procedures for encrypting and sending data. It also provides a roadmap for getting additional information or help.
This guide is intended for administrators of McAfee E-Business Server who are responsible for the company’s security program.
Product Guide 5
Page 6
Preface
Getting more information
Product Guide System requirements, instructions for installing and
starting the software, product introduction and features, detailed instructions for creating and distributing client packages, and procedures for encrypting and sending data.
Available in an Adobe Acrobat .PDF file from either the product CD or the McAfee download site.
Help Product information in the Help system that is accessed
from within the application. Access from either a Help menu option in the application or by pressing the F1 key.
Release Notes README file. Product information, resolved issues, any
known issues, and last-minute additions or changes to the product or this guide.
Availab le as a .TXT fil e from either the pr oduct C D or t he McAfee download site.
Contact A list of phone numbers, street addresses, web
addresses, and fax numbers for Network Associates offices in the United States and around the world. Also includes contact information for services and resources, including:
n
Technical Support.
n
Customer Service.
n
Download Support.
n
AVERT Anti-Virus Research Site.
n
McAfee Beta Site.
n
On-Site Training.
n
Network Associates Offices Worldwide.
6 McAfee E-Business Client Administration software version 7.1.1
Page 7
Contacting McAfee and Network Associates
Technical Support http://knowledge.nai.com
McAfee Beta Site www.mcafeeb2b.com/beta/
Preface
AVERT Anti-Virus Research Site
Download Site
DAT File Updates
Product Upgrades
On-Site Training www.mcafeeb2b.com/services/mcafee-training/default.asp
Network Associates Customer Service:
E-mail services_corporate_division@nai.com
Web www.nai.com
US, Canada, and Latin America toll-free:
Phone +1-888-VIRUS NO or +1-888-847-8766
www.mcafeeb2b.com/avert
www.mcafeeb2b.com/naicommon/download/
www.mcafeeb2b.com/naicommon/download/dats/find.asp
www.mcafeeb2b.com/naicommon/download/upgrade/login.asp
Valid grant number required. Contact Network Associates Customer Service.
www.mcafeeb2b.com
Monday – Friday, 8 a.m. – 8 p.m., Central Time
For additional information on contacting Network Associates and McAfee — including toll-free numbers for other geographic areas — see the Contact file that accompanied this product release.
Product Guide 7
Page 8
Preface
8 McAfee E-Business Client Administration software version 7.1.1
Page 9
Introducing E-Business Client Administration
McAfee E-Business Client Administration 7.1.1 has a counterpart: McAfee E-Business Client 7.1.1. E-Business Client Administration allows you to create custom, self-extracting packages that your clients use to install E-Business Client. E-Business Client provides a simple drag and drop interface that allows each client that you exchange data with to transparently encrypt and sign sensitive data files, then send them to you by simply selecting the desired files. In addition, you use E-Business Client Administration in conjunction with McAfee E-Business Server 7.1.1 to generate keys and decrypt client data.
Use E-Business Client Administration to create custom packages for multiple client groups. For each client profile, you specify whether or not you want clients to generate keys or sign data, the file transfer method (e-mail or FTP) to use, and the corresponding file transfer settings. You can even include your company logo. After you send each custom package to clients and they perform the one-click installation, clients select the appropriate profile and the desired files. E-Business Client automatically encrypts, signs, and sends the files to you using your predefined key generation and file transfer settings.
1
Product Guide 9
Page 10
Introducing E-Business Client Administration
10 McAfee E-Business Client Administration software version 7.1.1
Page 11
Installing E-Business Client Administration
System requirements
Before you begin the installation, be sure to verify that the minimum system requirements are met on computers on which you want to install E-Business Client Administration.
NOTE
You might find it helpful to provide a list of the E-Business Client system requirements that apply to packages you create to clients. For a list of these requirements, see System requirements on page 15.
n
10 MB free disk space.
n
E-Business Client Administration works with E-Business Server 7.1.0 or later.
n
If you are using FTP as the file transfer method, you need an Internet-accessible FTP server.
2
n
If you are using FTP as the file transfer method, you need Microsoft Internet Explorer 3.0 or later.
n
If you are using e-mail as the file transfer method or if you are creating client packages that require client keys, you need a MAPI-compliant e-mail
system; for example, Microsoft Outlook, Microsoft Outlook Express, or Netscape Mail.
n
Any of the following Microsoft operating systems:
w Windows NT Server 4.0 with Service Pack 4 or later.
w Windows NT Workstation 4.0 with Service Pack 4 or later.
w Windows 2000 Advanced Server.
w Windows 2000 Professional.
w Windows 2000 Server.
w Windows XP Professional.
Product Guide 11
Page 12
Installing E-Business Client Administration
Installing E-Business Client Administration
Now that you have met the minimum system requirements on all applicable computers, you can install E-Business Client Administration.
1 If installing from the product CD, insert it into the CD-ROM drive of the
computer.
If downloading the files from the McAfee web site (www.mcafeeb2b.com/naicommon/download/upgrade/login.asp), follow the
steps on how to download the files provided there, then continue with
Step 2. Note that you must enter a valid customer grant number to
download product upgrades.
2 On the taskbar, click the Start button, then select Run. The Run dialog box
appears.
3 In Open, enter the path where the Setup program (EBCADMIN.EXE) is
located (for example, E:\PRODUCTS\EBCADMIN.EXE), then click to start Setup.
OK
4 Click Next.
5 Click Accept to indicate that you agree to the terms of the license.
6 Accept the default installation directory or click Browse to select another
location, then click
Next. If you select another location, an EBC Admin for
<Operating System> folder (for example, C:\Program Files\Network Associates\EBC Admin for Windows NT) is automatically appended to that path.
The default location is C:\Program Files\Network Associates\EBC Admin for <Operating System>.
7 Review the installation settings, then click Next to continue the
installation.
8 Click Finish to complete the installation.
12 McAfee E-Business Client Administration software version 7.1.1
Page 13
Installing E-Business Client Administration
Uninstalling E-Business Client Administration
1 On the taskbar, click the Start button, then select Settings, Control Panel.
2 Select Add/Remove Programs. The Add/Remove Programs Properties
dialog box appears.
3 Select McAfee E-Business Client Administration, then click Add/Remove.
4 Click OK when asked whether or not you want to remove the
application.
5 Click Finish when done.
Product Guide 13
Page 14
Installing E-Business Client Administration
14 McAfee E-Business Client Administration software version 7.1.1
Page 15
Installing E-Business Client
System requirements
Before you begin the installation, be sure to verify that the minimum system requirements are met on computers on which you want to install E-Business Client.
n
10 MB free disk space.
n
If your partner has specified that FTP is being used as the file transfer method, you need Microsoft Internet Explorer 3.0 or later.
n
If your partner has specified that e-mail is being used as the file transfer method or that client keys are required, you need a MAPI-compliant e-mail system;
for example, Microsoft Outlook, Microsoft Outlook Express, or Netscape Mail.
n
Any of the following Microsoft operating systems:
3
w Windows 95.
w Windows 98.
w Windows NT Server 4.0.
w Windows NT Workstation 4.0.
w Windows 2000 Advanced Server.
w Windows 2000 Professional.
w Windows 2000 Server.
w Windows Millennium Edition (Me).
w Windows XP Professional.
w Windows XP Home.
Product Guide 15
Page 16
Installing E-Business Client
Installing E-Business Client
Now that you have met the minimum system requirements on all applicable computers and have received a client package from the partner, you can install E-Business Client.
1 If you received the client package as an e-mail attachment, save the package
file (<Partner Name>.EXE) to the desired location on your computer.
If you received the client package on electronic media (for example, a disk), insert that media into the appropriate drive on your computer.
If you want to distribute client packages to other employees via a shared network drive, save the package file to that location and provide employees with
the path.
2 On the taskbar, click the Start button, then select Run. The Run dialog box
appears.
3 In Open, enter the path where the package file (<Partner Name>.EXE) is
located, then click
OK.
4 If you have installed E-Business Client previously, the installation is
complete.
If this is the first time you have installed E-Business Client, select the installation directory in the
Browse for Folder dialog box. A folder that
corresponds to the operating system (McAfee EBClient for <Operating System>; for example, McAfee EBClient for Windows NT4) is automatically appended to the location you select.
5 Verify the installation directory, then click Yes. You might find it helpful
to make a note of this location for future reference.
6 When asked whether or not you want to create a shortcut on the desktop,
Yes to do so.
click
Uninstalling E-Business Client
1 On the taskbar, click the Start button, then select Settings, Control Panel.
2 Select Add/Remove Programs. The Add/Remove Programs Properties
dialog box appears.
3 Select McAfee E-Business Client - <Partner Name>, then click Add/Remove.
4 If you are asked whether or not you want to restart the computer, click
Yes to complete the installation. Note that if you click No, you will be
required to restart the computer before you can install E-Business Client again.
16 McAfee E-Business Client Administration software version 7.1.1
Page 17
Working with E-Business Client Administration
Starting E-Business Client Administration
n
On the taskbar, click the Start button, select Programs, McAfee
E-Business Client Administration Administration again.
Exporting E-Business Server public keys
E-Business Client Administration requires your public key and uses it to encrypt data sent to you by your clients.
n
Export your public key from the E-Business Server keyring to an ASCII-armored key (.ASC) file. For more information on how to export keys, see the E-Business Server Product Guide.
, then select McAfee E-Business Client
4
Creating client packages
You need to complete the following tasks to create client packages:
n
Defining client profiles
n
Selecting company logos (optional)
n
Specifying the use of client keys (optional)
n
Specifying the file transfer method
n
Creating client packages
Defining client profiles
1 Start E-Business Client Administration. For detailed steps, see Starting
E-Business Client Administration on page 17.
2 Select Configure a new Client, then click Next.
3 In the Configure Profile dialog box, provide the following, then click Next.
w Profile Name — Type a literal description (up to 50 characters) of the
client package. Clients use this description to identify the company to which they are sending files. You might find it helpful to provide this name to clients.
Product Guide 17
Page 18
Working with E-Business Client Administration
You might also find it helpful to keep track of the names you assign to client profiles. When you send updated packages to clients, those with identical profile names are overwritten.
w Server Public Key — Type the path to the key (*.ASC) file that you
exported from E-Business Server. You can also click select a key file.
4 Go to the next task, Selecting company logos (optional).
Selecting company logos (optional)
1 In the Company Logo dialog box, select the desired .BMP file, then click
Next.
w Company logo — Type the path to a .BMP file of your company
logo or other picture that identifies your company. You can also click Browse to select a .BMP file. This .BMP file appears in E-Business Client.
2 Go to the next task, Specifying the use of client keys (optional).
Browse to
Specifying the use of client keys (optional)
1 In the Client Key Options dialog box, provide the following, then click
Next.
w Require Client Keys — Select this checkbox if you want client data
automatically signed. E-Business Client generates a local keypair for this purpose. Otherwise, leave this checkbox blank.
w Client Key Identity Prompt — Type text that prompts clients for
unique information you want them to provide in conjunction with key generation. This text appears in the dialog box in E-Business Client. This box is available only when you select
w Administrator Inbox — Type the e-mail address you want to use to
receive client keys. When client generate keys, an e-mail message with the key (.ASC) file attached is automatically sent to this address. Depending on the number of clients you are supporting, you might want to create a separate e-mail account for this purpose. This box is available only when you select
2 Go to the next task, Specifying the file transfer method.
Require Client Keys.
Client Key Generation
Require Client Keys.
18 McAfee E-Business Client Administration software version 7.1.1
Page 19
Specifying the file transfer method
1 In the File Transfer Options dialog box, select the desired file transfer
method.
w Email — Select this option to receive client data at a specified e-mail
address.
w FTP — Select this option to receive client data on an
Internet-accessible FTP server.
2 If you selected Email, type the address of the desired e-mail account.
w Address — Type the address of the e-mail account that you want to
use to receive client data. This box is available only when you select
Email.
3 If you selected FTP, provide the following.
w Address — Type the IP address or domain name of the FTP server
to which you want clients to send data. This box is available only when you select
FTP.
Working with E-Business Client Administration
w Port — Type the port number of the FTP server to which you want
clients to send data. This box is available only when you select
w Incoming Directory — Enter the folder on the FTP server in which
you want to store client data. For example, you might create a separate folder for each client profile as a way to organize data. The folder will be created automatically when clients transfer data. This box is available only when you select
FTP.
w Anonymous — Select this checkbox if the FTP server does not
require logon information. This box is available only when you select
FTP.
w User Name — Type the user name of the logon account used to
access the FTP server. This box is available only when you deselect
Anonymous.
w Password — Type the password of the logon account used to access
the FTP server. This box is available only when you deselect
Anonymous.
4 Go to the next task, Creating client packages.
FTP.
Product Guide 19
Page 20
Working with E-Business Client Administration
Creating client packages
1 In the Client Installation dialog box, type the desired path of the client
package.
w Client Installation filename and location — Type the path where you
want to save the client package. You can also click a location and specify a file name. You might find it helpful to provide the file name to clients.
w Browse to folder when done — Leave this checkbox selected if you
want to go to the location of the client package. Otherwise, deselect it.
2 Click Finish to create the client package.
Sending packages to clients
You can send packages to clients via e-mail, electronic media, or shared network drives. You might want to include instructions specific to each client profile with each package. Note that the information in Chapter 3, Installing
E-Business Client and Chapter 5, Working with E-Business Client is provided to
clients in online Help.
Save As to select
n
E-Business Client system requirements that apply to the client package. For a complete list of these requirements, see System requirements on page
15.
n
Profile name used in the client package. You specify this name in Step 3 in Defining client profiles on page 17.
n
Client package file name. You specify this file name in Step 1 in Creating
client packages on page 20.
n
Installation steps. For detailed steps, see Installing E-Business Client on
page 16.
n
If the package requires client keys, the unique information you want clients to provide in conjunction with key generation. You specify this information in Specifying the use of client keys (optional) on page 18.
20 McAfee E-Business Client Administration software version 7.1.1
Page 21
Working with E-Business Client Administration
Validating keys in E-Business Client Administration
To validate keys, you need to be able to verbally compare the word list of the corresponding key with the client.
1 Start E-Business Client Administration. For detailed steps, see Starting
E-Business Client Administration on page 17.
2 Select Validate a Partner Key, then click Next.
3 In the Validate Key dialog box, select the desired key (.ASC) file.
w Partner Public Key — Type the path of the desired key (.ASC) file.
You can also click
4 Validate the word list that appears in Key Fingerprint with the word list
that appears in lists match, it is reasonable to assume that the key is valid and wasn’t tampered with in-transit.
User Key Fingerprint in E-Business Client. If these word
Browse to select the file.
For detailed steps on viewing the word list in E-Business Client, see
Validating keys in E-Business Client on page 27.
w User ID — Displays the information you requested from clients
using the
Client Key Identity Prompt.
w Key Fingerprint — Displays the authentication word list that
corresponds to the selected client key.
5 Click Finish when done.
6 Once you’ve validated a key, import it into the E-Business Server
keyring. For more information on how to import keys, see the E-Business Server Product Guide.
Product Guide 21
Page 22
Working with E-Business Client Administration
22 McAfee E-Business Client Administration software version 7.1.1
Page 23
Working with E-Business Client
Starting E-Business Client
1 Select the McAfee E-Business Client shortcut on the desktop.
— OR —
5
On the taskbar, click the
E-Business Client.
2 If the message, “A new profile has been installed that requires you to
generate a key“ appears, click
page 24.
Start button, then select Programs, McAfee
OK, then go to Step 4 in Generating keys on
Product Guide 23
Page 24
Working with E-Business Client
Generating keys
1 Start E-Business Client. For detailed steps, see Starting E-Business Client
on page 23.
2 If the message, “A new profile has been installed that requires you to
generate a key“ appears, click
OK, then skip to Step 4.
Otherwise, select the desired company profile from the
3 From the File menu, click Generate Client Key for Current Profile. The
Client Key Generation dialog box appears.
4 Type the requested information in User ID, then click OK.
Profile List.
w User ID — The text above this box is defined by the partner.
5 When asked if this information is correct, verify it before you click Yes.
Passphrase dialog box appears.
The
6 Type a passphrase, confirm it by typing it again, then click OK.
w Enter a passphrase — Type a passphrase. All client keys use the
same passphrase.
w Hide typing — Leave this checkbox selected to hide the characters as
you type them. If you have sufficient privacy and don’t need to hide your passphrase, deselect this checkbox.
w Passphrase Quality — This status bar indicates the quality of the
passphrase you are typing.
w Confirmation — Type the passphrase again to confirm it.
7 In the Random Input dialog box, click Begin Input, then move the mouse
randomly or type randomly on the keyboard. When the input is complete, the dialog box closes.
24 McAfee E-Business Client Administration software version 7.1.1
Page 25
Working with E-Business Client
Encrypting and sending sensitive data
1 Start E-Business Client. For detailed steps, see Starting E-Business Client
on page 23.
2 Select the desired company profile from the Profile List.
3 Use one of the following methods to encrypt and send data to partners:
w On the File menu, click Browse to select the desired files. You can
also click the
w Copy the desired files onto the clipboard, then click Paste from the
Edit menu.
w Drag and drop the desired files onto E-Business Client.
w From Windows Explorer, right-click the desired files, then click
Send To <Profile Name>.
4 When asked if you want to encrypt and send the listed files, verify the
path and name of each before you click
Browse button to select the file.
Yes.
5 If the Required Passphrase dialog box appears, provide the following,
then click
OK.
w Enter your passphrase — Type your passphrase.
w Hide typing — Leave this checkbox selected to hide the characters as
you type them. If you have sufficient privacy and don’t need to hide your passphrase, deselect this checkbox.
Product Guide 25
Page 26
Working with E-Business Client
Decrypting data
1 Start E-Business Client. For detailed steps, see Starting E-Business Client
on page 23.
2 Use one of the following methods to decrypt data in files with an .ASC
or .PGP extension:
w On the File menu, click Browse to select the desired files. You can
w Copy the desired files onto the clipboard, then click Paste from the
w Drag and drop the desired files onto E-Business Client.
3 If the Required Passphrase dialog box appears, provide the following,
then click
w Enter your passphrase — Type your passphrase.
w Hide typing — Leave this checkbox selected to hide the characters as
also click the
Edit menu.
OK.
you type them. If you have sufficient privacy and don’t need to hide your passphrase, deselect this checkbox.
Browse button to select the file.
4 Type the path where you want to save the decrypted file.
26 McAfee E-Business Client Administration software version 7.1.1
Page 27
Validating keys in E-Business Client
To validate keys, you need to be able to verbally compare the word list of the corresponding key with the partner.
1 Start E-Business Client. For detailed steps, see Starting E-Business Client
on page 23.
2 Select the desired company profile from the Profile List.
3 On the File menu, click Validate Partner Key. The Validate Partner Key
dialog box appears.
4 Validate the word list that appears in User Key Fingerprint with the word
list that appears in If these word lists match, it is reasonable to assume that the key is valid and wasn’t tampered with in-transit.
w User ID — Displays the information you entered in the Client Key
Generation dialog box.
Key Fingerprint in E-Business Client Administration.
Working with E-Business Client
w Partner Key Fingerprint — Displays the authentication word list that
corresponds to the partner key.
w User Key Fingerprint — Displays the authentication word list that
corresponds to the client key.
5 Click Finish when done.
Product Guide 27
Page 28
Working with E-Business Client
Changing passphrases
If a passphrase has been compromised, McAfee recommends that you change it immediately. You might also need to change passphrases periodically depending on your company’s security policies.
1 Start E-Business Client. For detailed steps, see Starting E-Business Client
on page 23.
2 Select the desired company profile from the Profile List.
3 From the File menu, click Change Client Key Passphrase. The Passphrase
dialog box appears.
4 Type a new passphrase, confirm it by typing it again, then click OK.
w Enter a new passphrase — Type a new passphrase. All client keys
use the same passphrase.
w Hide Typing — Leave this checkbox selected to hide the characters
as you type them. If you have sufficient privacy and don’t need to hide your passphrase, deselect this checkbox.
w Passphrase Quality — This status bar indicates the quality of the
passphrase you are typing.
w Confirmation — Type the passphrase again to confirm it.
Viewing the log file
1 Start E-Business Client. For detailed steps, see Starting E-Business Client
on page 23.
2 From the View menu, click Log. The E-Business Client Log
(EBCLIENT.LOG) file opens in the default text editor; for example, Notepad.
Closing E-Business Client
n
From the File menu, click Exit.
28 McAfee E-Business Client Administration software version 7.1.1
Page 29
Index
A
audience of guide, 5
C
client keys
specifying use in client packages
client packages
creating sending to clients, 20
client profiles
defining
company logos
selecting for client packages
contacting McAfee
CONTACT file list of resources, 7
, 17
, 17
, 17
, 6
D
data
decrypting encrypting and sending to partners, 25
digital signatures
specifying use in client packages
, 26
, 17
, 17
F
file transfer method
specifying for client packages
fingerprint
validating in E-Business Client
validating in E-Business Client
Administration
FTP method
specifying for client packages
, 21
G
getting more information, 6
K
keys
exporting from E-Business Server generating, 24 validating in E-Business Client, 27
validating in E-Business Client
Administration
, 21
L
logos
selecting for client packages
, 17
, 27
, 17
, 17
, 17
E
E-Business Client
about
, 9
starting, 23
E-Business Client Administration
about
, 9
starting, 17
E-Business Server public keys
exporting
e-mail method
specifying for client packages, 17
, 17
P
packages
creating client
product information, 6
profiles
defining client
public keys
exporting from E-Business Server
purpose of guide, 5
, 17
, 17
R
README file, 6
, 17
Product Guide 29
Page 30
Index
W
word list
validating in E-Business Client
validating in E-Business Client
Administration
, 21
, 27
30 McAfee E-Business Client Administration software version 7.1.1
Loading...