PGP Desktop Quick Start Guide

What is PGP Desktop?

PGP Desktop provides comprehensive security for desktops and laptops, making it possible for enterprises, workgroups, and individuals to protect sensitive information without changing the existing IT infrastructure or disrupting work processes. This award winning, easy-to-use solution encrypts email, files, virtual volumes, and entire disks from a single desktop application.
The PGP Desktop family of applications have been combined into several bundles.
PGP Desktop Professional includes PGP Desktop Email
and PGP Whole Disk Encryption
PGP Desktop Storage includes PGP Whole Disk
Encryption and PGP NetShare
PGP Desktop Corporate includes PGP Desktop Email,
PGP Whole Disk Encryption, and PGP NetShare

PGP Desktop Email

Use PGP Desktop Email to automatically and transparently encrypt, sign, decrypt, and verify email message through policies you defined for you by administrators, or policies you control if you are not part of a PGP Universal Server-managed environment.

PGP NetShare

Use PGP NetShare to let authorized users share protected files in a shared space--such as a file server, shared folder, or USB removable drive.

PGP Whole Disk Encryption

Use PGP Whole Disk Encryption (PGP WDE) to lock down the entire contents of your system or an external or USB flash drive you specify.
In addition, use PGP Desktop to:
Use part of your hard drive space as an encrypted virtual
disk volume with its own drive letter.
Create protected Zip archives.
Completely destroy files and folders so that nothing can
recover them.
Contents
What is PGP Desktop? (page
New to PGP Desktop? (page 1)
Understanding the Basics (page 1)
What Am I Installing? (page 2)
1)
PGP Desktop for Windows
Quick Start Guide
Version 10.2
System Requirements (page 2)
Installing PGP Desktop (page 3)
Starting PGP Desktop (page 3)
The PGP Desktop Main Screen (page 3)
Using PGP Desktop Email (page 4)
Using PGP Viewer (page 5)
Using PGP NetShare (page 6)
Using PGP WDE to Encrypt a Drive (page 7)
Creating PGP Virtual Disk Volumes (page 10)
Creating a PGP Zip Archive (page 10)
Using PGP Shred to Shred Files (page 11)
Getting Assistance (page 12)

New to PGP Desktop?

Use this step-by-step guide to get started. You will find that, with PGP Desktop, protecting your data will be as easy as turning a key in a lock.
This Quick Start Guide helps you install PGP Desktop and
get started.
The PGP Desktop User’s Guide provides more detailed
information on PGP Desktop. In it, you will learn what a keypair is, why you might want to create one, how to create one, and how to exchange keys with others so you can encrypt your own data and share data securely with others.
Note: A PGP Desktop license provides you with access to a certain set of PGP Desktop features. Certain other features of PGP Desktop may require a different license. For more information, see the Licensing section of the PGP Desktop User’s Guide.
For deployment, management, and policy enforcement
information for PGP Desktop, see the PGP Universal Server Administrator’s Guide.

Understanding the Basics

PGP Desktop uses keys to encrypt, sign, decrypt, and verify your messages.
After installation, PGP Desktop prompts you to create a PGP keypair. A keypair is the combination of a private key and a public key.
Keep your private key and its passphrase private, as the
name suggests. If someone gets your private key and its
1
passphrase, they can read your messages and impersonate you to others. Your private key decrypts incoming encrypted messages and signs outgoing messages.
Your public key you can give to everyone. It does not have
a passphrase. Your public key encrypts messages that only your private key can decrypt and verifies your signed messages.
Your keyring holds both your keypairs and the public keys of others, which you use to send encrypted messages to them. Click the PGP Keys Control Box to see the keys on your keyring:
1 The icon for a PGP keypair has two keys, denoting the
private and the public key. Alice Cameron has a PGP keypair in this illustration, for example.
2 The icons for the public keys of others have just one key.
Ming Pa’s public key, for example, has been added to the keyring shown in this illustration.

What Am I Installing?

PGP Desktop uses licensing to provide access to the features you purchase. Depending on the license you have, some or all of the PGP Desktop family of applications will be active.
This document contains instructions for viewing the features activated by your license.
PGP Desktop Email is a member of the PGP Desktop family of applications. You can use PGP Desktop Email to automatically and transparently encrypt, sign, decrypt, and verify email messages through policies you control. You can also use PGP Desktop Email to encrypt IM sessions for clients such as AIM and iChat. Both users must have PGP Desktop Email enabled.
PGP Viewer is a member of the PGP Desktop family of applications. You can use PGP Viewer to decrypt, verify and display email messages outside of the mail stream. You can also use PGP Viewer to decrypt and view legacy IMAP/SMTP/POP email content.
PGP NetShare is a member of the PGP Desktop family of applications. You can use PGP NetShare to authorize users to share protected files in a shared space, such as on a corporate file server, in a shared folder, or on a removable media such as a USB drive. The encrypted files in the Protected Folder continue to appear as normal application files to the authorized users; anyone else with physical access to the files can see them but not use them.
PGP Whole Disk Encryption (PGP WDE) is a member of the PGP Desktop family of applications. You can use PGP WDE to lock down the entire contents of your system or an external or USB flash drive you specify. Boot sectors, system files, and swap files are all encrypted. Whole disk encrypting your boot drive means you do not have to worry if your computer is lost or stolen: to access your data, an attacker would need the appropriate passphrase.
PGP Virtual Disk volumes uses part of your hard drive space as an encrypted virtual disk volume with its own drive letter. A PGP Virtual Disk is the perfect place for storing your sensitive files; it is as if you have stored them in a safe. When the door of the safe is open (when the volume is mounted), you can change files stored in it, take files out of it, and move files into it. Otherwise (when the volume is unmounted), all the data on the volume is protected.
PGP Zip adds any combination of files and folders to an encrypted, compressed, portable archive. PGP Desktop must be installed on a system to create or open a PGP Zip archive. PGP Zip is a tool for securely archiving your sensitive data, whether you want to distribute it to others or back it up.
PGP Shredder completely destroys files and folders so that even file recovery software cannot recover them. Deleting a file using the Windows Recycle Bin (on Windows systems) or Trash (on Mac OS X systems) does not actually delete it; it sits on your drive and eventually gets overwritten. Until then, it is trivial for an attacker to recover that file. PGP Shredder, in contrast, immediately overwrites files multiple times. This is so effective that even sophisticated disk recovery software cannot recover these files. This feature also completely wipes free space on your drives so your deleted data is truly unrecoverable.
Key Management manages PGP keys, both your keypairs and the public keys of others. You use your private key to decrypt messages sent to you encrypted to your public key and to secure your PGP Virtual Disk volumes. You use public keys to encrypt messages to others or to add users to PGP Virtual Disk volumes.

System Requirements

PGP Desktop can be installed on systems running the following versions of Microsoft Windows operating systems:
Windows XP Professional 32-bit (Service Pack 2 or 3),
Windows XP Professional 64-bit (Service Pack 2), Windows XP Home Edition (Service Pack 2 or 3), Microsoft Windows XP Tablet PC Edition 2005 SP2, Windows Vista (all 32- and 64-bit editions, including Service Pack 2), Windows 7 (all 32- and 64-bit editions, including Service Pack 1), Windows Server 2003 (Service Pack 1 and 2).
The above operating systems are supported only when all of the latest hot fixes and security patches from Microsoft have been applied.
Note: PGP Whole Disk Encryption (PGP WDE) is not compatible with other third-party software that could
2
bypass the PGP WDE protection on the Master Boot Record (MBR) and write to or modify the MBR. This includes such off-line defragmentation tools that bypass the PGP WDE file system protection in the OS or system restore tools that replace the MBR.
PGP Whole Disk Encryption on Windows Servers
PGP Whole Disk Encryption (WDE) is supported on all client versions above as well as the following Windows Server versions:
Windows Server 2003 SP 2 (32- and 64-bit editions);
Windows Server 2008 64-bit SP 1 and 2; Windows Server 2008 R2 64-bit
VMWare ESXi4 (supported Microsoft Windows Servers
operating in a virtual environment)
For additional system requirements and best practices information, go to the the Symantec Knowledgebase
http://www.symantec.com/business/support/index?page=hom
( e) and search for TECH149613, "PGP Whole Disk Encryption on Windows Servers".
PGP Whole Disk Encryption on Tablet PCs
PGP Whole Disk Encryption is supported on Tablet PCs that meet the following additional requirements:
Dell Latitude XT1 and XT2 Tablet PC Touch Screen
Laptops (undocked)
1024 x 768 x 16 screen display running SVGA mode
Optional physical keyboard
4 Reboot your system when instructed. 5 When your system restarts, follow the on-screen
instructions to configure PGP Desktop.

Licensing

To see what features your license supports, open PGP Desktop and select Help > License. Those features with a checkmark are supported by the active license.

Starting PGP Desktop

To start PGP Desktop, use any of the following methods:
Double-click the PGP Tray icon.
Right-click the PGP Tray icon and then select Open PGP
Desktop.
From the Start menu, select Programs > PGP > PGP
Desktop.

The PGP Desktop Main Screen

The PGP Desktop application window is your main interface to the product.
Hardware Requirements
512 MB of RAM
64 MB hard disk space

Installing PGP Desktop

Symantec Corporation recommends exiting all open applications before you begin the install. The installation process requires a system restart.
Note: If you are using PGP Desktop in a PGP Universal Server-managed environment, your PGP Desktop installer may be configured with specific features and/or settings.
To install PGP Desktop
1 Locate the PGP Desktop installation program you
downloaded. The installer program may have been distributed by your
PGP administrator using the Microsoft SMS deployment tool.
2 Double-click the installer. 3 Follow the on-screen instructions.
The PGP Desktop main screen includes:
1 The Menu bar
The menus on the Menu bar change depending on which Control box is selected.
2 The PGP Keys Control Box. Gives you control of PGP keys.
3 The PGP Messaging Control Box. Gives you control over
PGP Messaging.
. Gives you access to PGP Desktop commands.
3
4
The PGP Zip Control Box. Gives you control of PGP Zip, as
well as the PGP Zip Assistant, which helps you create new PGP Zip archives.
5
The PGP Disk Control Box. Gives you control of PGP Disk.
The PGP Viewer Control Box. Gives you the ability to
6
decrypt, verify, and display messages outside the mail stream.
The PGP NetShare Control Box. Gives you control of PGP
7
NetShare.
8
The PGP Desktop Work area. Displays information and
actions you can take for the selected Control box.
9
PGP Keys Find box. Use to search for keys on your keyring.
As you type text in this box, PGP Desktop displays search results based on either name or email address.
Each Control box expands to show available options, and collapses to save space (only the Control Box banner displays). Expand a Control Box by clicking its banner.

Using PGP Desktop Email

PGP Desktop Email automatically and transparently encrypts and signs outgoing messages and decrypts and verifies incoming messages. All you need to do is to send and receive your email just as you always have; PGP Desktop Email will take care of the rest.

Sending Encrypted Email

After installation, PGP Desktop Email inserts itself between your email client and your mail server and watches your email traffic.
When incoming messages arrive, PGP Desktop Email intercepts them before they get to your inbox and automatically attempts to decrypt and verify them; it uses your private keys to decrypt and the public keys of others to verify. When it is done with your messages, PGP Desktop Email delivers them to your inbox.
In most cases, you do not have to do anything special; decrypted incoming messages will appear in your inbox just like any other incoming messages.
When you send outgoing messages, PGP Desktop Email intercepts them on the way to your mail server and automatically attempts to encrypt and sign them, based on configured policies.
Again, you do not have to do anything special; just create your messages using your email client and send them—PGP Desktop Email handles everything else.
Details of how PGP Desktop Email transparently handles your incoming and outgoing messaging is found in the following sections.

Incoming Messages

PGP Desktop Email handles incoming messages based on their content:
Not encrypted or signed. If a message is not encrypted or
signed, PGP Desktop Email just passes it along to your email client. You can read the message as is, so there is nothing for PGP Desktop Email to do to it.
Encrypted but not signed. If a message is encrypted, PGP
Desktop Email attempts to decrypt it so that you can read it. It will look first on your keyring for the private key that can decrypt the message. If it finds the private key, PGP Desktop Email uses it to decrypt the message and then passes the message to your email client. If it cannot find the private key, PGP Desktop Email passes it to your email client still encrypted. It will look something like this.
Signed but not encrypted. If a message is signed, PGP
Desktop Email attempts to verify the signature. It will look at the following locations in this order for the appropriate public key: your default keying, the keyserver at keys.domain, where domain is the domain of the sender of the message, the PGP Global Directory (keyserver.pgp.com), any then other configured keyservers. If PGP Desktop Email finds the appropriate public key, it will attempt to verify the signature and then pass the message to your email client. If it cannot find the appropriate public key, it will pass the message to your email client unverified.
Encrypted and signed. If a message is encrypted and
signed, PGP Desktop Email will first try to find the private key to decrypt the message, then try to find the public key to verify it.

Outgoing Messages

PGP Desktop Email handles your outgoing email messages based on policies, sets of instructions that can be set up to handle any situation.

Default Policies

PGP Desktop Email includes four default policies:
Mailing List Admin Requests. Administrative requests to
mailing lists are sent in the clear; that is, not encrypted or signed.
Mail List Submissions. Submissions to mailing lists are
sent signed (so they can be authenticated) but not encrypted.
4
Loading...
+ 9 hidden pages