The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Version 10.2.1. Last updated: April 2012.
Legal Notice
Copyright (c) 2012 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, PGP, Pretty Good Privacy, and the PGP logo are trademarks or registered trademarks of Symantec Corporation or its
affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering.
No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if
any.
THE DOCUMENTATION IS PROVIDED"AS IS"AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING
ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT
TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR
INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION.
THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights
as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. “Commercial Computer
Software and Commercial Computer Software Documentation”, as applicable, and any successor regulations. Any use, modification, reproduction
release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with
the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
Symantec Home Page (
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
http://www.symantec.com)
Contents
Introducing PGP Remote Disable and Destroy
About PGP Remote Disable and Destroy 1
Components of PGP RDD 1
How PGP RDD Works 1
About PGP RDD Client Anti-Theft States 2
1
Installation Considerations 3
Planning Your Network Architecture 3
Considerations When Using Multiple PGP Universal Servers 3
Enabling or Disabling PGP RDD in the PGP Universal Server 3
Ports Used by the PGP RDD Service 4
Modifying PGP RDD Ports 4
System Requirements 5
Symantec Products 5
Server Software 5
About PGP Remote Disable & Destroy Licenses 5
Licensing PGP RDD with Intel Anti-Theft 6
About Deploying PGP RDD on Client Systems 7
About the PGP RDD Deployment Process 7
About AT Activated Client Systems 8
Deploying PGP RDD on Client Systems 9
Software Requirements for Client Systems 9
Drivers and BIOS Requirements for Client Systems 10
Hardware Requirements for Client Systems 10
Accessing PGP RDD on the PGP Universal Server 11
Accessing PGP RDD 11
Displaying PGP RDD Data 11
About Intel Anti-Theft Status 11
Changing a Computer's Status 13
Exporting PGP RDD System Information 13
Working with Stolen Systems 15
About Stolen Client Systems 15
Recovering a Stolen Client System 15
Identifying the Initial Screen at Power On 16
Recovering Using the Intel BIOS Recovery Screen 16
Recovering Using the PGP BootGuard Screen 17
Setting PGP RDD Policy 19
Enabling PGP RDD in a Consumer Policy 19
ii Contents
Understanding the Difference Between Consumer and PGP RDD Policies 19
About Consumer Policies 20
About PGP RDD Policies 20
Applying Consumer Policy to Consumer Groups 21
Setting a PGP RDD Policy 21
About the PGP RDD Rendezvous 22
Considerations When Configuring Rendezvous Intervals 23
About PGP RDD Timers 23
Considerations When Setting Your PGP RDD and Consumer Policies 25
Setting a PGP RDD Timer 26
About Decommissioning a Computer 27
Recovering a Decommissioned Client System 27
About Decommissioned Computers 28
Decommissioning a PGP RDD-Enabled Client System 28
About AT Deactivated Client Systems 29
Deactivating a Client System 29
Working with PGP RDD Administrator Roles 31
About PGP RDD Administrator Roles 31
Assigning Roles 31
Introducing PGP Remote Disable and
Destroy
1
About PGP Remote Disable and Destroy
PGP Remote Disable and Destroy from Symantec(TM) powered by Intel(R) Anti-Theft
Technology (PGP RDD) provides a security solution for lost, stolen, or decommissioned
computers.
PGP RDD solves the need to keep data secure in mobile environments and comply with
increasingly stringent regulations in data security and privacy using the latest Intel AT
technology. PGP RDD offers corporate users the option to activate PGP Universal
Server's security service and manage hardware-based, client-side intelligence to secure
the notebook and/or data if a notebook is lost or stolen. If the client system is lost or
stolen, you can remotely disable client systems or disable access to data and securely
decommission client systems.
Components of PGP RDD
The following items are part of the overall PGP RDD installation:
PGP Universal Server. The administrative server used to manage client systems.
Intel Content License Server (ICLS). The ICLS permit licensing server is the
activation site at Intel where client installations are tracked.
Managed PGP Desktop client system with PGP Whole Disk Encryption installed.
Once PGP RDD policies are applied and the system is encrypted, the client system
then becomes PGP RDD-enabled.
How PGP RDD Works
You deploy PGP RDD to clients you have specified in PGP Universal Server as part of a
particular consumer group. For that consumer group, you create a policy that enables
PGP RDD with Intel Anti-Theft Technology. You then create a PGP Desktop client
installer that uses the policy.
A user installs the PGP Desktop client and enrolls with the PGP Universal Server using
the method you choose. The client computer is then encrypted with PGP Whole Disk
Encryption. During this process, the client receives the policy from PGP Universal
Server that enables PGP RDD. PGP RDD in turn activates the Intel Anti-Theft
Technology on that client, and the encrypted client moves to a state known as “AT
Activated.” This is the normal operating state for a PGP RDD-enabled client. This state
is transparent to the user. The client system operates normally and is protected.
2 Introducing PGP Remote Disable and Destroy
About PGP RDD Client Anti-Theft States
PGP Universal Server then monitors PGP RDD-enabled clients through regular periodic
contact between server and client. This contact refreshes the theft status of the
computer and is known as a rendezvous. A successful rendezvous indicates to the
server that a client is online and controlled by the authorized user.
After a missed rendezvous, a timer begins counting down to disable the system. If the
client fails to rendezvous successfully before the timer expires, the client is
automatically flagged on the server as “Stolen.” The client is locked down until the user
or administrator unlocks the system and returns it to an “AT Activated” state.
Security for the system is local. The computer is disabled when the timers expire. This
thwarts a common strategy employed in laptop theft to avoid putting the computer
online. Security is also hardware-based, preventing use of the system even if its hard
drive is replaced.
For more information on configuring and deploying PGP RDD, go to the Symantec Knowledgebase (
search for DOC4975, "PGP Remote Disable & Destroy Configuration Guide".
http://www.symantec.com/business/support/index?page=home) and
About PGP RDD Client Anti-Theft States
A PGP RDD-enabled client is always in one of the following states:
AT Activated client systems are clients with PGP RDD currently activated, and
which are not marked stolen. This is the normal state for a PGP RDD-enabled
client.
AT Deactivated client systems do not have PGP RDD-enabled consumer policies or
do not support Intel Anti-Theft technology.
Stolen client systems are those marked stolen by the administrator or affected
when the Disable Timer expired and the Platform Disable policy triggered. Stolen
computers are locked and cannot be unlocked without assistance from the
administrator.
D Time Expired client systems are in an activated state but there has been no
rendezvous before the system's Disable Timer expired.
Unsupported client systems do not support Intel Anti-Theft Technology.
Note: Computers that do not support Intel Anti-Theft and do not have PGP
RDD-enabled consumer policies may be listed as AT Deactivated, instead of
Unsupported.
Decommissioned computers are still encrypted, but the status is AT Deactivated.
These computers are listed on the RDD Systems > Deactivated page, but they are
no longer protected by Intel Anti-Theft. Use this option when your organization
removes computers from active use, but still wants to protect the data. For
example, if the organization plans to give away or sell the computers to someone
who will not have access to PGP Universal Server.
See About Intel Anti-Theft Status (on page
See Displaying PGP RDD Data (on page 11).
See Deactivating a Client System (on page 29).
See About Stolen Client Systems (on page 15).
11).
Installation Considerations
2
Planning Your Network Architecture
When planning your deployment, keep the following points in mind:
The main consideration when planning your deployment of PGP RDD is that the
client systems must be able to communicate with the server at their scheduled
rendezvous. Missing the rendezvous could lead to locked client systems.
Your PGP Universal Server must be able to communicate with the Intel Content
License Server. Disruption in communication can lead to activation failures.
Considerations When Using Multiple PGP Universal Servers
To balance requests to multiple servers, Symantec recommends that you use load
balancing on your servers. This ensures that all servers participate in processing the
load.
When PGP RDD-enabled client computers enroll or perform a rendezvous, they
exchange 30 to 40 request and response pairs. Because server replication contains a
delay, these requests must be handled and processed by the same server. Your load
balancer must be configured so that the same client's requests are processed by the
same server during a certain period of time. This is called load balancing stickiness.
Symantec recommends that the length of stickiness should be long enough (such as 24
hours, assuming the replication delay will be less than 24 hours) to route requests from
one client to the same server.
Enabling or Disabling PGP RDD in the PGP Universal Server
The PGP RDD service is enabled by default.
Warning: If you disable the PGP RDD service while you have AT-Activated computers,
the computers will not be able to rendezvous successfully and will eventually lock
when the Disable Timer expires.
To enable or disable PGP RDD
1 Log in to the PGP Universal Server administrative interface.
2 Select Services > PGP RDD.
3 Do one of the following:
4 Installation Considerations
Ports Used by the PGP RDD Service
To enable PGP RDD, click Enable. The text Intel® Anti-Theft Technology is
enabled is displayed in the page.
To disable PGP RDD, click Disable. The text Intel® Anti-Theft Technology is
disabled is displayed in the page.
Ports Used by the PGP RDD Service
The PGP RDD service is enabled by default.
Warning: If you disable the PGP RDD service while you have Intel AT-activated
computers, the computers will not be able to rendezvous successfully and will
eventually lock when the Disable Timer expires.
The service requires the following ports to be open.
The Intel Anti-Theft Technology Services Port is used for communication
between PGP Universal Server and the anti-theft service. External access to this
port is not required.
The ICLS URL and Port sets the ICLS (Intel Content License Server) URL and port.
The ICLS permit server is the activation site at Intel where client installations are
tracked. Do not change the default settings unless Symantec Corporation notifies
you that it is necessary. You can test the connection to the ICLS from the Options
page (PGP Remote Disable & Destroy Administration > Configuration > Options).
PGP Universal Server and PGP RDD-enabled client system communication uses
the same HTTPS port as you use to access the administrative console (port 9000 by
default).
Modifying PGP RDD Ports
To modify PGP RDD settings
1 Log into the administrative interface.
2 Select Services > PGP RDD.
3 To enable PGP RDD, click Enable. The text Intel® Anti-Theft Technology is
enabled is displayed in the page.
4 To modify the Intel Anti-Theft Technology Services Port, or the ICLS URL or Port,
click Edit.
5Make the necessary changes, and click Save.
System Requirements
PGP RDD can only be used with managed PGP Desktop with PGP Whole Disk
Encryption installations.
Caution: To support PGP RDD, the client and PGP Universal Server must be able to
contact each other. Do not activate PGP RDD on a computer that will never contact
PGP Universal Server, because the computer will lock.
Symantec Products
PGP Whole Disk Encryption (PGP WDE)
PGP Universal Server
PGP Remote Disable & Destroy with Intel Anti-Theft Technology
System Requirements
5 Installation Considerations
Server Software
Linux (CentOS 5.3)
Servlet Container (Tomcat)
Spring Framework
JDK 1.6
Valid SSL Certificate. This certificate to be provided by Symantec.
Working connection to Intel ICLS Servers.
About PGP Remote Disable & Destroy Licenses
Licensing PGP Remote Disable & Destroy with Intel Anti-Theft Technology requires
three things:
PGP Universal Server license. Intel Anti-Theft Technology is automatically
You must purchase this license separately from your PGP Universal Server.
This human-readable XML file shows the number of seats purchased, the start and
end dates of the subscription period, and the license serial number. The license
expires at the end of the subscription period. If the license expires, activated
systems are not affected and continue to be protected. When you view the license
history for an expired license, the entry shows that there are no seats available on
that license.
You can have more than one active license at a time. When you upload a new
license, it does not replace existing licenses; instead, they are cumulative.
6 Installation Considerations
About PGP Remote Disable & Destroy Licenses
PGP Universal Server does not enforce the license to make sure you do not exceed
the number of activated computers your license permits. It is possible to activate
more computers than your license permits, but the number of activated computers
is registered by the ICLS.
Activation file. This encrypted activation file is included when you purchase the
PGP RDD license file.
The activation file registers your license, and enables the ICLS to monitor how
many Intel Anti-Theft-activated computers you have. PGP Universal Server sends
no information directly to Symantec Corporation.
Licensing PGP RDD with Intel Anti-Theft
When you purchased a license for PGP RDD, you received two Symantec license files
with the file extension .slf.zip:
[name1].slf.zip
[name2].slf.zip
For example, the files are named 2230672.slf.zip and 2230673.slf.zip. These files are
uploaded to your PGP Universal Server so you can license PGP RDD.
To apply the license and activation files
1 From the PGP RDD interface, select Configuration > Options.
2 Click Browse to locate the license file you want to upload.
3 Click Browse to locate the activation file you want to upload. You must have both
the license and the activation file. Make sure to select the correct activation file
for the license you are uploading.
4 Click Upload License File to upload the license and activation files.
5 Click Save.
To test the connection between the PGP Universal Server and the ICLS
1 From the PGP RDD interface, select Configuration > Options.
2 Click Test Permit Server Connection. A message confirms whether or not the
server is reachable.
Loading...
+ 26 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.