PGP Endpoint Application Control User Guide - PGP Endpoint Application Control Version 4.4 SR1 Released: August 2009
Document Number: 02_104P_4.4 SR1_092391106
PGP, Pretty Good Privacy, and the PGP logo are registered trademarks of PGP Corporation in the
US and other countries. IDEA is a trademark of Ascom Tech AG. Windows and ActiveX are registered
trademarks of Microsoft Corporation. AOL is a registered trademark, and AOL Instant Messenger is a
trademark, of America Online, Inc. Red Hat and Red Hat Linux are trademarks or registered trademarks
of Red Hat, Inc. Linux is a registered trademark of Linus Torvalds. Solaris is a trademark or registered
trademark of Sun Microsystems, Inc. AIX is a trademark or registered trademark of International Business
Machines Corporation. HP-UX is a trademark or registered trademark of Hewlett-Packard Company. SSH
and Secure Shell are trademarks of SSH Communications Security, Inc. Rendezvous and Mac OS X
are trademarks or registered trademarks of Apple Computer, Inc. All other registered and unregistered
trademarks in this document are the sole property of their respective owners.
Licensing and Patent Information
The IDEA cryptographic cipher described in U.S. patent number 5,214,703 is licensed from Ascom Tech
AG. The CAST-128 encryption algorithm, implemented from RFC 2144, is available worldwide on a royaltyfree basis for commercial and non-commercial uses. PGP Corporation has secured a license to the patent
rights contained in the patent application Serial Number 10/655,563 by The Regents of the University of
California, entitled Block Cipher Mode of Operation for Constructing a Wide-blocksize block Cipher from a
Conventional Block Cipher. Some third-party software included in PGP Universal Server is licensed under
the GNU General Public License (GPL). PGP Universal Server as a whole is not licensed under the GPL.
If you would like a copy of the source code for the GPL software included in PGP Universal Server, contact
PGP Support (http://www.pgp.com/support). PGP Corporation may have patents and/or pending patent
applications covering subject matter in this software or its documentation; the furnishing of this software or
documentation does not give you any license to these patents.
• Xalan, an open-source software library from the Apache Software Foundation that implements the
XSLT XML transformation language and the XPath XML query language, is released under the Apache
Software License, version 1.1, available at http://xml.apache.org/xalan-j/#license1.1. • Apache Axis is
an implementation of the SOAP (“Simple Object Access Protocol”) used for communications between
various PGP products is provided under the Apache license found at http://www.apache.org/licenses/
LICENSE-2.0.txt. • mx4j, an open-source implementation of the Java Management Extensions (JMX),
is released under an Apache-style license, available at http://mx4j.sourceforge.net/docs/ch01s06.html.
• jpeglib version 6a is based in part on the work of the Independent JPEG Group. (http://www.ijg.org/)
• libxslt the XSLT C library developed for the GNOME project and used for XML transformations is
distributed under the MIT License http://www.opensource.org/licenses/mit-license.html. • PCRE version
• Windows Template Library (WRT) is used for developing user interface components and is distributed
under the Common Public License v1.0 found at http://opensource.org/licenses/cpl1.0.php. • The Perl Kit
provides several independent utilities used to automate a variety of maintenance functions and is provided
under the Perl Artistic License, found at http://www.perl.com/pub/a/language/misc/Artistic.html.
Export Information
Export of this software and documentation may be subject to compliance with the rules and regulations
promulgated from time to time by the Bureau of Export Administration, United States Department of
Commerce, which restricts the export and re-export of certain products and technical data.
Limitations
The software provided with this documentation is licensed to you for your individual use under the terms of
the End User License Agreement provided with the software. The information in this document is subject
to change without notice. PGP Corporation does not warrant that the information meets your requirements
or that the information is free of errors. The information may include technical inaccuracies or typographical
errors. Changes may be made to the information and incorporated in new editions of this document, if and
when made available by PGP Corporation.
Notices
- 5 -
PGP Endpoint Application Control
- 6 -
Table of Contents
Preface: About This Document................................................................13
Open Ports by Firewall Exception.......................................................................199
Open Ports by Active Directory Policy................................................................200
- 11 -
Table of Contents
- 12 -
Preface
About This Document
This User Guide is a resource written for all users of PGP Endpoint Application Control 4.4 SR1.
This document defines the concepts and procedures for installing, configuring, implementing,
and using PGP Endpoint Application Control 4.4 SR1.
Tip:
PGP documentation is updated on a regular basis. To acquire the latest version of this or
any other published document, please refer to the PGP Support Portal Web Site (https://
support.pgp.com).
Typographical Conventions
The following conventions are used throughout this documentation to help you identify various
information types.
ConventionUsage
boldButtons, menu items, window and screen objects.
bold italicsWizard names, window names, and page names.
italicsNew terms, options, and variables.
UPPERCASESQL Commands and keyboard keys.
monospaceFile names, path names, programs, executables, command
syntax, and property names.
Getting Assistance
Getting Product Information
Unless otherwise noted, the product documentation is provided as Adobe Acrobat PDF files
that are installed with PGP Endpoint. Online help is available within the PGP Endpoint product.
Release notes are also available, which may have last-minute information not found in the
product documentation.
- 13 -
Preface
Contacting Technical Support
•To learn about PGP support options and how to contact PGP Technical Support, please visit
the PGP Corporation Support Home Page (http://www.pgp.com/support).
•To access the PGP Support Knowledge Base or request PGP Technical Support, please visit
PGP Support Portal Web Site (https://support.pgp.com).
Note:
You may access portions of the PGP Support Knowledge Base without a support agreement;
however, you must have a valid support agreement to request Technical Support.
•For any other contacts at PGP Corporation, please visit the PGP Contacts Page (http://
www.pgp.com/company/contact/index.html).
•For general information about PGP Corporation, please visit the PGP Web Site (http://
www.pgp.com).
•To access the PGP Support forums, please visit PGP Support (http://
forums.pgpsupport.com). These are user community support forums hosted by PGP
Corporation.
- 14 -
Chapter
1
PGP Endpoint Application Control Overview
In this chapter:
•Product Overview
•Server, Database and
Client Process
•System Requirements
PGP Endpoint application and device control solutions
include:
•PGP Endpoint Device Control, which prevents
unauthorized transfer of applications and data by
controlling access to input and output devices, such as
memory sticks, modems, and PDAs.
•PGP Endpoint Device Control client for Embedded
Devices, which moves beyond the traditional desktop
and laptop endpoints to a variety of platforms that
include ATMs, industrial robotics, thin clients, set-top
boxes, network area storage devices and the myriad
of other systems running Microsoft® Windows XP
Embedded.
•PGP Endpoint Application Control, which delivers
granular control of application execution in an enterprise
environment.
•PGP Endpoint Application Control Terminal Services
Edition, which extends application control to Citrix® or
Microsoft Terminal Services ® environments that share
applications among multiple users.
•PGP Endpoint Application Control Server Edition, which
delivers application control to protect enterprise servers,
such as web servers, e-mail servers, and database
servers.
®
Product Overview
PGP Endpoint software is based on a multi-tier software architecture that processes and stores
data for Application Control and Device Control. Users can interact with the application through
- 15 -
PGP Endpoint Application Control
the client interface. A separate Management Server Console provides a user interface for
network administrators.
The primary components of the PGP Endpoint Application Control solution are:
•The PGP Endpoint database which serves as the central repository of authorization
information for devices and applications.
•One or more Administration Servers that communicate between the database, the protected
clients, and the PGP Endpoint Management Server Console.
•The PGP Endpoint Management Server Console, which provides the administrative user
interface for the PGP Endpoint Administration Server.
•The PGP Endpoint client, which is installed on each computer, either endpoint or server, that
you want to protect.
The following figure illustrates the relationships between the PGP Endpoint components.
Figure 1: PGP Endpoint Component Relationships
- 16 -
PGP Endpoint Application Control Overview
Server, Database and Client Process
The Administration Server communicates between the database and the protected client
computers.
The following describes the communication process flow between the Administration Servers,
database, and clients when using Application Control.
Figure 2: Application Control Process Flow
- 17 -
PGP Endpoint Application Control
System Requirements
The following sections describe the minimum system requirements necessary for successful
installation of PGP Endpoint 4.4 SR1 and the languages supported by the client.
Important: For installation or upgrade to PGP Endpoint version 4.4 SR1:
•You must have a new license file that is valid specifically for version 4.4.
•Existing license files issued before PGP Endpoint version 4.4 will not work with the PGP
Endpoint Administration Server and may cause your Administration Servers to stop working.
The PGP Endpoint 4.4 license must be installed before you install or upgrade the PGP
Endpoint database, and then the Administration Server.
•Request a new license file using the Downloads tab on the PGP Licensing and Entitlement
Management System (LEMS) ( https://lems.pgp.com/account/login) .
Minimum Hardware Requirements
The minimum PGP Endpoint hardware requirements depend upon your service network
environment, including the type of database supported, the number of Administration Servers
you need support a distributed network, and the number of subscribed clients.
The hardware requirements for PGP Endpoint Application Control 4.4 SR1 vary depending upon
the number of servers and clients you manage. The following minimum hardware requirements
will support up to:
•200 connected PGP Endpoint clients for PGP Endpoint Device Control
•50 connected PGP Endpoint clients for PGP Endpoint Application Control
Table 1: Minimum Hardware Requirements
PGP Endpoint ComponentRequirement
Database
Administration Server
•1 GB (4 GB recommended) memory
•
Pentium® Dual-Core CPU processor or AMD equivalent
•3 GB minimum hard disk drive
•100 MBits/s NIC
•512 MB (1 GB recommended) memory
•
Pentium® Dual-Core CPU or AMD equivalent
•3 GB minimum hard disk drive
•100 MBits/s NIC
- 18 -
PGP Endpoint ComponentRequirement
PGP Endpoint Application Control Overview
Management Server Console
Client
•512 MB (1 GB recommended) memory
•15 MB hard disk drive for installation, and 150 MB
additional for application files
•1024 by 768 pixels for display
•256 MB (1 GB recommended) memory
•Pentium Dual-Core CPU or AMD equivalent
•10 MB hard disk drive for installation, and several
additional GB for full shadowing feature of PGP Endpoint
Device Control
•100 MBits/s NIC
Supported Operating Systems
PGP Endpoint supports multiple Microsoft Windows operations systems for the Administration
Server, Management Server Console, database, and client.
The operating system requirements for PGP Endpoint Application Control 4.4 SR1 components
are outlined as follows.
Table 2: Operating System Requirements
PGP Endpoint ComponentRequirement
Database
One of the following:
•
Microsoft Windows ® XP Professional Service Pack 2 or
higher (SP2+) (32-bit)
•Microsoft Windows XP Service Pack 2 (SP2) (64-bit)
•
Microsoft Windows Server® 2003 Service Pack 2 (SP2)
(32- and 64-bit)
•Microsoft Windows Server 2008 (32-bit and 64-bit)
•Microsoft Windows Server 2008 R2 (64 bit only)
Administration ServerOne of the following:
•Microsoft Windows Server 2003 SP2 (32-bit)
•Microsoft Windows Server 2008 (32-bit and 64-bit)
•Microsoft Windows Server 2008 R2 (64 bit only)
- 19 -
PGP Endpoint Application Control
PGP Endpoint ComponentRequirement
Management Server ConsoleOne of the following:
ClientOne of the following:
•Microsoft Windows XP Professional SP2+ (32-bit)
•Microsoft Windows Server 2003 SP2 (32-bit)
•Microsoft Windows Server 2008 (32-bit and 64-bit)
•Microsoft Windows Server 2008 R2 (64 bit only)
•
Microsoft Windows Vista™ SP1+ (32- and 64-bit)
•Microsoft Windows 7 (32- and 64-bit)
•
Microsoft Windows® Server 2000 Service Pack 4 or higher
(SP4+) (32-bit)
•Microsoft Windows 2000 Professional SP4+ (32-bit)
•Microsoft Windows XP Professional Service Pack 2 or
higher (SP2+) (32- and 64-bit)
•Microsoft Windows Server 2003 SP2 (32- and 64-bit)
•Microsoft Windows Server 2008 (32-bit and 64-bit)
•Microsoft Windows Server 2008 R2 (64 bit only)
•Microsoft Windows Vista SP1+ (32- and 64-bit)
•Microsoft Windows 7 (32- and 64-bit)
•Microsoft Windows XP Embedded (XPe) Service Pack 2
(SP2) (32-bit)
•Microsoft Windows Embedded Point of Service (WEPOS)
(32-bit)
•Microsoft Windows XP Tablet PC Edition (32-bit)
•
Citrix Access Gateway™ 4.5
•
Citrix Presentation Server™ 4.0 for Windows Server 2003
SP1/SR2+ (32-bit)
•Citrix Presentation Server 4.5 for Windows Server 2003
SP1/SR2+ (32- and 64-bit)
Supported Databases
PGP Endpoint supports multiple releases of Microsoft® SQL Server® . You should choose
the database instance required by your network operating environment and the number of
Administration Server s and subscribed clients the application must support.
The database requirements for PGP Endpoint Application Control 4.4 SR1 components are
outlined as follows.
- 20 -
Table 3: Database Requirements
PGP Endpoint Application Control Overview
PGP Endpoint
Component
DatabaseOne of the following:
Requirement
•
Microsoft SQL Server® 2005 Service Pack 2 or higher (SP2+)
(32-bit and 64-bit)
•Microsoft SQL Server 2005 Express Edition SP2+ (32-bit and
64-bit)
•Microsoft SQL Server 2008
•Microsoft SQL Server 2008 Express Edition
Other Software Requirements
The PGP Endpoint Application Control 4.4 SR1 release requires the following additional
software.
Additional software requirements for PGP Endpoint Application Control 4.4 SR1 components are
outlined as follows.
Table 4: Other Software Requirements
PGP Endpoint ComponentRequirement
DatabaseNo additional software requirements.
Administration Server
Install Microsoft® Certificate Authority for PGP Endpoint
Device Control encryption, if you will be encrypting Windows
user accounts. See Microsoft Certificate Authority (http://
technet.microsoft.com/en-us/library/cc756120.aspx) for
additional information about certificates.
Management Server ConsoleMicrosoft Visual C++ 2008 Redistributable Package.
ClientNo additional software requirements.
Recommended Configuration
To maximize PGP Endpoint Application Control 4.4 SR1 for operation in a Microsoft Windows
environment, you should configure your network environment database and client components
using the following suggested configurations.
The recommended configurations for PGP Endpoint Application Control 4.4 SR1 components
are outlined as follows. These settings represent the usual default settings, but should be
confirmed before beginning PGP Endpoint installation.
- 21 -
PGP Endpoint Application Control
Table 5: Recommended Configuration
PGP Endpoint ComponentRequirement
Database
Administration ServerNone recommended.
Management Server ConsoleNone recommended.
Client
•Change the Windows Event Viewer settings to 1024 KB
and choose to overwrite events as necessary.
•Change Windows Performance settings to prioritize for
background applications.
•If you are using Active Directory, configure a
corresponding Domain Name System (DNS) server as
Active Directory (AD) integrated and create a reverse
lookup zone, to provide for name resolution within the
PGP Endpoint Management Server Console.
•Configure NIC to receive IP from DHCP service.
•Change the Windows Event Viewer settings to 1024 KB
and choose to overwrite events as necessary.
Client Supported Languages
The PGP Endpoint Application Control 4.4 SR1 client supports multiple languages in text format.
The PGP Endpoint Application Control 4.4 SR1 client is supported in the following languages:
•English
•French
•Italian
•German
•Spanish
•Japanese
•Simplified Chinese
•Traditional Chinese
•Russian
•Dutch
•Portuguese
•Swedish
- 22 -
Chapter
2
Using Application Control
In this chapter:
•Getting Started with PGP
Endpoint Application
Control
•The File Authorization
Setup Process
•Accessing the
Management Server
Console
•Common Functions within
the Management Server
Console
•License Expiration
The Management Server Console allows the user to
communicate with an Administration Server to send and
retrieve file authorization data from the database. The data
is sent from the server to a client, thereby establishing
application control on the client. The Management Server
Console provides direct access to system management,
configuration, file authorization, reporting, and logging
functions.
Getting Started with PGP Endpoint Application Control
Get started with Application Control by installing the application, which includes all server and
database components, the Management Server Console, and the clients. Then you use the
Management Server Console to define user and device permissions for encryption of removable
storage devices.
You must begin the installation process with a clean machine that fulfills the minimum software
and hardware requirements. You must resolve all hardware and software conflicts prior installing
- 23 -
PGP Endpoint Application Control
PGP Endpoint solutions and install the latest operating system and database service packs.
Refer to the following processes to identify tasks when installing Application Control.
Figure 3: PGP Endpoint Installation
The File Authorization Setup Process
After successfully installing Application Control, an administrator uses the Management Server
Console to configure and define user access permissions and file authorization rules required in
a PGP Endpoint environment that specify which executable files, scripts, and macros each user
can use, as described by the following process flow.
You can use standard Microsoft file definitions to quickly build a
central file authorization list for executable files, macros, and scripts.
- 24 -
Using Application Control
You can assign administrator access rights using the User Access
tool. An Administrator has restricted access to the Management
Server Console and can be assigned various administrative roles by
an Enterprise Administrator.
After defining Administrator roles, you can use the User Access tool
to assign the defined roles to Administrators.
File groups simplify the process of administering large numbers of
executable, script, and macro files for users. Instead of individually
authorizing files, you can logically group files together logically by
creating file groups.
PGP Endpoint verifies which file group is associated with an
executable, script, or macro and whether the user has permission for
the file group. You can assign specific permissions to local users and
user groups. Only authorized applications and scripts assigned to a
user or a user group can run on the client.
After creating file groups and parent-child relationships you want to
use, you can assign file groups to users or user groups.
You can create a template and scan a target computer running the
client. You can scan all files on a computer, or you can create a
template to scan selected directories or specific file types for example,
*.exe, *.com, *.dll, *.ocx, *.sys, *.drv, *.cpl, *.vbs, *.js, to reduce the
scan time required.
After you create the necessary file groups and required parent-child
relationships, you can assign executable files, scripts, and macros to
file groups.
Activating Execution blocking prohibits user access to unauthorized
files. Local authorization is permitted only for the administrators and
LocalSystem account.
Once you identify all your files, categorize them into file groups, and assign the file groups to
users or user groups, these files are centrally authorized and immediately available to be run by
all allowed users.
- 25 -
PGP Endpoint Application Control
When a user wants to run an executable, script, or macro, the following actions take place
automatically:
•A file that is identified as an executable, script, or macro, by the operating system is stored in
the PGP Endpoint database ready for execution (but not actually executed).
•A file is identified by PGP Endpoint as an executable, script, or macro, has the entire file
content checked to determine its digital signature (hash) before being allowed to execute by
the operating system.
•The digital signature is compared to those of the authorized files that can be run (stored in a
central file authorization list).
•If and only if, the file corresponds exactly to a file in the central file authorization list, that
is, the digital signatures are identical, and the file is authorized for execution for the user or
machine that requested it, the file is executed.
Accessing the Management Server Console
Access to the Administration Server is controlled using the login and logout functions
provided by the Management Server Console. Only authorized administrators may access the
Administration Server.
The Management Server Console is a Windows application that conforms to standard
conventions. From the Management Server Console, you navigate through the system with
menu bars, scroll bars, icons, lists, and checkboxes.
Logging In to the Management Server Console
You access the application by logging in to the Management Server Console.
Step Result: Each time you access the Management Server Console, the Connect to PGP
Endpoint Management Server Console dialog appears.
2. From the Administration Server drop-down list, select the Administration Server you want
to connect to.
You can type the server name as an IP address with port if required in square brackets,
NetBios name, or fully qualified domain name in the Administration Server field.
3. Select one of the following options:
OptionDescription
Use current user
By default the system connects to the Administration
Server using your credentials.
- 26 -
Using Application Control
OptionDescription
Log in asType the user name in the Username field and type the
password in the Password field.
Tip: Prefix the user name by a computer workstation
name and backslash for a local user, and by a domain
name and backslash for domain users.
4. Click OK.
Step Result: The Connect toPGP Endpoint Management Server Console dialog closes.
Result:The PGP Endpoint Management Server Console window opens.
Logging Out of the PGP Endpoint Management Server Console
When you log out from the Management Server Console you can choose to terminate the
adminstrative session or disconnect from the Administration Server.
1. To disconnect from the Administration Server, select File from the navigation bar.
2. Select one of the following options:
OptionDescription
DisconnectThe Management Server Console remains open.
ExitThe PGP Endpoint Management Server Console closes.
Result:The Disconnect or Exit action terminates your current administrative session.
Common Functions within the Management Server Console
PGP Endpoint uses standard browsing conventions and navigational functions.
Features specific to the Management Server Console include menu selections for Modules,
Tools, and Reports. From the console, you can access the PGP Endpoint Control Panel
features that you have administrative user access for. You can use the navigation bar to access
administrative options and PGP Endpoint control features.
- 27 -
PGP Endpoint Application Control
Viewing the Management Server Console
The Management Server Console graphically displays the administrative user features for the
application.
The Management Server Console window is divided into four panels:
•The Control Panel provides access to PGP Endpoint modules, tools, reports, and help
functions.
•The main panel displays a window for the module currently selected from the Control Panel.
Modules remain open and arranged as stacked tabs until closed.
•The Connection panel shows information about the current user. You can use the scrollbar
to navigate through the text.
•The Output panel displays system processing information and error messages.
You can also view the following bars in the Management Server Console window:
•The navigation bar provides access to different PGP Endpoint functions and commands.
Some of these commands and functions depend on the module you are currently using.
•The status bar displays information about the condition of the console.
Figure 4: Management Server Console
Common Conventions
This application supports conventions common to most Windows applications.
Table 6: Common User Interface Conventions
Screen FeatureFunction
Entry FieldsType data into these fields, which allow the system to retrieve
matching criteria or to enter new information.
- 28 -
Using Application Control
Screen FeatureFunction
Drop-Down MenusDisplays a list to select preconfigured values.
Command ButtonsPerform specific actions when clicked.
Check BoxesA check box is selected or cleared to enable or disable a feature.
Some lists also include a Select All check box that lets you select all
the available listed items on that page.
Radio ButtonsSelect the button to select an item.
SortData presented in tables can be sorted by ascending (default)
or descending order within a respective column by clicking on a
(enabled) column header.
MouseoversAdditional information may be displayed by hovering your mouse
pointer over an item.
Auto RefreshWhere present and when selected, the auto refresh function
automatically refreshes the page every 15 seconds.
ScrollbarsDrag to see additional data that does not fit the window.
TabsClick on the tab name to switch to different information related to the
specific page or dialog.
Bread CrumbWhere present and when selected, names the page you are
currently viewing, that page's parent page (if applicable), and the
navigation menu item that opened the displayed page. If viewing a
page that is child to another page, you can view the parent page by
clicking the bread crumb, which also serves as a link, allowing you to
retrace your steps.
Tip: All list pages support right-click.
Using the Management Server Console Control Panel
The Control Panel, adjacent to the Management Server Console main window, provides
access the Modules, Tools, Reports, and Help administrative user features.
You can perform the following tasks using the Control Panel:
•Use the application control Modules to administer routine PGP Endpoint control tasks.
•Generate Reports for users, file groups, PGP Endpoint clients, and administrator actions.
•Perform system administrative tasks using Tools.
•Get Help.
- 29 -
PGP Endpoint Application Control
Resizing and Repositioning Panels
You can resize and reposition the Management Server Console panels.
You can customize the appearance of the main window as follows:
•Drag a panel, by selecting the title bar, to any position on the main page.
•Float a panel in any position in the window, to share the main window with open Modules.
•Dock a panel to minimize the appearance in the main window. The docked panel appears as
a tab at the edge of the main window.
•Scroll across an active panel.
•Close an active panel by clicking the Close icon.
•Double click a panel title bar to return to the original position on the main screen.
•Right-click a floating panel title bar to display a drop down menu to restore, move, size,
minimize, maximize, or close the panel.
Use the icons listed in the following table to resize or reposition a panel:
Table 7: Resizing and Repositioning Panels
IconFunction
Float a panel
Dock a panel
Scroll left or right
Close an active panel
Organizing Columns for Display
You can customize the graphical display for columns in the Log Explorer module.
You can reorganize columns by headings only for the Log Explorer module.
1. Select the Log Explorer module from the PGP Endpoint Control Panel.
Step Result: The Explorer window opens for the module you select.
2. Right-click the table header row of the Explorer main window.
Step Result: A right-mouse menu opens showing all available columns for display. The
menu options shown vary according to the PGP Endpoint control module you
select and your license type.
3. Select a column name from the list. A check beside the column name enables the column for
display in the Explorer window.
- 30 -
Loading...
+ 170 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.