[PGP] Encryption Server 3.3.2 安裝

1.   解壓縮「SymantecEncryptionWeb3.3.2MP11Full.zip」。

image

 

2.   打開「Symantec Encryption Server」,可看到一個 ISO 檔案。

image

 

3.   掛載之後,進行安裝,輸入鍵盤「Enter」。

image

 

4.   選擇「Continue」,接著輸入鍵盤「Enter」。

image

 

5.   輸入「IP Address」、「Netmask」,接著選取「OK」,接著輸入鍵盤「Enter」。

image

 

6.   輸入「Gateway」、「Primary DNS」、「Secondary DNS」,接著輸入鍵盤「Enter」。

image

7.   輸入「Hostname」,必須為FQDN,接著輸入鍵盤「Enter」。

image

 

8.   安裝中。

image

image

image

image

 

9.    安裝完成,請登入下列網址。

image

 

10.   點選畫面中間下面「箭頭」。

image

 

11.   將「License Agreement」拉至最底,點選「I Agree」。

image

 

12.   點選「New Installation」,接著點選畫面右下角箭頭。

image

 

13.   輸入時區相關資訊,接著點選畫面右下角箭頭。

image

 

14.   確認資料無誤後,接著點選畫面右下角箭頭。

image

 

15.   確認上述資訊無誤,接著點選「Done」。

image

 

16.   Server 重新啟動中,並且使用新的 URL 登入系統。

image

 

17.   輸入「License Number」,勾選「Enable Mail Proxies」(若僅使用全硬碟加密可不勾選)接著點選畫面右下角箭頭。

image

 

18.   輸入密碼(需符合複雜度原則),輸入Email,接著點選畫面右下角箭頭。

image

 

19.   選取模式,接著點選畫面右下角箭頭。(若啟用 Enable Mail Proxies 需設定)

image

 

20.   輸入「Mail Server」、「Primary Domain」,接著點選畫面右下角箭頭。(若啟用 Enable Mail Proxies 需設定)

image

 

21.   設定「Primary Domain」,接著點選畫面右下角箭頭。(若無啟用 Enable Mail Proxies 需設定)

image

 

22.  點選「Skip」。(啟用 Enable Mail Proxies 才需設定)

image

 

23.   點選「Backup Key」。

image  

 

24.   儲存 Key。

image

 

25.   備份 Key 完成後,接著點選畫面右下角箭頭。

image

 

26.   安裝完成,點選「Done」。

image

image

 

27.   重新啟動中。

image

image

 

28.   輸入剛剛安裝時所設定的帳號密碼、接著點選「Login」。

image

 

29.   登入系統。

image

image

Symantec Drive Encryption (Managed by SMES) upgrade to 3.3.2 MP10 issue

Our company used the Symantec Drive Encryption (managed by Symantec Encryption Management Server (SEMS) and integrate with AD authentication and single sign on).

We always upgrad the Symantec Encryption Management Server (SEMS) to the latest version and it almost works normally.

This time we upgrad the Symantec Encryption Management Server (SEMS) to the (3.3.2 MP10) version.

We found if we install a new PC and use the user account (existed in SEMS) to enroll to the SEMS and the Encryption Deaktop Setup Assistant wizard asked to enter the passphrase.

But we can not enter the current domain password (it display “The passprase did not match of the key” ).

It must enter the old domain password (when the user account enrolled to the SEMS first time).

clip_image001

If we didn’t enter the match passphrase we can not press next button.

clip_image002

clip_image003

clip_image004

We refered to the URL below.

It says:

If using Silent Enrollment, we recommend using SKM mode only. Otherwise, a GKM key will be created, using their current Windows passphrase when they first enroll, but the passphrase on that key will not change, so after several Windows passphrase changes, the user will likely not remember the GKM key passphrase.

So we unchecked the Guarded Key Mode (GKM) in the key mode setting Under the LAB and the issue solved.

http://www.symantec.com/connect/forums/single-user-issue-multiple-machines

clip_image006

The key mode change to CKM.

clip_image007

1.We want to know why the (3.3.2 MP10) version has this issue?

Our company used the Symantec Drive Encryption (managed by Symantec Encryption Management Server (SEMS) and integrate with AD authentication and single sign on).

【We use the GKM mode】

If we install a new PC and use the user account (existed in SEMS) to enroll to the SEMS and the Encryption Deaktop Setup Assistant wizard asked to enter the passphrase.

The passphrase must be the original one,not the current domain password.

clip_image001

(1) In ( 3.3.2 MP10 )

It display “The passprase did not match of the key”.

And we can not press 【next】 to ignore it,and we can not do any configuration on PGP client.

image

(2) In ( 3.3.2 MP7 and earlier version )

It display “The passprase did not match of the key”.

But we can press 【next】 to ignore it,so we can encrypt th disk.

image

(3) If we unchecked the GKM then the user key change to CKM.

We install a new PC and use the user account (existed in SEMS) to enroll to the SEMS .

It doesn’t ask to enter the passphrase.

We don’t unchecked the GKM in the production environment because we are not sure what effects will be occured.

clip_image006

2.What different between check and uncheck the Guarded Key Mode (GKM)?

3.Any effects if we uncheck the Guarded Key Mode (GKM) in the production environment?

4.What is the correct setting for our environment?

【Information form Symantec Connect】

https://www-secure.symantec.com/connect/forums/symantec-drive-encryption-managed-smes-upgrade-332-mp10-issue#comment-form

1. During initial enrollment the users domain password is not used in GKM key mode. The PGP key and passphrase do not have the ability to use SSO(single sign on), the passphrase is assigned to the key in GKM mode when the user manually types their passphrase in the key generation wizard box. This passphrase for the PGP key does not sync with users Windows passwords. If you want to change the passphrase you must do so manually by selecting Symantec Encryption Desktop>PGP Key> Select the key>Change passphrase. It will ask for the old passphrase if it’s not cached and then it will let you update the passphrase. 

2. If you are only using Symantec Drive Encryption for your environment, then I would suggest using SKM key mode as this keymode requires that the users don’t need to maintain and remember their passphrase. The Server manages the key and never asks for a passphrase to use these keys. PGP keys have nothing to do with Symantec Drive Encryption unless you manually put them on a Smart Card or Token and then use that for authentication. By default Symantec Drive Encryption uses passphrase user for access and doesn’t require a PGP key to do the intial encryption.

I would recommend you open a support ticket so they can help you figure out a solution to get the users off of GKM key mode. GKM keymode will be problematic since the users don’t use the PGP key. They will forget the passphrase and you will run into an issue attempting to re-enroll or enroll on new machines. I always recommend SKM keymode for Drive Encryption only environments. 

I would not recommend you just select CKM keymode since it’s not fixing the issue. It will just add to the confusion in the future. The user will have a keypair that they don’t know or remember the passphrase. There are certain operations that require the users know the passphrase to function properly. I’m very suprised that the enrollment wizard allows you to bypass this section without knowing the passphrase to the key even in CKM mode. That seems like a defect to me since the users will have broken keys if they don’t know the passphrase. 

PGP 憑證過期

1.登入 PGP 主控台,【System】→【Network】→【Certificates】

clip_image001

2.【Add Certificates】

clip_image002

3.輸入憑證相關資訊 ( Expiration 請下拉選擇 5 年 ) 並按下【Generate Self-signed】

clip_image003

4.這是新增的憑證

clip_image004

5.回到 【System】→【Network】→【Assigned Certificate】,下拉選擇到期日最久的憑證,並按下【Save】

clip_image005

6.PGP 正重啟以套用變更

image

7.重新登入即可

image

8.之後用戶端會出現以下畫面,請按下【Always Allow for This Site】

image

【如何收到 PGP Universal Server Backup log 的 mail 通知】

【如何收到 PGP Universal Server Backup log 的 mail 通知】

請編輯 /etc/crontab

在 crontab 加入以下命令

這樣每天 19:05 administrator@elite2003.intra 會收到當日的 Backup log

5 19 * * 0 root mail -s “PGP Backup jobs" administrator@elite2003.intra < $(find “/var/log/ovid" -type f -name “backup-*"|sort -r|head -n1)

5 19 * * 1 root mail -s “PGP Backup jobs" administrator@elite2003.intra < $(find “/var/log/ovid" -type f -name “backup-*"|sort -r|head -n1)

5 19 * * 2 root mail -s “PGP Backup jobs" administrator@elite2003.intra < $(find “/var/log/ovid" -type f -name “backup-*"|sort -r|head -n1)

5 19 * * 3 root mail -s “PGP Backup jobs" administrator@elite2003.intra < $(find “/var/log/ovid" -type f -name “backup-*"|sort -r|head -n1)

5 19 * * 4 root mail -s “PGP Backup jobs" administrator@elite2003.intra < $(find “/var/log/ovid" -type f -name “backup-*"|sort -r|head -n1)

5 19 * * 5 root mail -s “PGP Backup jobs" administrator@elite2003.intra < $(find “/var/log/ovid" -type f -name “backup-*"|sort -r|head -n1)

5 19 * * 6 root mail -s “PGP Backup jobs" administrator@elite2003.intra < $(find “/var/log/ovid" -type f -name “backup-*"|sort -r|head -n1)

clip_image001

clip_image002

1.【如何確認 PGP 硬碟加密目前是採用 DES-128 或 DES-256】2. 【若將 PGP 硬碟加密政策由目前的 DES-256 改為 DES-128,該硬碟是否需先行解密後再進行加密】

【如何確認 PGP 硬碟加密目前是採用 DES-128 或 DES-256】

【若將 PGP 硬碟加密政策由目前的 DES-256 改為 DES-128,該硬碟是否需先行解密後再進行加密】

以上問題可參考官網 https://support.symantec.com/en_US/article.TECH224377.html

【如何確認 PGP 硬碟加密目前是採用 DES-128 或 DES-256】

請參考下圖於用戶端執行以下指令:

【64 位元電腦請切換至以下目錄】

C:\Program Files (x86)\PGP Corporation\PGP Desktop

【32 位元電腦請切換至以下目錄】

C:\Program Files\PGP Corporation\PGP Desktop

再執行

pgpwde –status –disk 0 –xml |find “alg”

※ for Mac → 執行 pgpwde –status –disk 0 –xml

image

在輸出的結果中,找到以下數值,若 alg=”9” 則該硬碟採用 DES-256 加密,若 alg=”7” 則該硬碟採用 DES-128 加密

<currentkey valid=”true” alg=”9”>

clip_image001

【若將 PGP 硬碟加密政策由目前的 DES-256 改為 DES-128,該硬碟是否需先行解密後再進行加密】

是的,請參考下方程序

clip_image002

clip_image003

有關 PGP logs 的 purge

1.  How long will the Symantec Encryption Management Server purge the logs?
The SEMS purge the logs in 1months time.

2. Where can I set the purge interval and find the logs percentage of hard disk usage?
You can set the purge time of the logs in the crontab.


In /etc/crontab edit the line

0 0 * * * root /usr/bin/pgpdellog.pl —days=30 /var/log/ovid >& /dev/null

and either change it to the desired value (–days=XX)

or comment the entry completely if the logs may not be deleted.
(by adding a # in front)

Depending on the requirements another solution might be to retain regular backups (which also contain the logfiles).


3. Location of the logs are available at 2 places1

(1) /var/log/ – General system logs
(2) /var/log/ovid/ – pgp process logs

4.If you want to list the size of the folder size please use
du -sh* or du -sh /var/log/ovid

You can use winscp to copy the logs from the linux machine to the windows and then delete the logs manually from the specifc location as mentioned above.
Please do not delete the parent location but only the logs inside the parent folder
.

PGP Universal server GROUP 的 Membership 如何關聯 AD 的 OU

PGP Universal server GROUP 的 Membership 如何關聯 AD 的 OU

方式如下:

一、

1. Attribute 欄位請輸入【OU】【distinguishedName】

2. Value 欄位請輸入OU 的 值或關鍵字,例如:【OU=PGP_OU_2】

3. 一定要勾選【Regular Expression】

image

image

二、

1. Attribute 欄位請輸入【distinguishedName】

2. Value 欄位請輸入OU 的 DN name,例如:【OU=PGP_OU_2,OU=PGP_OU,DC=elite2003,DC=intra】

3. 一定要勾選【Regular Expression】

clip_image002

OU 的參考範例

clip_image004

【PGP msi 派送與用戶端註冊 ( 測試成功之…..細部設定 )】

【PGP  msi 派送與用戶端註冊 ( 測試成功 )】

需要整合 AD 驗證,也用到 memberOf 這個屬性,這樣 user 才不會跑到 default group,也就不會沒套到 silent Enrollment

clip_image015

clip_image016

1. 我今天透過群組原則的【軟體安裝】(套在電腦上,這樣沒有安裝權限的問題)

clip_image017

2. 重開機後,會發現用戶端機器開機後,沒有到登入畫面就又重開了 ( 因為剛剛套用群組原則,安裝了 PGP client msi後隨即重開機 )

所以,【第一部分 (PGP client msi 安裝)】就自動做好了

3. 重開機後,只要進行以下兩個畫面

clip_image018

clip_image019

然後就自己做加密了

clip_image020

 

【詳細的設定如下】

1. 先建立一個安全性通用群組

2. 然後將要使用 PGP Full Disk 的 user 通通加入此群組

clip_image001

該LAB gseo_group 的 CN name 如下:

CN=gseo_group,OU=PGP_GSEO,DC=elite2003,DC=intra

3. 接著,請至【Consumers】→【Group】→【找到要修改屬性的群組 或 新建一個群組】雙按此群組

clip_image002

4. 點按下方的【Group Settings】

clip_image003

5. 點選【Membership】

勾選【Match Consumers Via Directory Synchronization】

選擇【If all of the following apply】

Attribute 輸入 【memberOf】,Value 輸入【Group 的 CN name】

CN=gseo_group,OU=PGP_GSEO,DC=elite2003,DC=intra

clip_image004

或是

1. Attribute 欄位請輸入【OU】

2. Value 欄位請輸入OU 的 值或關鍵字,例如:【OU=PGP_OU_2】

3. 一定要勾選【Regular Expression】

image

image

6. 參考以下網頁,確認 AD 整合驗證的相關設定

http://www.wellife.com.tw/symantec/?p=4679

重點如下

(1) 確認使用 AD 驗證

clip_image005

clip_image006

(2) 確認註冊是採用 silent 模式

clip_image007

clip_image008

clip_image009

(3) 確認全硬碟加密的 policy 設定

clip_image010

(4)

clip_image011這個不要勾選

clip_image012

(5) 確認上方 policy 是套用給該 group

clip_image013

群組原則中 32位元的軟體封裝,不要勾選【讓這個32位元x86應用程式可以在win65電腦上執行】

clip_image014

PGP Universal integrated with AD

PGP Universal integrated with AD

 

請先 Enable Directory Synchronization

clip_image002

按下左下方【Settings】

image

勾選【Enroll clients using directory authentication】來整合 AD 驗證

image

按下【Add LDAP Directory】

image

name:給予一個 LDAP 識別名稱 (例如:elite2003.intra)

Type:如果是 AD 就選 (Active Directory)

LDAP Credentialsl: 輸入 AD 使用者名稱與帳號密碼

[Bind DN]:請輸入AD帳戶,格式範例 (CN=Administrator,CN=Users,DC=elite2003,DC=intra)

[Passphrase]:請輸入AD帳戶的密碼

Hostname:輸入 AD 主機名稱或 IP (2003.elite2003.intra)

port :(389)

Protocol: (LDAP)

然後按下【Test Connection】確認連線正常

clip_image004

按下【Browse Base DNs】來定義 Base DN 搜尋範圍

image

按下【View Sample Records】來確認有撈到使用者

clip_image008

有撈到使用者

clip_image010

在 Group Setting 中定義 Group Membership

例如:

Attribute:(memberOf)

Value:( CN=pgp_group,OU=PGP_OU,DC=elite2003,DC=intra)

clip_image012

勾選【Enable Silent Enrollment】

image

允許 Single Sign-On

clip_image014

之後就可以下載用戶端安裝程式來安裝

image