Lenovo ThinkVantage Client Security Solution 8.3 User Manual

Page 3

Advertising
background image

Contents

Preface . . . . . . . . . . . . . . . .

iii

Chapter 1. Overview. . . . . . . . . . . 1

Client Security Solution . . . . . . . . . . . .

1

Client Security Solution passphrase

. . . . .

2

Client Security password recovery . . . . . .

2

Client Security Password Manager . . . . . .

2

Security Advisor . . . . . . . . . . . . .

3

Certificate Transfer wizard . . . . . . . . .

3

Hardware password reset . . . . . . . . .

3

Support for systems without Trusted Platform
Module . . . . . . . . . . . . . . . . .

3

Fingerprint Software . . . . . . . . . . . . .

4

Chapter 2. Installation . . . . . . . . . . 5

Client Security Solution . . . . . . . . . . . .

5

Installation requirements . . . . . . . . . .

5

Custom public properties. . . . . . . . . .

5

Trusted Platform Module support

. . . . . .

6

Installation procedures and command-line
parameters . . . . . . . . . . . . . . .

7

Using msiexec.exe . . . . . . . . . . . .

8

Standard Windows Installer public
properties . . . . . . . . . . . . . . .

10

Installation log file

. . . . . . . . . . .

11

Installing ThinkVantage Fingerprint Software . . .

12

Silent installation . . . . . . . . . . . .

12

Options. . . . . . . . . . . . . . . .

12

Installing Lenovo Fingerprint Software . . . . .

14

Silent installation . . . . . . . . . . . .

15

Options. . . . . . . . . . . . . . . .

15

Systems Management Server . . . . . . . . .

17

Chapter 3. Working with Client
Security Solution . . . . . . . . . . .

19

Using the Trusted Platform Module. . . . . . .

19

Using the Trusted Platform Module with
Windows 7 . . . . . . . . . . . . . .

19

Managing Client Security Solution with
cryptographic keys . . . . . . . . . . . . .

19

Take Ownership . . . . . . . . . . . .

20

Enroll User . . . . . . . . . . . . . .

21

Software emulation . . . . . . . . . . .

22

System board swap . . . . . . . . . . .

23

EFS protection utility . . . . . . . . . .

25

Using the XML Schema . . . . . . . . . . .

26

Examples . . . . . . . . . . . . . . .

26

Using RSA SecurID tokens . . . . . . . . . .

32

Installing the RSA SecurID Software Token . .

32

Requirements . . . . . . . . . . . . .

33

Setting the Smart Card Access Options . . .

33

Installing the RSA SecurID Software Token
manually . . . . . . . . . . . . . . .

33

Active Directory Support . . . . . . . . .

33

Settings and policies for the fingerprint reader
authentication . . . . . . . . . . . . . . .

34

Enforced fingerprint bypass option . . . . .

34

Fingerprint swipe result . . . . . . . . .

34

Command-line tools . . . . . . . . . . . .

34

Security Advisor . . . . . . . . . . . .

35

Client Security Solution setup wizard . . . .

36

Deployment file encrypt or decrypt tool . . .

36

Deployment file processing tool . . . . . .

37

TPMENABLE.EXE

. . . . . . . . . . .

37

Certificate Transfer tool . . . . . . . . .

37

Activating or deactivating the TPM . . . . .

38

Active Directory Support . . . . . . . . . . .

40

Administrative (ADM) template files . . . . .

41

Group Policy settings . . . . . . . . . .

42

Chapter 4. Working with
ThinkVantage Fingerprint Software .

47

Management console tool . . . . . . . . . .

47

User-specific commands . . . . . . . . .

47

Global settings commands . . . . . . . .

48

Secure mode and convenient mode . . . . . .

49

Secure mode - administrator . . . . . . .

49

Secure mode - limited user . . . . . . . .

49

Convenient mode - administrator

. . . . .

50

Convenient mode - limited user . . . . . .

50

Configurable settings . . . . . . . . . .

51

Fingerprint Software and Novell Netware Client . .

52

Authenticating . . . . . . . . . . . . .

52

ThinkVantage Fingerprint Software service. . . .

53

Chapter 5. Working with Lenovo
Fingerprint Software . . . . . . . . .

55

Management console tool . . . . . . . . . .

55

Lenovo Fingerprint Software service . . . . . .

55

Active Directory support for Lenovo Fingerprint
Software . . . . . . . . . . . . . . . . .

55

Chapter 6. Best Practices . . . . . . .

57

Deployment examples for installing Client Security
Solution . . . . . . . . . . . . . . . . .

57

Scenario 1 . . . . . . . . . . . . . .

57

© Copyright Lenovo 2008, 2011

i

Advertising