Sesguide v53SR1 J1
Sesguide v53SR1 J1
Sesguide v53SR1 J1
5
User Guide
©Copyright 1997 - 2014 by WinMagic Inc.
All rights reserved.
Printed in Canada
Many products, software and technologies are subject to export control for both Canada and the United
States of America. WinMagic advises all customers that they are responsible for familiarizing themselves
with these regulations. Exports and re-exports of WinMagic Inc. products are subject to Canadian and US
export controls administered by the Canadian Border Services Agency (CBSA) and the Commerce
Department’s Bureau of Industry and Security (BIS). For more information, visit WinMagic’s web site or
the web site of the appropriate agency.
WinMagic, SecureDoc, SecureDoc Enterprise Server, Compartmental SecureDoc, SecureDoc PDA,
SecureDoc Personal Edition, SecureDoc RME, SecureDoc Removable Media Encryption, SecureDoc Media
Viewer, SecureDoc Express, SecureDoc for Mac, MySecureDoc, MySecureDoc Personal Edition Plus,
MySecureDoc Media, PBConnex and SecureDoc Central Database are trademarks and registered
trademarks of WinMagic Inc., registered in the US and other countries. All other registered and
unregistered trademarks herein are the sole property of their respective owners. © 2014 WinMagic Inc. All
rights reserved.
Acknowledgements
This product includes cryptographic software written by Antoon Bosselaers, Hans Dobbertin, Bart Preneel,
Eric Young ([email protected]) and Joan Daemen and Vincent Rijmen, creators of the Rijndael AES
algorithm.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.OpenSSL.org/).
WinMagic would like to thank these developers for their software contributions.
Contacting WinMagic
WinMagic
5600A Cancross Court
Mississauga, Ontario, L5R 3E9
toll free: 1-888-879-5879
phone: (905) 502-7000
fax: (905) 502-7001
Sales: [email protected]
Marketing: [email protected]
Human Resources: [email protected]
Technical Support: [email protected]
For information: [email protected]
For billing inquiries: [email protected]
Introduction to SecureDoc
About SecureDoc
SecureDoc stops unauthorized users from gaining access to confidential data on your notebook or desktop
computer or on your removable media (USB drive, CD, and/or DVD). Once SecureDoc is installed and set up
on your computer, you and other users must be authenticated (using password, hardware token/smart
card, biometric, or PKI) before even attempting to log on to Windows: this is called Pre-Boot Authentication
(PBA).
SecureDoc is installed automatically on your computer and configured by your administrator.
As a SecureDoc user, you have access to WinMagic's MagicSync product, which allows you to encrypt and
securely share files that are stored in a cloud storage provider. See the separate MagicSync online help.
About Boot Logon
Boot Logon is the SecureDoc mechanism that performs Pre-Boot Authentication. Whether or not you see
Boot Logon as well as your normal Windows logon depends on how SecureDoc has been configured. You
can choose the language used for Boot Logon: right-click on the SecureDoc icon in the system tray and
choose SecureDoc Language Selection, then choose the language to be used for the client interface,
Boot Logon, or both.
SecureDoc’s Encryption Features
In addition to allowing you to encrypt your fixed disk, you can use SecureDoc to encrypt:
• removable media (USB, CD, DVD), encrypted either automatically or manually, for individual or shared
use (see “Working with Removable Media” on page 42)
• individual files and folders locally, on a network, or on a USB device, using File and Folder Encryption
(see “Using File and Folder Encryption” on page 50)
SecureDoc performs full disk encryption for fixed and removable media. This provides the most secure and
comprehensive protection for data. However, file and folder encryption has a useful role to play in a
comprehensive strategy for data-at-rest encryption. It is effective in protecting data files in transit,
securing information sharing, and defending against internal threats.
By shielding data files in transit — file transfers, e-mail attachments, etc. — File and Folder Encryption
provides a strong complement to full disk encryption, particularly when the functions are integrated under
a single management scheme.
About the SecureDoc Interface
Launch the SecureDoc interface from Start > SecureDoc Control Center.
You use the SecureDoc interface to encrypt removable media as well as to perform encryption
management tasks.
Use the navigation pane on the left of the screen to choose a function to perform. Click groups to expand
them, then click the function’s name. The corresponding data screen appears in the right pane.
Encryption Terms and Concepts
Using SecureDoc doesn’t require detailed knowledge about encryption and how it works. However, it is
useful to understand some basic terms and concepts.
Keys and Key Files
Like a physical key, an encryption key is used to lock and unlock secured information. Encryption keys are
stored in key files (you can think of them as the key ring that holds your keys). To access encrypted media,
you need to log on to the key file containing the key used to encrypt the media.
The key file identified during encryption of your fixed disk is your “default” key file.
A key file can contain multiple keys, and the same key can exist in multiple key files. For example, you
might want to share with other users the key used to encrypt removable media, but not the key used to
encrypt your fixed disk. If you have both keys in the same key file, you would create (or acquire) key files
for the other users and copy (import) the removable media key from your key file into the other key files.
Alternatively, you could have different key files for different purposes, logging onto each key file as needed.
More About Key Files
Key files have a .DBK extension (juser.dbk, sdadmin.dbk, etc.) and are protected by a password or token.
You can store key files in a variety of locations, such as your computer’s hard disk, removable media, or a
token. As long as your removable media is kept in a secure location, storing key files on removable media
provides more security than storing them on the hard disk. With key files on removable media, a hacker
who has access to a computer does not have access to the keys used to encrypt it. Their only option is to
attack and break the encryption algorithm — a nearly impossible task.
Key files are, themselves, encrypted.
Key files can be further protected with a certificate or protection key stored on a token or smart card.
About the Encryption/Decryption Process
During encryption, data is read, encrypted, then written back on the same sector. Once this process is
complete, any data read is automatically and transparently decrypted, and any data written is
automatically and transparently encrypted.
Note: Initial encryption is called “conversion”.
Once a file is accessed, it is decrypted in memory. If this file is saved elsewhere other than the encrypted
area, it remains in plain text. For example, if you open a file on your encrypted hard drive and save it to an
unencrypted network folder, the network version is not encrypted.
Password Rules
Password rules can be used to ensure that passwords are secure (for example, are made up of a mixture of
numbers and letters, are changed regularly). Password rules apply to a specific key file. For more about
passwords, see See "Appendix A: Password Rules" on page 59.
Key File Privileges
Key files are associated with specific privileges that determine what the user of that key file can and cannot
do. Privileges fall into two basic categories: user and administrator (admin). SecureDoc features are
available only to someone who logged on to the computer using a key file that has administrator privileges.
Key files created through the Key File Wizard are admin key files.If your computer was encrypted by
someone else, you may have a user key file, which enables you to read and write to encrypted disks, and
change the password of your key file, but nothing else.
Note: Users who log in with a user key file can create new key files for their personal use and have
all administrator privileges for those key files. However, these key files do not contain the key used
to encrypt the hard disk and so can be used only for removable media.
Administrator key files may contain the encryption keys for multiple users, such as those in a department
or division. This ensures that administrators, on behalf of the enterprise, can always access data encrypted
by users. This is an important safety precaution in case a user leaves the company without decrypting
information, or without leaving their encryption keys and passwords behind.
Note: You can lock specific users even if they have a valid key—see “Creating Backup Key File” on
page 21.
1. At the Boot Logon screen, click the wireless icon . A new screen opens.
2. If you have connected wirelessly before, you will see your previous choices: select the appropriate
choice and click Connect, then click Back to return to the Boot Logon screen so you can enter your
username/password.
If this is your first time connecting wirelessly, or if previous wireless settings are not appropriate,
follow the steps below.
3. Choose your Wireless Adapter Type, then click Scan to scan for available wireless networks.
Information about the found networks appears on the screen.
4. When you see your wireless network, select it and, if necessary, click Settings to make any
changes to your network settings.
5. Click Connect to connect to your wireless network. A new screen opens.
6. Enter your wireless access Password and click Save. Once you are connected, you should see a
prompt telling you that you are connected.
7. Click Return to go back to the SecureDoc Boot Logon screen.
8. Enter your username/password and press Enter or click Login. If the username/password matches
the one stored in the SES database, your computer continues to load Windows.
If you enter an inaccurate password, you may see a password hint. If you forgot your password, click
Forgot Password? and follow the appropriate password recovery steps.
Logging On
If desired, choose the language of the SecureDoc interface from the list.
Enter the userID and password provided to you and press ENTER or click Login. The userID is not case-
sensitive. Depending on configuration, you may be able to press ENTER in the UserID field to use a default
userID.
If the key needed to access the protected computer is stored on removable media, or in a different key file,
enter the full path to the key file’s location (removable media will need to be inserted) as well as the key file
name/username. If you protected your key file with a token or Smart Card, or if the key file is stored on a
token, you are prompted to insert the token or Smart Card.
Note: The key file(user ID) name must be in DOS format (“8.3”). If your key file is on a USB drive,
be sure that the device is detected in DOS.
If login is successful, your computer continues to load Windows.
If you enter an inaccurate password, you may see a password hint. If you forgot your password, click
Forgot Password? and follow the appropriate password recovery steps.
Note: The icon indicates your connection status to the network (a red dot indicates you are
not connected, a green dot indicates a connection exists).
Accessing Administrative Functions
Press F3 to show additional functions:
• Configuration (use to modify boot configuration; most of these settings should be changed only in
consultation with WinMagic Technical Support, or to uninstall SecureDoc - see See "Removing
SecureDoc From Your System" on page 41)
• Save Log (use to save information related to login attempts for troubleshooting purposes)
• Information (use to see details about your Network Interface Controller and any SES-related
messages)
Note: By default, your SecureDoc account will be locked after 15 failed login attempts. Another
user can login to your locked computer, but you will need administrative help to unlock it for your
use. Your installation may use a different value. You can change the value if you wish. See
“Changing Maximum Number of Failed Logins” on page 31.
Identifying Your Keyboard (Tablets Only)
Click to choose a different keyboard.
Note: You can also change the keyboard layout in the Control Center (see "Using Specialized Devices" on
page 24).
Using the V4 Boot Logon
SecureDoc includes two Boot Logon versions. If Boot Logon fails, reboot and press the “a” key while the
computer boots up. That will invoke the V4 version of Boot Logon instead.
To avoid having to manually invoke the V4 version in the future, you can set SecureDoc to use the V4
version of Boot Logon all the time: see “Choosing V5 or V4 Loader” on page 29.
Entering a Temporary Password (Single Sign-on and Password Synchronization)
If your ActiveDirectory administrator has changed your password and provided you with a temporary one,
you will need to re-establish the password synchronization between Windows and SecureDoc.
If you reboot your machine after receiving a temporary password:
1. You will see the SecureDoc login again.
2. Enter your original key file password: the login will fail.
3. Enter it again: you will see the Windows Login (including the Use cached Credentials option, to
be used if the computer is temporarily not on the network, for Vista/Win 7).
4. Enter your temporary password and, when prompted, enter a new password.
5. When you reboot again, you will be able to access Windows without specifying a password.
If you simply lock after receiving a temporary password:
1. Enter your temporary password in the Windows Login: the login will fail and the computer will lock.
2. Switch users.
3. The SecureDoc Login screen appears, as it did when you first booted an encrypted computer.
4. Enter your original key file password: the login will fail.
5. Enter it again: you will see the Windows Login and can proceed as normal.
Using SecureDoc
Choosing a Language
You can choose the language used for the SecureDoc interface: right-click on the SecureDoc icon in the
system tray and choose SecureDoc Language Selection, then choose the language to be used for the client
interface, Boot Logon, or both.
Creating Key Files
Creating Key Files with Control Center
1. In Control Center, click Key Management, then Create key file.
2. Choose whether to create a password-based or token-based key file.
3. To set the password rules for this key file, click Password Rules. (For more about password rules,
see See "Appendix A: Password Rules" on page 59.)
4. From the Object Label list, choose the key from the token that you want to use for encryption.
Click Next and follow the steps as for password-based key files in “Password-Based Key Files” on page
14.
2. Click and browse to the location where you want to create your key file, entering a key file
name.
3. Enter a User ID and password (in both the Password and Re-Enter Password fields) to be used
for accessing the key file. The User ID is a maximum of 64 characters, and not, by default, case-
sensitive. The password should be a strong password that satisfies the password rules you
established earlier.
4. If your password rules included enabling the password hint, enter a Hint that you can display if you
forget your password. Be sure the hint does not contain enough information for an illegitimate user
to guess your password. Click Password Rules and make sure that Disable password hint is
cleared.
5. To have the key file expire by a certain date, check the Key File Expires On option and choose the
expiry date and the number of days prior to that date that a warning will appear when that key file
is used.
6. To use self-help password recovery for a forgotten password, first click Password Rules again and
choose how many questions should be answered and the minimum total length of the answers.
Then check the Use self-help password recovery option: you are prompted to acknowledge the
need to enter self-help answers. Click OK and answer the appropriate number of questions.
7. Click Next.
8. You are prompted to choose whether the key file should have user or administrator rights, and the
specific rights for the key file.
Use of SecureDoc to change the key file password. User key files have
Modify Password
only this privilege.
Use of Key Manager to generate, delete, and import keys and to make
Modify Key key file backups. Automatically enables the Export and View Key
privilege.
Use of Key Manager to work with encryption keys, copy a key file to a
Export and View Key floppy disk, and to export keys to other key files. Automatically enables
the Modify Key privilege.
Viewing of the SecureDoc audit log (see “Viewing the Audit Log” on
View Transaction Log
page 39).
Continued use of SecureDoc if the disk integrity check fails, The Disk
Disk Integrity Check integrity check process checks the computer’s boot files to make sure
they have not been tampered with, or corrupted, on boot-up.
Note: If Boot Logon has not yet been installed, you need to log out of Control
Center and log in again to see the added key.
11. Click Next, then Finish. A prompt tells you the key file was created.
2. To manage a password-based key file, click the tab, identify and enter the password for the key
file you want to manage, and click Login.
To manage a token-based key files, click the tab, choose the appropriate token type and slot,
enter teh Password, and click Login.
2. Choose the appropriate token type and slot, enter the Password, and click Login. A list of the key
files on that token appear.
3. To add a key file, click Add.
To remove a key file, click Remove.
To export a key file, click Export.
Managing Other Key Files
Use this function if you have multiple key files on your computer, and want to control what slot they
belong in.
1. In Control Center, click Key Management, then Additional Key files.
2. To remove a key file from its current slot, select it and click Logout.
To add a key file to a slot, select the slot, navigate to the Key file, enter the password, then click
Login.
Adding Keys to An Existing Key File
You can either create new keys for an existing key file, or import keys from another key file.
1. In Control Center, click Key Management, then Key file Management.
2. Locate and log on to the key file you want to manage, and click Login.
3. Click Key Management. A new screen appears, showing the keys currently in the key file.
• To create a key and add it to the key file, enter a key name in the Key Name field and click
Generate.
• To remove a key from the key file, select it and click Delete.
Note: Deleting a key that is used to access encrypted media will make that
media inaccessible.
• To import a key from another key file, click Import.
Click and browse to the location of the key file containing the key you want to import, enter
the Password and click Login.
A list of keys in that key file appears.
Select the key(s) to be imported and click Import Keys. The selected key(s) are added to the
key file’s list.
2. Click and navigate to the user’s key file. Optionally, click Get User Information.
3. Click Add.
Deleting Users From This Computer
1. To remove a user (existing key file), select it in the User Management screen and click Delete
User.
2. User information appears: to confirm the deletion, click Delete. Note that the key file itself is not
deleted.
Preventing Users from Accessing This Computer
You may want to lock certain users out from having access to this computer, even if they still have valid
keys (for instance, if someone has left the company). Use this function to create a list of users to be locked
out. These users, at boot time, see a message that tells them they cannot log on.You can create the list of
users to lock out, but the list does not take effect unless you choose to enable it in this screen. You cannot
add the key file you are logged in with to the “locked” list.
To lock out a user:
1. In the User Management screen, click Lock User. The lock user screen appears, with the lock list
enabled and the name of the selected user in the first field.
2. To add the user to the locked list, click Lock. If a user name does not appear in the first field, you
can type it in the field, then click Lock.
If necessary, click OK and select another user, clicking Lock to display the lock user screen again
and clicking Lock to add the selected user to the list.
3. To have the list take effect, be sure that Enable Locked Users List is checked when you click OK.
Exporting A User’s Key File
This function creates a copy of a user’s key file.
1. In the User Management screen, select the user (key file) you want to export, then click Export
key file.
2. You are prompted to choose the destination for the exported file.
Sharing Encrypted Files with Other Users
Enterprise users can, depending on configuration, share files (and folders) from a fully encrypted disk with
other users.
1. Right-click on selected files or folders and choose SecureDoc SFX.
2. When prompted, enter a password.
3. Give the resulting zip file to another user, along with the password. That user can extract decrypted
versions of the files in the compressed file.
Using Specialized Devices
Specialized Keyboards
Use this function if you have an atypical keyboard layout.
1. In the Control Center, click Boot Control, then Advanced Settings.
2. Click the Keyboard Layout tab.
3. If appropriate, check Non-standard keyboard and choose what layout to map it to.
4. To automatically retrieve the Windows keyboard layout while installing Boot Logon, check
Automatically get....
5. To use a foreign keyboard, check Foreign keyboard support.
Note: You can also choose a different keyboard at preboot (see "Using Boot Logon" on page 11).
Tablet PC
Use this function if your computer is a Tablet computer, and you want to use the Tablet’s on-screen
keyboard for SecureDoc functions. You must also use the V4 bootloader: see "Choosing V5 or V4 Loader"
on page 29.
1. In the Control Center, click Boot Control, then Advanced Settings.
2. Click the Tablet PC tab.
3. From the Tablet PC support list, choose the appropriate manufacturer. If your manufacturer and
model are not listed, the on-screen keyboard may not be supported (this means that, if you do not
have a physical keyboard, you cannot use SecureDoc).
4. Click Apply.
PCMCIA Reader
If Boot Logon has problems locating a PCMCIA reader in a laptop, it may be an addressing problem. You
may need to change the PCMCIA I/O address on their laptop to the default address D0000000 to help
SecureDoc detect it. You then need to do the following:
1. In the Control Center, click Boot Control, then Advanced Settings.
2. Click the General Settings tab.
3. Check Change PCMCIA I/O Address if zero.
4. Click Apply.
Setting Description
Lock means to restrict access in specific ways. You cannot lock the first
(boot) drive or the system drive of the disk where SecureDoc resides. You
should not lock disks to which Windows and other applications may need
to write. For removable media, “lock” means limiting the ability to work
Lock
with the removable media: if the media is not locked, the user can
encrypt, continued interrupted conversion, and decrypt the media
(potentially exposing sensitive data). When you lock media, you can
choose the specific restriction.
Monitor means to notify the user when someone tries to access the drive.
A warning message that the file is being accessed pops up immediately to
Monitor
any user currently logged in and to the user who triggered the monitored
event.
Log Write Access means to track writing to media in a log file. The log file is
Log Write called wr.log and resides in the UserData folder of SecureDoc. It
Access contains the date the data was written and to which file, the sector
modified, and the name of the logged on user.
Access to Encrypted
Restriction Access to Non-Encrypted Disks
Disks
Note: Locking write access to an NTFS file system drive will lock both reading
and writing, since even opening a document on an NTFS drive will write
information to the drive.
5. Click Create.
6. To activate the profile, on the Current Profile tab, click Select a Different Profile, then choose it
from the list.
Controlling Use of USB Devices on Computer
You can choose to block all but specific authorized USB devices from being used with your computer. This
feature is required for USB storage devices attached to ports: if you enable Port Control, such devices are
locked by default until they are authorized through Port Control.
Note: If you are using a token-based key file and want to use the Port Control feature, you must
add your token to the list of authorized devices.
1. From the Control Center, click Tools, then Port Control.
2. Click Install (necessary only the first time you use this feature). You are prompted to reboot.
3. After rebooting, return to the Port Control screen and click Manage. A new screen appears.
7. Each authorized item is listed on the Port Control screen. You can remove an authorized device if
necessary: select it and click Remove.
8. When Port Control has been configured to your satisfaction, click Apply.
You can disable and/or uninstall Port Control if necessary.
Trust Control
If using Disk Access Control, you can prevent the use of all but specific SEDs on your computer.
1. From the Control Center, click Tools, then Trust Control.
2. To load the default list, click Load Default List. The list is populated with information provided by
WinMagic. You can add to this list, remove an item from the list, or clear the entire list.
To add a specific item, click Add. You are prompted to either enter the device details or trust a
device model.
3. If you select Enter device details to trust, when you click Next you are prompted to enter
identifying information about the device.
If you select Trust a device model, when you click Next you see a list of the device models
currently connected to your computer. Select a model and click Add Selected Device Model.
Simplifying Login
Synchronizing Passwords
You can choose to synchronize your Windows and SecureDoc key file passwords, so that changes made to
either password are automatically made to the other one.
1. In the Control Center, click Options, then General.
2. Check Synchronize SecureDoc with Windows password.
3. Optionally, also check Synchronize with matching windows Accounts only to have password
synchronization done only if the name of your Windows account is the same as your SecureDoc
account name (name of the key file you use to access your encrypted computer).
4. Click OK.
Note: Consult with your administrator before choosing to use the V4 boot loader. It does not
support all Enterprise features.
1. In the Control Centre, click Boot Control, then Advanced Settings.
2. On the General Settings tab, choose Use V4 Boot Loader only.
3. Click Apply. The next time you reboot, the V4 Boot Logon will be used.
This function is also available from the Boot Logon Configuration screen: at Boot Logon, press F3, click
Configuration, then set Switch back to PBA to "Yes".
Note: You can also use this feature to force use of V5 boot loader exclusively or to use the V4 boot
loader and V5 as an upgrade (before Boot Logon loads, press "a" to switch to the V4 loader).
Using UEFI Driver Hook
This option permits the SD Client Administrators to enable / disable the driver binding for UEFI devices. By
leaving this option disabled, SecureDoc’s own logic will be used to manage such devices, which will work
better for devices that do not have full implementations of Driver Binding.
By enabling this option, the assumption is that the devices receiving this profile will have full
implementations of Driver Binding for UEFI. UEFI driver binding is special protocol, providing functions for
starting and stopping drivers, as well as a function for determining whether a given driver can manage a
particular controller.
Note: By default, the UEFI driver hook is not enabled.
1. In the Control Centre, click Boot Control, then Advanced Settings.
2. On the General Settings tab, select the Use UEFI driver hook checkbox.
Masking Key Input
By default, the user name entered at Boot Logon and answers to any self-help password recovery
questions are shown in plain text, while the password is shown in asterisks. You can choose to have all user
input to Boot Logon masked.
1. In the Control Centre, click Boot Control, then Advanced Settings.
2. On the General Settings tab, choose Mask key file input.
3. Click Apply. The next time you reboot, the masking will be used.
Boot Text and Color
Boot text and color options control the way Boot Logon appears. These options enable you to customize
Boot Logon to reflect your personal preferences.
If you plan to use a customized background, the graphic file needs to meet these requirements:
• 24 bit bitmap (.bmp) format
• 1024 x 768 pixels
• when zipped (SecureDoc zips the file for you), no larger than 0.5MB (you will be warned if your file
exceeds this size)
Only computers with a high resolution monitor (the most common type) will display the customized logo —
other monitors will shown the default Boot Logon display.
1. In the navigation pane, click Boot Control, then Boot Text and Color.
2. Choose the number of users (key files) you want to have access to this computer.
3. Click Update. You are prompted to update your recovery media: insert the media used originally
during encryption (it will be overwritten with updated information).
Updating Boot Logon
Use this function to change the maximum number of users of Boot Logon on this machine.
1. From the Control Center, click Boot Control, then Install/Uninstall Boot Logon, then the
Update tab.
2. Choose the number of users (key files) you want to have access to this computer.
3. Click Update. You are prompted to update your recovery media: insert the media used originally
during encryption (it will be overwritten with updated information).
Credential Provider Options
Options in the Credential Provider tab affect the way Boot Logon functions on all Vista/Windows 7/Windows
8 client devices that are controlled by the settings encapsulated within the device profile.
To access the Credential Provider Options screen, open the SecureDoc Control Center, select Options tab
on the left menu, then click Credential provider.
Options Description
Check to have Windows login information stored so
that logging into boot logon automatically logs users
Automatically log in to Windows with credentials
into Windows as well (single sign-on).
entered at boot logon
Set the amount of time to wait before timing out
automatic login.
Automatically log in to Windows will time out after x Automatically login to windows will time out after x
mins (Optional) mins.
Use SecureDoc Logon credentials to log into Only users having SecureDoc credentials may login
Windows at Windows login
Maintenance Troubleshooting
Windows 8 Refresh/Reset Behavior
Windows 8 Refresh/ Reset will have different behaviors with SecureDoc.
1. In the Control Center, click General, then Start Page, then (available only when Boot Logon
has been installed).
or
In the Control Center, click Boot Control, then User Management, select a user and click
Change Password.
The Change Key file Password screen appears.
or
From Boot Logon, check Change Password.
2. Enter your Old Password to the current key file, then enter and confirm the New Password.
3. If the key file was created using password rules that allow a password hint, enter or change a
Password Hint that can help you recall a password.
To view the password rules in effect for your key file, click Password Rules.
4. Click OK.
2. Click . The Self Help screen appears, showing only the questions to which an answer was
originally given.
3. Click in any row to enter a new answer. Note that whether or not those answers appear in plain
text depends on the option setting (see “Masking Key Input” on page 30).
5. The answers you gave at installation are displayed. Click in the answer field and enter a new
answer. Keep in mind that answers are case-sensitive: when recovering your password, you will
need to enter answers exactly as entered here.
6. Click OK.
1. In Control Center, click General, then Start Page, then (available only once Boot Logon has
been installed).
or
In Control Centre, click Drive Encryption, then Create Recovery Media.
2. You are prompted to specify the path where the recovery media will be created.
Using Recovery Media
WinMagic has never experienced a case when recovery media was needed (probably because hard disks are
very reliable and SecureDoc does not let applications overwrite its information). However, we have
experienced improper use of recovery media, such as using outdated media or media created for another
computer, in which case the boot disk is no longer accessible. We strongly recommend you contact
WinMagic Technical Support before using the emergency disk.
To use recovery media, insert it and change your BIOS settings to boot from the USB.
Note: It is vital that the recovery media used in this procedure was created for the specific
machine on which this procedure will be performed.
Recovery Media for Self Encrypting Drives (SEDs)
Note: For SED users only.
You must have the Create Emergency Disk privilege to perform the following function.
To export:
1. In Control Center, click Boot Control, then Import/Export FDE Recovery Info, then the
Export tab.
2. Browse to the location where the recovery information is to be stored and enter/confirm the
password. You will need the password to import the key file, which contains the files
HWEkeyfile.dbk and SDHWE.enc.
To import:
1. In Control Center, click Boot Control, then Import/Export FDE Recovery Info, then the
Import tab.
2. Browse to the location where the recovery information is stored and enter the password.
Working with Crypto-Erase
About Crypto-Erase
Note: Crypto-erasing a device removes the encryption keys from it, rendering it inaccessible.
Setting up Crypto-Erase
1. In Control Center, click Boot Control, then Advanced Settings.
2. On the Crypto-erase Settings tab, check Enable Pre-Boot Crypto-erase keystroke
sequences.
3. Specify the three key strokes to be used for this purpose. Supported keys are Function keys (F1, F2,
etc.), alone or in conjunction with the Shift, Ctrl, or Alt key. For example, the sequence could be
SHIFT+F1, CTRL+F2 and F3.
4. To allow time to cancel the Crypto-erase function, enter the number of seconds of delay before the
Crypto-erase will be carried out. During this time, if the sequence is re-entered, the Crypto-erase is
cancelled.
5. Click Apply.
Crypto-Erasing Your Computer
At pre-boot or after Windows has started, you can Crypto-erase your computer by pressing the defined key
sequence. This takes effect immediately. If done at pre-boot, login will be denied. If done after Windows
has started, Windows will crash as soon as the sequence is entered. Depending on your settings, you may
be able to cancel the Crypto-erase.
Crypto-Erasing a SED
1. In Control Center, click Drive Encryption, then Encryption Management.
2. Select the box representing the SED you plan to crypto-erase.
3. Click Crypto-Erase.
Diagnostics
The “Diagnostics” screen in SecureDoc Control Center provides a regular (non-admin) user with the ability
to enable detailed logging in the SecureDoc Client environment. This will normally only be needed when
requested by WinMagic SecureDoc technical support, to provide detailed log information for analysis. Once
enabled, because of the additional load that detailed logging places on the computer, this feature is
designed to disable itself automatically after 48 hours, on the assumption that two days of detailed log
information should normally provide adequate additonal information to aid in troubleshooting.
The list of drives available for you to encrypt or decrypt uses the following conventions:
• encrypted disks have an “e”, and the name of the key used to encrypt them following their name
To view online help, in the Control Center, click General, then Help.
2. To automatically encrypt removable media with the key you are logged on to when the media is
inserted, check the Automatically encrypt... option. This option is required for container
encryption.
3. Choose the type of encryption you want to use (note that "FFE" encryption is not available). If you
choose Container-based, specify the percentage of available free space on the removable media
that the container is to use. Note that even with a setting of 100%, there will be space available for
the media viewer that allows the encrypted media to be accessed on a machine without SecureDoc
installed.
4. To enable the removable media audit log, check Enable RME audit log. The log is stored locally as
USBLogTxt.txt under the SecureDoc installation folder.
5. To be able to override these settings for individual pieces of media, check Allow user to change
the default media encryption settings. Optionally, check Encrypted media can be
accessed with a password: you can override this setting on the Media Encryption Settings
screen (see “Configuring Removable Media Encryption Settings” on page 43) if necessary.
6. To enable encryption of CDs/DVDs, check Enable CD/DVD encryption and Allow user to
change the default CD/DVD encryption settings. Optionally, check Encrypted CD/DVD
can be accessed with a password: you can override this setting on the Media Encryption
Settings screen (see “Configuring Removable Media Encryption Settings” on page 43) if necessary.
7. Click OK.
3. Choose a key to be used for the encryption (it is advisable not to use the key that is used to encrypt
your bootable disk).
4. Choose how you want to be able to access encrypted CD/DVDs created on this machine:
• To have encrypted CDs/DVDs available only to those who are logged in to a device with
SecureDoc installed on it, and who have access to the key used to encrypt the removable media,
clear the Encrypted CD/DVD can be accessed with a password option.
• To have encrypted CDs/DVDs usable to anyone using a SecureDoc-encrypted device and who has
the appropriate password, check the Encrypted CD/DVD can be accessed with a
password option and enter a password. For security reasons, the CD/DVD password will be
erased when the computer is rebooted. Every time you turn on your computer and burn a
CD/DVD, you need to enter the password again (or a new password). You may will need to share
this password with other users.
5. Click Apply.
Note: To see the password rules in effect for this password, click Password
Rules.
• If you chose to protect the removable media with a certificate, you are prompted to choose the
certificate from those stored on your machine: choose the appropriate Certificate Store to display
the certificates in that store, then add them to the Recipients list.
5. If encryption is interrupted, the password (if used) may not be assigned. If this happens, when
encryption is complete you can use the Encryption Management feature of the Control Center to
apply a password to the encrypted media.
Decrypting Removable Media
Do one of the following:
• In Windows Explorer, right-click on the encrypted removable media and choose Decrypt Media. You
are prompted to confirm (Windows 32 only).
• In the Control Center Encryption Management screen, select the removable media’s box and choose
the Decrypt Operation.
Note: In order to improve user experience when needing to decrypt media,
SecureDoc uses the "fast decryption" option, which in this case means that all
sectors that contain data will be decrypted back into Clear-text, but any sectors
that are marked as not containing data will remain encrypted (since those
sectors are considered to not contain data). This will substantially shorten the
time required to decrypt sparsely used media by not requiring the decryption of
sectors that do not contain "live" data.
Accessing Encrypted Removable Media
You must have SecureDoc or the free WinMagic MediaViewer application installed to work with encrypted
removable media.
When you insert the encrypted removable media in your computer, you may be prompted for the
password of the key used to encrypt it. If the encryption was done using PKI and you have the appropriate
public certificate, you will not be prompted for a password.
Working with Removable Media Container Encryption
If Automatic Encryption is Enabled
If automatic encryption for container is enabled (this may have been set up by your administrator), when
you insert removable media you will be prompted for a password that will allow access to the container
from a machine that does not have SD. If a key has not already been associated with the container, you
will also be prompted to choose a key.
Creating the Container
When removable media container encryption is enabled, the first time you insert removable media in your
computer you will be prompted to create a container.
1. Enter a password (used to access the contents of the container from a computer that does not have
SecureDoc installed). Note that the password you set must follow password rules.
2. Choose a key (used to access the contents of the container from a computer that has SecureDoc
installed).
3. Click OK.
4. Encryption of the container begins (a progress bar is shown).
5. The container is automatically mounted and shown as a separate drive in Windows Explorer.
2. A list of folders that are currently protected is shown. For Enterprise users, these may have been
configured by your administrator.
3. Click Add and navigate to the folder you want to encrypt, choosing the key to be used,
Advanced Functions
This chapter lists features that are to be used only under specific circumstances.
Options for Use Only in Consultation with SES Administrator
The following options should be used only in consultation with the SES administrator:
• Custom Error Message (Options > General)
• Allow to login the boot key file automatically (Boot Control > Advanced Settings > General Settings tab)
• Enable traditional boot logon (Boot Control > Advanced Settings > General Settings tab)
• Simplified sign-on (Boot Control > Advanced Settings > General Settings tab)
• Automatically continue interrupted encryption (Boot Control > Advanced Settings > General Settings
tab)
• Communication screen, Audit Log, Certificate Validation (Options)
• On-Demand Key Provisioning and On-Demand Key Requests (Options > Media Encryption)
• Advanced Options (Options)
Options for Use with WinMagic Technical Support
The following options should be used only in consultation with WinMagic technical support:
• MBR access mode (Boot Control > Advanced Settings > General Settings tab)
• Virtual MBR (Boot Control > Advanced Settings > General Settings tab)
• Special BIOS mode (Boot Control > Advanced Settings > General Settings tab)
• Special Y mode (Boot Control > Advanced Settings > General Settings tab)
• all options on the Advanced Settings tab of the Boot Control screen
Manual Management
1. Insert the BlackArmor device in the computer. A new screen appears.
2. Click Cancel.
3. Open the Encryption Management screen (in the Control Center, click Drive Encryption, then
Encryption Management).
4. Select the BlackArmor device. It will be named HD2, HD3, or something similar (the hard disk is
always named HD1).
5. From the Action list, choose Manage BlackArmor device with key, then choose the encryption
key.
6. Click Start. A new screen appears.
7. Click OK.
8. A new screen appears.
9. If the device is in the manufactured state (no password has even been assigned), the password field
is disabled.
If the device has been managed by Maxtor, or was managed by SecureDoc but that management
has been removed, enter the most password used to manage the device.
10. Click Setup. A confirmation message appears.
2. On each computer that is to share the device, add the key file (see “Adding Users to This Computer”
on page 23)
Using the Managed Device
Once the device has been set up for SecureDoc management, when it is inserted into a SecureDoc
machine where the user is logged in to the key used to manage the device, it is automatically unlocked
(without a password being required). It may be necessary to wait for up to 30 seconds for the device to be
unlocked.
When a SecureDoc-managed device is inserted into a machine without SecureDoc, the password for the
key used to manage the device needs to be entered in the Maxtor Manager screen.
5. Ask your administrator for the key and copy it to your machine, then add it to your computer (see
“Adding Users to This Computer” on page 23).
6. Re-insert the device. It will unlock automatically.
Removing Device from SecureDoc Management
1. Before you begin, be sure you know the password associated with the key file controlling the device.
This may either be the password given when the key was created, or the password as changed
following the procedure above.
2. Open the Encryption Management screen (in the Control Center, click Drive Encryption, then
Encryption Management).
Uninstalling SecureDoc
1. At PBA, enter your username and password but press F8 (instead of Enter).
The SecureDoc Boot Configuration Menu opens.
2. Click Uninstall.
You are prompted to confirm.
3. Click Yes.
The screen will remain open for a minute, then the computer will power off. When it restarts, you
will no longer see PBA.
1. If you are acting as administrator to several users of this computer, to require users to change their
password when they first log on to SecureDoc, check the Change initial password option. Note
that users must have the Modify Password privilege to do this.
2. To set a minimum number of days for which a password must be kept, enter a value in the
Password must be retained for field. You will be prompted for a new password after that
number of days. Alternatively, set Password will expire in and indicate the number of warning
days. You will be prompted for a new password after that number of days. If you also check the
Enforce password expiry option, however, the key file will permanently expire when its
password expires. Uses will need access to a different key file containing the appropriate encryption
key to access media encrypted using the expired key file: use with caution in a single-user
environment.
Password Recovery Options
1. To prevent password hints from being available, check the Disable Password Hint option.
2. Set the minimum total length of characters used in answers to self-help authentication questions
in the For self-help password recovery... field.
3. Set the minimum number of questions a user must answer for self-help password recovery in the
For self-help password recovery... field.
Other Options
1. Set the Maximum number of passwords to be saved in the key file’s password history. New
passwords are checked against the key history file to prevent any duplicates from being created. For
example, if you set the history to 5, any new password cannot have been used in the past 5 times
the password was changed.
2. If you are using token-based key files, enter a value in the After a token-based key file’s
password... field. When doing password recovery on a token-based key file, a password-based key
file is created and used in place of the token-based key file. This option determines how long the
user can use the password determined by this process before having to run password recovery
again or switch to using a token.
Note: The password for the actual token can only be changed after the token is authenticated
and only if the token vendor supports this functionality. Password rule settings apply to all key files
created after the settings have been modified.
Method Description
SecureDoc uses the RSA keys on the token to protect the key files. During
login, SecureDoc uses the entered password to log in to the token.
SecureDoc uses the on-token RSA private key to decrypt and encrypt data.
Note that you can change the token’s password using third-party card
Method 1: Use management or PKI software; SecureDoc does not have to know that the
Token RSA Keys password has been changed. As long as the entered password can login to
the correct token with the correct RSA private key, you can log in to
SecureDoc. If the card has been lost and the card management software
can create another card and place the same encryption RSA keys on it, you
can use the new token to login to the SecureDoc key file.
If the token does not have encryption capability, use this method. The
token is used to store a “strong” PIN of 256 bits, generated randomly at
the time of creation. The PIN is used to access the key file.
During login, SecureDoc uses the entered password to log in to the token
and obtain the PIN stored in the token to access SecureDoc key files.
Method 2: Token
This method changes the tokens, thus is not recommended if the
contains PIN
enterprise relies on other third-party card management or PKI systems to
manage tokens.
For password recovery, the key file cannot be recreated. You need to
initialize a new token and create a new key file including the encryption key
used to encrypt the user’s computer.
During login, SecureDoc uses the RSA private key on the token as in
method 1.
Unlike in method 1, SecureDoc uses the certificate stored on the token to
perform the RSA public key encryption. The token must contain the
Method 3: Use certificate but it doesn't have to have the public key.
Certificate on token For password recovery, you only need to initialize a new token, make sure
the private key from the MS CA is created on the card, and give the user
the new card. The user can then restore their old token-based key file
because the token you gave them contains the private key that can decrypt
their original key file.
During login, SecureDoc uses the RSA private key on the token as in
method 1.
Unlike in method 1 and 3, SecureDoc uses the certificate from a file. This
token-based key file does not need the token to be present.
Method 4: Use
This is the preferred method for creating key files for an enterprise with
Certificate on file
PKI systems. A SecureDoc administrator can create key files for thousands
of users without having to have the tokens or the password to the tokens.
If you use this method, the interface changes to enable you to browse to
the certificate file.
Some tokens can use secret keys instead of RSA keys. You can use these
secret keys to protect the key file as well. SecureDoc needs the token
Method 5: Use
inserted when creating the key file. During login, SecureDoc uses the
Symmetric Keys
entered password to log in to the token and uses the on-token secret key to
access the SecureDoc key file.
Method Description
Method 6: Use Windows may store certificates in a particular folder. If you use this
certificate from method, users are prompted to chose from the list of certificates stored on
Windows Store their Windows computer.
Glossary
Term Definition
A key file with full privileges for an encrypted device, including the
admin key file
ability to create additional key files.
disk Includes local or network disk, RAIDs and magneto optical drives.
The process that checks the computer’s boot files to make sure they
have not been tampered with, or corrupted, on boot-up. Depending on
disk integrity check
the user’s privileges, the user may or may not be able to proceed if disk
integrity is in doubt.
Term Definition
A hint to help the user recall their password. Should not contain the
password itself, and should not contain enough information that
password hint someone other than the authorized user could guess. (For example,
“name of your first pet”.) This option is checked and cleared in
password rules.
SecureDoc Client function that uses a screen saver for added security.
The screen saver requires users to log on to their key file or, for token-
Screen Lock
based key files, to insert their token, to continue working with the
computer.
SecureDoc Client
See Control Center
Control Center
self-help password Function that enables users to recover, without administrator help,
recovery from a lost password or token.
Index
A
accessing wirelessly 11
automatic encryption
removable media, container 47
removable media, FDE 45
B
decrypting
removable media 45
decryption 9
disk access
conditions for locking or monitoring 26
drives, viewing encryption status of 39
DriveTrust passwords, backing up 36
DriveTrust passwords, protecting 36
encrypting
removable media 45
encryption
initial 9
viewing status of 39
encryption keys
export and view privileges 15
privileges 15
export and view key privilege 15
Export HWE File 36
F
initial encryption 9
K
key file
backup 10
changing password 34, 36
key files
about 8
keys
about 8
L
locked computer 12
locking
conditions for 26
logo, Boot Logon, customizing 30
M
password
changing 34, 36
privilege 15
password recovery
expiry of password 60
password rules 59
about 9
password security policy 59
password synchronization 12
passwords, protecting 36
PBA 11
privilege
convert 15
export and view key 15
modify key 15
modify password 15
modify profile 15
select profile 15
protection methods 61
protection, TPM 31
R
recovery media
about 10
using 36
removable media
about 42
enabling 42
encrypting 45
settings 43
removable media container
accessing 48
removable media FDE
accessing encrypted 47
decrypting 47
removing media
decrypting 45
removing SecureDoc 41
S
SecureDoc OSA 57
SED users 57
select profile privilege 15
self-help answers, changing 35
single sign-on 12
T
TPM protection 31
U
uninstalling
SecureDoc 41
USB drive, blocking access to 25
W
wireless access 11
write access, preventing 25