Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

What's New in PGP Desktop for Windows Version 9.7...1
What's New in PGP Desktop for Windows Version 9.7
1 About PGP Desktop 9.7 for Windows
PGP Desktop General Features
PGP Whole Disk Encryption Features
PGP NetShare Features
PGP Desktop Email Features
Using this Guide
“Managed” versus “Unmanaged” Users
Conventions Used in This Guide
Who Should Read This Document
About PGP Desktop Licensing
Checking License Details
Getting Assistance
Getting product information
Contacting Technical Support
PGP Desktop Terminology...13
PGP Desktop Terminology
PGP Product Components
2 PGP Desktop Basics
Terms Used in PGP Desktop
Conventional and Public Key Cryptography
Learning More About Cryptography
Using PGP Desktop for the First Time
Uninstalling PGP Desktop...24
Before You Install
System Requirements
3 Installing PGP Desktop
Installing and Configuring PGP Desktop
Installing the Software
Upgrading the Software
Upgrading From Standalone to Managed PGP Desktop Builds
Running the Setup Assistant
Uninstalling PGP Desktop
Moving Your PGP Desktop Installation From One Computer to Another
Accessing PGP Desktop Features...27
Accessing PGP Desktop Features
4 The PGP Desktop User Interface
The PGP Desktop Main Screen
Using the PGP Tray Icon
Using Shortcut Menus in Windows Explorer
Using the Start Menu
PGP Desktop Notifier alerts
PGP Desktop Notifier for Messaging
PGP Desktop Notifier for Disk features
Enabling or Disabling Notifiers
Viewing the PGP Desktop Log
To view the PGP Desktop Log
Viewing Keys
5 Working with PGP Keys
Distributing Your Public Key
Placing Your Public Key on a Keyserver
Including Your Public Key in an Email Message
To include your public key in an email message
Exporting Your Public Key to a File
Copying from a Smart Card Directly to Someone’s Keyring
Getting the Public Keys of Others
Getting Public Keys from a Keyserver
Getting Public Keys from Email Messages
Working with Keyservers
Using Master Keys
Adding Keys to the Master Key List
To add keys to the Master Key List
Deleting Keys from the Master Key List
Examining and Setting Key Properties...57
Examining and Setting Key Properties
6 Managing PGP Keys
Adding and Removing Photographic IDs
Managing User Names and Email Addresses on a Key
Importing Keys and X.509 Certificates
Using the Import Certificate Assistant
To import a certificate using the Import Certificate Assistant
Changing Your Passphrase
Deleting Keys, User IDs, and Signatures
Disabling and Enabling Public Keys
Verifying a Public Key
Signing a Public Key
Revoking Your Signature from a Public Key
Granting Trust for Key Validations
Working with Subkeys
Using Separate Subkeys
Viewing Subkeys
Creating New Subkeys
Revoking Subkeys
Removing Subkeys
Working with ADKs
Adding an ADK to a Keypair
Updating an ADK
Removing an ADK
Working with Revokers
Appointing a Designated Revoker
Revoking a Key
Splitting and Rejoining Keys
Creating a Split Key
Rejoining Split Keys
If You Lost Your Key or Passphrase
Reconstructing Keys with PGP Universal
Reconstructing Keys in a Standalone Installation
Resetting Your Passphrase
Protecting Your Keys
How PGP Desktop Secures Email Messages...89
How PGP Desktop Secures Email Messages
7 Securing Email Messages
Incoming Messages
Outgoing Messages
Services and Policies
Viewing Services and Policies
To view services and policies
Creating a New Messaging Service
Editing Messaging Service Properties
Disabling or Enabling a Service
Deleting a Service
Multiple Services
Troubleshooting PGP Messaging Services
Creating a New Security Policy
To create a new security policy
Editing a Mailing List Policy
Deleting a Security Policy
Changing the Order of Policies in the List
PGP Desktop and SSL
Key Modes
Determining Key Mode
Changing Key Mode
About PGP Desktop’s Instant Messaging Support...123
About PGP Desktop’s Instant Messaging Support
8 Securing Instant Messaging
Instant Messaging Client Compatibility
About the Keys Used for Encryption
Encrypting your IM Sessions
9 Protecting Disks with PGP Whole Disk Encryption
About PGP Whole Disk Encryption...128
About PGP Whole Disk Encryption
How does PGP Whole Disk Encryption Differ from PGP Virtual Disk?
Licensing PGP Whole Disk Encryption
License Expiration
Prepare Your Disk for Encryption
Supported Disk Types
Ensure Disk Health Before Encryption
Creating Recovery Disks
Calculate the Encryption Duration
Maintain Power Throughout Encryption
Run a Pilot Test to Ensure Software Compatibility
Determining the Authentication Method for the Disk
Passphrase and Single Sign-On Authentication
Public Key Authentication
Token-Based Authentication
Trusted Platform Module (TPM) Authentication
Setting Encryption Options
Partition-Level Encryption
Preparing a Smart Card or Token to Use For Authentication
Using PGP Whole Disk Encryption Options
Encrypting a Disk or Partition
Supported Characters for PGP WDE Passphrases
Encrypting the Disk
Encountering Disk Errors During Encryption
Using a PGP WDE-Encrypted Disk
Authenticating at the PGP Bootguard Screen
Selecting Keyboard Layouts
Using PGP WDE Single Sign-On
Prerequisites for Using Single Sign-On
Encrypting the Disk to Use Single Sign-On
To encrypt the disk to use Single Sign-On
Multiple Users and Single Sign-On
Logging in with Single Sign-On
Changing Your Passphrase With Single Sign-On
Displaying the Windows Login dialog box
Maintaining the Security of Your Disk
Getting Disk or Partition Information
Using the Bypass Feature
Adding Other Users to an Encrypted Disk or Partition
Deleting Users From an Encrypted Disk or Partition
To remove a user from an encrypted disk or partition
Re-Encrypting an Encrypted Disk or Partition
To re-encrypt an encrypted disk or partition
Using Automatic Backup Software on a PGP WDE-Encrypted Disk
Uninstalling PGP Desktop from Encrypted Disks or Partitions
Working with Removable Disks
Encrypting Removable Disks
Moving Removable Disks to Other Systems
Reformatting an Encrypted Removable Disk
Using PGP-WDE in a PGP Universal-Managed Environment
PGP Whole Disk Encryption Administration
Creating a Recovery Token
10 Using PGP Virtual Disks
About PGP Virtual Disks
Creating a New PGP Virtual Disk
To create a new PGP Virtual Disk
Viewing the Properties of a PGP Virtual Disk
Finding PGP Virtual Disks
Using a Mounted PGP Virtual Disk
Mounting a PGP Virtual Disk
Deleting PGP Virtual Disks
Maintaining PGP Virtual Disks
Mounting PGP Virtual Disk Volumes on a Remote Server
Backing up PGP Virtual Disk Volumes
Exchanging PGP Virtual Disks
The PGP Virtual Disk Encryption Algorithms
Special Security Precautions Taken by PGP Virtual Disk
Passphrase Erasure
Virtual Memory Protection
Memory Static Ion Migration Protection
Other Security Considerations
About PGP NetShare
11 Using PGP NetShare
PGP NetShare Roles
Licensing PGP NetShare
Authorized User Keys
Establishing a PGP NetShare Admin (Owner)
Working with Protected Folders
Choosing the Location for a Protected Folder
Creating a New PGP NetShare Protected Folder
Using Files in a PGP NetShare Protected Folder
Unlocking a Protected Folder
To unlock a Protected Folder
Determining the Files in a Protected Folder
Adding Subfolders to a Protected Folder
Checking Folder Status
Copying Protected Folders to Other Locations
Working with Authorized Users
Adding a PGP NetShare User
Changing a User's Role
Deleting a User from a Protected Folder
Importing PGP NetShare Access Lists
Working with Active Directory Groups
Setting up PGP NetShare to Work with Groups
To set up PGP NetShare to work with groups
Refreshing Groups
Removing a Folder
Re-Encrypting a Folder
Clearing a Passphrase
Protecting Files Outside of a Protected Folder
Accessing PGP NetShare Features using the Shortcut Menu
PGP NetShare in a PGP Universal-Managed Environment
Accessing the Properties of a Protected File or Folder
Using the PGP NetShare Menus in PGP Desktop
The File Menu
The Edit Menu
The NetShare Menu
12 Using PGP Zip
Creating PGP Zip Archives
Encrypting to Recipient Keys
Encrypting with a Passphrase
Creating a PGP Self-Decrypting Archive (SDA)
Creating a Sign Only Archive
Opening a PGP Zip Archive
Opening a PGP Zip SDA
Editing a PGP Zip Archive
Verifying Signed PGP Zip Archives
Using PGP Shredder to Permanently Delete Files and Folders...251
Using PGP Shredder to Permanently Delete Files and Folders
13 Shredding Files with PGP Shredder
Shredding Files using the PGP Shredder Icon on Your Desktop
To shred files using the PGP Shredder icon on your Desktop
Shredding Files From Within PGP Desktop
Shredding Files in Windows Explorer
Using the PGP Shred Free Space Assistant
Scheduling Free Space Shredding
About Smart Cards and Tokens...257
About Smart Cards and Tokens
14 Storing Keys on Smart Cards and Tokens
Supported Smart Cards
Recognizing Smart Cards
Examining Smart Card Properties
Generating a PGP Keypair on a Smart Card
To generate a PGP keypair on a smart card
Copying your Public Key from a Smart Card to a Keyring
Copying a Keypair from Your Keyring to a Smart Card
Wiping Keys from Your Smart Card
Using Multiple Smart Cards
Special-Use Tokens
Configuring the Aladdin eToken
Accessing the PGP Options dialog box...269
Accessing the PGP Options dialog box
A Setting PGP Desktop Options
General Options
Keys Options
Master Keys Options
Messaging Options
Proxy Options
PGP NetShare Options
Disk Options
Notifier Options
Advanced Options
Choosing whether to use a password or passphrase...291
Choosing whether to use a password or passphrase
B Working with Passwords and Passphrases
The Passphrase Quality Bar
Creating Strong Passphrases
What if You Forget Your Passphrase?
C Using PGP Desktop with PGP Universal Server
For PGP Administrators
About Lotus Notes and MAPI Support...301
Using PGP Desktop with Lotus Notes...301
About Lotus Notes and MAPI Support
Using PGP Desktop with Lotus Notes
D Messaging with Lotus Notes and MAPI
Sending email to recipients inside your Lotus Notes organization
Sending email to recipients outside your Lotus Notes organization
Binding to a Universal Server
Manual Binding
Notes Addresses
Notes Client Settings
The Notes.ini Configuration File
0 of .
Results for:
No results containing your search query
P. 1


|Views: 432|Likes:
Published by megaman112

More info:

Published by: megaman112 on Sep 27, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 7 to 53 are not shown in this preview.
You're Reading a Free Preview
Pages 60 to 117 are not shown in this preview.
You're Reading a Free Preview
Pages 124 to 179 are not shown in this preview.
You're Reading a Free Preview
Pages 186 to 191 are not shown in this preview.
You're Reading a Free Preview
Pages 198 to 325 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->