PGP Desktop provides comprehensive security for desktops
and laptops, making it possible for enterprises, workgroups,
and individuals to protect sensitive information without
changing the existing IT infrastructure or disrupting work
processes. This award winning, easy-to-use solution encrypts
email, files, virtual volumes, and entire disks from a single
desktop application.
The PGP Desktop family of applications have been combined
into several bundles.
PGP Desktop Professional includes PGP Desktop Email
and PGP Whole Disk Encryption
PGP Desktop Storage includes PGP Whole Disk
Encryption and PGP NetShare
PGP Desktop Corporate includes PGP Desktop Email,
PGP Whole Disk Encryption, and PGP NetShare
PGP Desktop Email
Use PGP Desktop Email to automatically and transparently
encrypt, sign, decrypt, and verify email message through
policies you defined for you by administrators, or policies you
control if you are not part of a PGP Universal Server-managed
environment.
PGP NetShare
Use PGP NetShare to let authorized users share protected
files in a shared space--such as a file server, shared folder, or
USB removable drive.
PGP Whole Disk Encryption
Use PGP Whole Disk Encryption (PGP WDE) to lock down the
entire contents of your system or an external or USB flash
drive you specify.
In addition, use PGP Desktop to:
Use part of your hard drive space as an encrypted virtual
disk volume with its own drive letter.
Create protected Zip archives.
Completely destroy files and folders so that nothing can
recover them.
Contents
• What is PGP Desktop? (page
• New to PGP Desktop? (page 1)
• Understanding the Basics (page 1)
• What Am I Installing? (page 2)
1)
PGP Desktop for Windows
Quick Start Guide
Version 10.2
• System Requirements (page 2)
• Installing PGP Desktop (page 3)
• Starting PGP Desktop (page 3)
• The PGP Desktop Main Screen (page 3)
• Using PGP Desktop Email (page 4)
• Using PGP Viewer (page 5)
• Using PGP NetShare (page 6)
• Using PGP WDE to Encrypt a Drive (page 7)
• Creating PGP Virtual Disk Volumes (page 10)
• Creating a PGP Zip Archive (page 10)
• Using PGP Shred to Shred Files (page 11)
• Getting Assistance (page 12)
New to PGP Desktop?
Use this step-by-step guide to get started. You will find that,
with PGP Desktop, protecting your data will be as easy as
turning a key in a lock.
This Quick Start Guide helps you install PGP Desktop and
get started.
The PGP Desktop User’s Guide provides more detailed
information on PGP Desktop. In it, you will learn what a
keypair is, why you might want to create one, how to
create one, and how to exchange keys with others so you
can encrypt your own data and share data securely with
others.
Note: A PGP Desktop license provides you with access to
a certain set of PGP Desktop features. Certain other
features of PGP Desktop may require a different license.
For more information, see the Licensing section of the
PGP Desktop User’s Guide.
For deployment, management, and policy enforcement
information for PGP Desktop, see the PGP Universal Server Administrator’s Guide.
Understanding the Basics
PGP Desktop uses keys to encrypt, sign, decrypt, and verify
your messages.
After installation, PGP Desktop prompts you to create a PGP
keypair. A keypair is the combination of a private key and a
public key.
Keep your private key and its passphrase private, as the
name suggests. If someone gets your private key and its
1
passphrase, they can read your messages and
impersonate you to others. Your private key decrypts
incoming encrypted messages and signs outgoing
messages.
Your public key you can give to everyone. It does not have
a passphrase. Your public key encrypts messages that
only your private key can decrypt and verifies your
signed messages.
Your keyring holds both your keypairs and the public keys of
others, which you use to send encrypted messages to them.
Click the PGP Keys Control Box to see the keys on your
keyring:
1 The icon for a PGP keypair has two keys, denoting the
private and the public key. Alice Cameron has a PGP
keypair in this illustration, for example.
2 The icons for the public keys of others have just one key.
Ming Pa’s public key, for example, has been added to the
keyring shown in this illustration.
What Am I Installing?
PGP Desktop uses licensing to provide access to the features
you purchase. Depending on the license you have, some or all
of the PGP Desktop family of applications will be active.
This document contains instructions for viewing the features
activated by your license.
PGP Desktop Email is a member of the PGP Desktop family of
applications. You can use PGP Desktop Email to automatically
and transparently encrypt, sign, decrypt, and verify email
messages through policies you control. You can also use PGP
Desktop Email to encrypt IM sessions for clients such as AIM
and iChat. Both users must have PGP Desktop Email enabled.
PGP Viewer is a member of the PGP Desktop family of
applications. You can use PGP Viewer to decrypt, verify and
display email messages outside of the mail stream. You can
also use PGP Viewer to decrypt and view legacy
IMAP/SMTP/POP email content.
PGP NetShare is a member of the PGP Desktop family of
applications. You can use PGP NetShare to authorize users to
share protected files in a shared space, such as on a corporate
file server, in a shared folder, or on a removable media such as
a USB drive. The encrypted files in the Protected Folder
continue to appear as normal application files to the
authorized users; anyone else with physical access to the files
can see them but not use them.
PGP Whole Disk Encryption (PGP WDE) is a member of the
PGP Desktop family of applications. You can use PGP WDE to
lock down the entire contents of your system or an external or
USB flash drive you specify. Boot sectors, system files, and
swap files are all encrypted. Whole disk encrypting your boot
drive means you do not have to worry if your computer is lost
or stolen: to access your data, an attacker would need the
appropriate passphrase.
PGP Virtual Disk volumes uses part of your hard drive space
as an encrypted virtual disk volume with its own drive letter.
A PGP Virtual Disk is the perfect place for storing your
sensitive files; it is as if you have stored them in a safe. When
the door of the safe is open (when the volume is mounted),
you can change files stored in it, take files out of it, and move
files into it. Otherwise (when the volume is unmounted), all
the data on the volume is protected.
PGP Zip adds any combination of files and folders to an
encrypted, compressed, portable archive. PGP Desktop must
be installed on a system to create or open a PGP Zip archive.
PGP Zip is a tool for securely archiving your sensitive data,
whether you want to distribute it to others or back it up.
PGP Shredder completely destroys files and folders so that
even file recovery software cannot recover them. Deleting a
file using the Windows Recycle Bin (on Windows systems) or
Trash (on Mac OS X systems) does not actually delete it; it sits
on your drive and eventually gets overwritten. Until then, it is
trivial for an attacker to recover that file. PGP Shredder, in
contrast, immediately overwrites files multiple times. This is
so effective that even sophisticated disk recovery software
cannot recover these files. This feature also completely wipes
free space on your drives so your deleted data is truly
unrecoverable.
Key Management manages PGP keys, both your keypairs and
the public keys of others. You use your private key to decrypt
messages sent to you encrypted to your public key and to
secure your PGP Virtual Disk volumes. You use public keys to
encrypt messages to others or to add users to PGP Virtual
Disk volumes.
System Requirements
PGP Desktop can be installed on systems running the
following versions of Microsoft Windows operating systems:
Windows XP Professional 32-bit (Service Pack 2 or 3),
Windows XP Professional 64-bit (Service Pack 2),
Windows XP Home Edition (Service Pack 2 or 3),
Microsoft Windows XP Tablet PC Edition 2005 SP2,
Windows Vista (all 32- and 64-bit editions, including
Service Pack 2), Windows 7 (all 32- and 64-bit editions,
including Service Pack 1), Windows Server 2003 (Service
Pack 1 and 2).
The above operating systems are supported only when all of
the latest hot fixes and security patches from Microsoft have
been applied.
Note: PGP Whole Disk Encryption (PGP WDE) is not
compatible with other third-party software that could
2
bypass the PGP WDE protection on the Master Boot Record
(MBR) and write to or modify the MBR. This includes such
off-line defragmentation tools that bypass the PGP WDE file
system protection in the OS or system restore tools that
replace the MBR.
PGP Whole Disk Encryption on Windows
Servers
PGP Whole Disk Encryption (WDE) is supported on all client
versions above as well as the following Windows Server
versions:
Windows Server 2003 SP 2 (32- and 64-bit editions);
Windows Server 2008 64-bit SP 1 and 2; Windows Server
2008 R2 64-bit
VMWare ESXi4 (supported Microsoft Windows Servers
operating in a virtual environment)
For additional system requirements and best practices
information, go to the the Symantec Knowledgebase
(
e) and search for TECH149613, "PGP Whole Disk Encryption
on Windows Servers".
PGP Whole Disk Encryption on Tablet PCs
PGP Whole Disk Encryption is supported on Tablet PCs that
meet the following additional requirements:
Dell Latitude XT1 and XT2 Tablet PC Touch Screen
Laptops (undocked)
1024 x 768 x 16 screen display running SVGA mode
Optional physical keyboard
4 Reboot your system when instructed.
5 When your system restarts, follow the on-screen
instructions to configure PGP Desktop.
Licensing
To see what features your license supports, open PGP Desktop
and select Help > License. Those features with a checkmark
are supported by the active license.
Starting PGP Desktop
To start PGP Desktop, use any of the following methods:
Double-click the PGP Tray icon.
Right-click the PGP Tray icon and then select Open PGP
Desktop.
From the Start menu, select Programs > PGP > PGP
Desktop.
The PGP Desktop Main Screen
The PGP Desktop application window is your main interface
to the product.
Hardware Requirements
512 MB of RAM
64 MB hard disk space
Installing PGP Desktop
Symantec Corporation recommends exiting all open
applications before you begin the install. The installation
process requires a system restart.
Note: If you are using PGP Desktop in a PGP Universal
Server-managed environment, your PGP Desktop installer
may be configured with specific features and/or settings.
To install PGP Desktop
1 Locate the PGP Desktop installation program you
downloaded.
The installer program may have been distributed by your
PGP administrator using the Microsoft SMS deployment
tool.
2 Double-click the installer.
3 Follow the on-screen instructions.
The PGP Desktop main screen includes:
1 The Menu bar
The menus on the Menu bar change depending on which
Control box is selected.
2 The PGP Keys Control Box. Gives you control of PGP keys.
3 The PGP Messaging Control Box. Gives you control over
PGP Messaging.
. Gives you access to PGP Desktop commands.
3
4
The PGP Zip Control Box. Gives you control of PGP Zip, as
well as the PGP Zip Assistant, which helps you create new PGP
Zip archives.
5
The PGP Disk Control Box. Gives you control of PGP Disk.
The PGP Viewer Control Box. Gives you the ability to
6
decrypt, verify, and display messages outside the mail stream.
The PGP NetShare Control Box. Gives you control of PGP
7
NetShare.
8
The PGP Desktop Work area. Displays information and
actions you can take for the selected Control box.
9
PGP Keys Find box. Use to search for keys on your keyring.
As you type text in this box, PGP Desktop displays search
results based on either name or email address.
Each Control box expands to show available options, and
collapses to save space (only the Control Box banner displays).
Expand a Control Box by clicking its banner.
Using PGP Desktop Email
PGP Desktop Email automatically and transparently encrypts
and signs outgoing messages and decrypts and verifies
incoming messages. All you need to do is to send and receive
your email just as you always have; PGP Desktop Email will
take care of the rest.
Sending Encrypted Email
After installation, PGP Desktop Email inserts itself between
your email client and your mail server and watches your
email traffic.
When incoming messages arrive, PGP Desktop Email
intercepts them before they get to your inbox and
automatically attempts to decrypt and verify them; it uses
your private keys to decrypt and the public keys of others to
verify. When it is done with your messages, PGP Desktop
Email delivers them to your inbox.
In most cases, you do not have to do anything special;
decrypted incoming messages will appear in your inbox just
like any other incoming messages.
When you send outgoing messages, PGP Desktop Email
intercepts them on the way to your mail server and
automatically attempts to encrypt and sign them, based on
configured policies.
Again, you do not have to do anything special; just create your
messages using your email client and send them—PGP
Desktop Email handles everything else.
Details of how PGP Desktop Email transparently handles your
incoming and outgoing messaging is found in the following
sections.
Incoming Messages
PGP Desktop Email handles incoming messages based on
their content:
Not encrypted or signed. If a message is not encrypted or
signed, PGP Desktop Email just passes it along to your
email client. You can read the message as is, so there is
nothing for PGP Desktop Email to do to it.
Encrypted but not signed. If a message is encrypted, PGP
Desktop Email attempts to decrypt it so that you can read
it. It will look first on your keyring for the private key
that can decrypt the message. If it finds the private key,
PGP Desktop Email uses it to decrypt the message and
then passes the message to your email client. If it cannot
find the private key, PGP Desktop Email passes it to your
email client still encrypted. It will look something like
this.
Signed but not encrypted. If a message is signed, PGP
Desktop Email attempts to verify the signature. It will
look at the following locations in this order for the
appropriate public key: your default keying, the
keyserver at keys.domain, where domain is the domain of
the sender of the message, the PGP Global Directory
(keyserver.pgp.com), any then other configured
keyservers. If PGP Desktop Email finds the appropriate
public key, it will attempt to verify the signature and then
pass the message to your email client. If it cannot find the
appropriate public key, it will pass the message to your
email client unverified.
Encrypted and signed. If a message is encrypted and
signed, PGP Desktop Email will first try to find the
private key to decrypt the message, then try to find the
public key to verify it.
Outgoing Messages
PGP Desktop Email handles your outgoing email messages
based on policies, sets of instructions that can be set up to
handle any situation.
Default Policies
PGP Desktop Email includes four default policies:
Mailing List Admin Requests. Administrative requests to
mailing lists are sent in the clear; that is, not encrypted
or signed.
Mail List Submissions. Submissions to mailing lists are
sent signed (so they can be authenticated) but not
encrypted.
4
Loading...
+ 9 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.