Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

What's New in PGP Desktop for Windows Version 10.1
What's New in PGP Desktop 10.1
Using this Guide
“Managed” versus “Unmanaged” Users
Conventions Used in This Guide
Who Should Read This Document
About PGP Desktop Licensing
Licensing PGP Desktop for Windows
Checking License Details
If Your License has Expired
Getting Assistance
Getting product information
Contact Information
2 PGP Desktop Basics
PGP Desktop Terminology
PGP Product Components
Terms Used in PGP Desktop
Conventional and Public Key Cryptography
Using PGP Desktop for the First Time
3 Installing PGP Desktop
Before You Install
System Requirements
Citrix and Terminal Services Compatibility
Installing and Configuring PGP Desktop
Installing the Software
Upgrading the Software
Licensing PGP Desktop
Running the Setup Assistant
Uninstalling PGP Desktop
To uninstall PGP Desktop
Moving Your PGP Desktop Installation From One Computer to Another
4 The PGP Desktop User Interface
Accessing PGP Desktop Features... 27
Accessing PGP Desktop Features
The PGP Desktop Main Screen
Using the PGP Tray Icon
Using Shortcut Menus in Windows Explorer
Using the Start Menu
PGP Desktop Notifier alerts
PGP Desktop Notifier for Messaging
PGP Desktop Notifier for Disk features
Enabling or Disabling Notifiers
Viewing the PGP Log
5 Working with PGP Keys
Viewing Keys
Creating a Keypair
Passwords and Passphrases
Protecting Your Private Key
Protecting Keys and Keyrings
Backing up Your Private Key
To back up your private key
What if You Lose Your Key?
Distributing Your Public Key
Placing Your Public Key on a Keyserver
Including Your Public Key in an Email Message
To include your public key in an email message
Exporting Your Public Key to a File
Copying from a Smart Card Directly to Someone’s Keyring
Getting the Public Keys of Others
Getting Public Keys from a Keyserver
Getting Public Keys from Email Messages
Working with Keyservers
Using Master Keys
Adding Keys to the Master Key List
To add keys to the Master Key List
Deleting Keys from the Master Key List
6 Managing PGP Keys
Examining and Setting Key Properties
Working With Photographic IDs
Managing User Names and Email Addresses on a Key
Importing Keys and X.509 Certificates
Using the Import Certificate Assistant
Importing X.509 Certificates Included in S/MIME Email Messages
Changing Your Passphrase
Deleting Keys, User IDs, and Signatures
Disabling and Enabling Public Keys
Verifying a Public Key
Signing a Public Key
Revoking Your Signature from a Public Key
Granting Trust for Key Validations
Working with Subkeys
Using Separate Subkeys
Viewing Subkeys
Creating New Subkeys
Specifying Key Usage for Subkeys
Revoking Subkeys
Removing Subkeys
Working with ADKs
Adding an ADK to a Keypair
Updating an ADK
Removing an ADK
Working with Revokers
Appointing a Designated Revoker
Revoking a Key
Splitting and Rejoining Keys
Creating a Split Key
Rejoining Split Keys
If You Lost Your Key or Passphrase
Reconstructing Keys with PGP Universal Server
Creating Key Reconstruction Data
Reconstructing Your Key if You Lost Your Key or Passphrase
Protecting Your Keys
7 Securing Email Messages
How PGP Desktop Secures Email Messages ... 83
How PGP Desktop Secures Email Messages
Incoming Messages
Verifying Signatures on Incoming Messages
Understanding Annotations on Incoming Messages
Outgoing Messages
Securing Sent Items on IMAP Email Servers
Sending MAPI Email with Microsoft Outlook
Using the Sign and Encrypt Buttons in Microsoft Outlook
Using Offline Policy
Services and Policies
Viewing Services and Policies
To view services and policies
Creating a New Messaging Service
Editing Messaging Service Properties
Disabling or Enabling a Service
Deleting a Service
Multiple Services
Troubleshooting PGP Messaging Services
Creating a New Security Policy
To create a new security policy
Regular Expressions in Policies
Editing a Mailing List Policy
Deleting a Security Policy
Changing the Order of Policies in the List
PGP Desktop and SSL
Key Modes
Determining Key Mode
Changing Key Mode
8 Securing Instant Messaging
About PGP Desktop’s Instant Messaging Compatibility ... 125
About PGP Desktop’s Instant Messaging Compatibility
Instant Messaging Client Compatibility
About the Keys Used for Encryption
Encrypting your IM Sessions
9 Viewing Email with PGP Viewer
Overview of PGP Viewer
Compatible Email Clients
Opening an Encrypted Email Message or File
Copying Email Messages to Your Inbox
Exporting Email Messages
Specifying Additional Options
Specifying Options in PGP Viewer
Security Features in PGP Viewer
10 Protecting Disks with PGP Whole Disk Encryption
About PGP Whole Disk Encryption
How does PGP WDE Differ from PGP Virtual Disk?
Licensing PGP Whole Disk Encryption
License Expiration
Using PGP Remote Disable and Destroy
Prepare Your Disk for Encryption
Supported Disk Types
Unsupported Disk Types
Supported Keyboards
Ensure Disk Health Before Encryption
Calculate the Encryption Duration
Maintain Power Throughout Encryption
Run a Pilot Test to Ensure Software Compatibility
Determining the Authentication Method for the Disk
Passphrase and Single Sign-On Authentication
Public Key Authentication
Token-Based Authentication
Two-Factor Authentication Using a USB Flash Device
Trusted Platform Module (TPM) Authentication
Setting Encryption Options
Partition-Level Encryption
Preparing a Smart Card or Token to Use For Authentication
Using PGP Whole Disk Encryption Options
Encrypting a Disk or Partition
Supported Characters for PGP WDE Passphrases
Encrypting the Disk
Encountering Disk Errors During Encryption
Using a PGP WDE-Encrypted Disk
Authenticating at the PGP BootGuard Screen
Selecting Keyboard Layouts
Using PGP WDE Single Sign-On
Prerequisites for Using Single Sign-On
Encrypting the Disk to Use Single Sign-On
To encrypt the disk to use Single Sign-On
Multiple Users and Single Sign-On
Logging in with Single Sign-On
Changing Your Passphrase With Single Sign-On
Displaying the Windows Login dialog box
Maintaining the Security of Your Disk
Getting Disk or Partition Information
Using the Bypass Feature
Adding Other Users to an Encrypted Disk or Partition
Deleting Users From an Encrypted Disk or Partition
To remove a user from an encrypted disk or partition
Re-Encrypting an Encrypted Disk or Partition
If you Forgot Your Passphrase
Backing Up and Restoring
Uninstalling PGP Desktop from Encrypted Disks or Partitions
Working with Removable Disks
Encrypting Removable Disks
Using Locked (Read-Only) Disks as Read-Only
Moving Removable Disks to Other Systems
Reformatting an Encrypted Removable Disk
Using PGP WDE in a PGP Universal Server-Managed Environment
PGP Whole Disk Encryption Administration
Creating a Recovery Token
Using a Recovery Token
Recovering Data From an Encrypted Drive
Creating and Using Recovery Disks
Decrypting a PGP WDE-Encrypted Disk
Special Security Precautions Taken by PGP Desktop
Passphrase Erasure
Virtual Memory Protection
Hibernation vs Standby
Memory Static Ion Migration Protection
Other Security Considerations
Using the Windows Preinstallation Environment
Using PGP Whole Disk Encryption with IBM Lenovo ThinkPad Systems
Using PGP Whole Disk Encryption with the Microsoft Windows XP Recovery Console
11 Using PGP Virtual Disks
About PGP Virtual Disks
Creating a New PGP Virtual Disk
To create a new PGP Virtual Disk
Viewing the Properties of a PGP Virtual Disk
Finding PGP Virtual Disks
Using a Mounted PGP Virtual Disk
Mounting a PGP Virtual Disk
Unmounting a PGP Virtual Disk
Compacting a PGP Virtual Disk
To compact a PGP Virtual Disk
Re-Encrypting PGP Virtual Disks
To re-encrypt a PGP Virtual Disk
Working with Alternate Users
Adding Alternate User Accounts to a PGP Virtual Disk
To add alternate user accounts to a PGP Virtual Disk
Deleting Alternate User Accounts from a PGP Virtual Disk
Disabling and Enabling Alternate User Accounts
Changing Read/Write and Read-Only Status
Granting Administrator Status to an Alternate User
Changing User Passphrases
Deleting PGP Virtual Disks
Maintaining PGP Virtual Disks
Mounting PGP Virtual Disk Volumes on a Remote Server
Backing up PGP Virtual Disk Volumes
Exchanging PGP Virtual Disks
The PGP Virtual Disk Encryption Algorithms
Special Security Precautions Taken by PGP Virtual Disk
12 Creating and Accessing Mobile Data with PGP Portable
Creating PGP Portable Disks
Creating a PGP Portable Disk from a Folder
To create a PGP Portable Disk from a folder
Creating a PGP Portable Disk from a Removable USB Device
To create a PGP Portable Disk from a removable USB device
Creating Read/Write or Read-Only PGP Portable Disks
Accessing Data on a PGP Portable Disk
Changing the Passphrase for a PGP Portable Disk
Unmounting a PGP Portable Disk
To unmount a PGP Portable Disk
13 Using PGP NetShare
About PGP NetShare
PGP NetShare Roles
Licensing PGP NetShare
Authorized User Keys
Establishing a PGP NetShare Admin (Owner)
"Blacklisted" and "Whitelisted" Files, Folders, and Applications
“Blacklisted” and Other Files You Cannot Protect
"Blacklisted" and "Whitelisted" Folders Specified by PGP Universal Server
Application-based Encryption and Decryption Bypass Lists
Working with Protected Folders
Choosing the Location for a Protected Folder
Creating a New PGP NetShare Protected Folder
Using Files in a PGP NetShare Protected Folder
Unlocking a Protected Folder
Determining the Files in a Protected Folder
Adding Subfolders to a Protected Folder
Checking Folder Status
Copying Protected Folders to Other Locations
Working with PGP NetShare Users
Adding a PGP NetShare User
Changing a User's Role
Deleting a User from a Protected Folder
Importing PGP NetShare Access Lists
Working with Active Directory Groups
Setting up PGP NetShare to Work with Groups
To set up PGP NetShare to work with groups
Refreshing Groups
Decrypting PGP NetShare-Protected Folders
Re-Encrypting a Folder
Clearing a Passphrase
Protecting Files Outside of a Protected Folder
Backing Up PGP NetShare-Protected Files
Accessing PGP NetShare Features using the Shortcut Menu
PGP NetShare in a PGP Universal Server-managed Environment
Accessing the Properties of a Protected File or Folder
Using the PGP NetShare Menus in PGP Desktop
The File Menu
The Edit Menu
The NetShare Menu
14 Using PGP Zip
Creating PGP Zip Archives
Encrypting to Recipient Keys
Encrypting with a Passphrase
Creating a PGP Self-Decrypting Archive (SDA)
Creating a Sign Only Archive
Opening a PGP Zip Archive
To open a PGP Zip Archive
Opening a PGP Zip SDA
Editing a PGP Zip Archive
To edit a PGP Zip archive
Verifying Signed PGP Zip Archives
15 Shredding Files with PGP Shredder
Using PGP Shredder to Permanently Delete Files and Folders ... 265
Using PGP Shredder to Permanently Delete Files and Folders
Shredding Files using the PGP Shredder Icon on Your Desktop
To shred files using the PGP Shredder icon on your Desktop
Shredding Files From Within PGP Desktop
Shredding Files in Windows Explorer
Using the PGP Shred Free Space Assistant
Scheduling Free Space Shredding
To schedule free space shredding
16 Storing Keys on Smart Cards and Tokens
About Smart Cards and Tokens
Copying a Keypair from Your Keyring to a Smart Card
Wiping Keys from Your Smart Card
Using Multiple Smart Cards
Special-Use Tokens
Configuring the Aladdin eToken
A Setting PGP Desktop Options
Accessing the PGP Options dialog box ... 283
Accessing the PGP Options dialog box
General Options
Messaging Options
Proxy Options
PGP NetShare Options
Disk Options
Notifier Options
Advanced Options
B Working with Passwords and Passphrases
Choosing whether to use a password or passphrase ... 305
Choosing whether to use a password or passphrase
The Passphrase Quality Bar
Creating Strong Passphrases
What if You Forget Your Passphrase?
C Using PGP Desktop with PGP Universal Server
For PGP Administrators
Manually binding to a PGP Universal Server
D Using PGP Desktop with IBM Lotus Notes
About Lotus Notes and MAPI Compatibility... 315
About Lotus Notes and MAPI Compatibility
Using PGP Desktop with Lotus Notes
Sending email to recipients inside your Lotus Notes organization
Sending email to recipients outside your Lotus Notes organization
Binding to a PGP Universal Server
Manual Binding
Notes Addresses
Notes Client Settings
The Notes.ini Configuration File
Using Lotus Notes Native Encryption
0 of .
Results for:
No results containing your search query
P. 1
PgpDesktopWin1011 UG En

PgpDesktopWin1011 UG En

Ratings: (0)|Views: 1,316|Likes:
Published by rakeshkranjan

More info:

Published by: rakeshkranjan on Jun 28, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 7 to 8 are not shown in this preview.
You're Reading a Free Preview
Pages 15 to 121 are not shown in this preview.
You're Reading a Free Preview
Pages 128 to 285 are not shown in this preview.
You're Reading a Free Preview
Pages 292 to 297 are not shown in this preview.
You're Reading a Free Preview
Pages 304 to 341 are not shown in this preview.

Activity (3)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Ivica Simic liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->