About this guide
2 Sanctuary's Setup Guide 4.2.2
Chapter 7: Using the Key Pair Generator......................................................................... 59
Introduction ................................................................................................................................... 59
Starting the Key Pair Generator ........................................................................................................... 60
Generating a key pair ....................................................................................................................... 60
Deploying the key pair ...................................................................................................................... 60
Chapter 8: Unattended Client installation ...................................................................... 63
What is an MSI file? .......................................................................................................................... 64
Creating a Transform file (MST) for an existing MSI file .............................................................................. 64
Prerequisites for creating a Sanctuary Client Deployment package ............................................................... 65
To install the Sanctuary Client Deployment tool ...................................................................................... 65
To install packages........................................................................................................................... 66
To install the Sanctuary Client: MST file generation .................................................................................. 66
Using the Sanctuary Client Deployment tool to install the Sanctuary Client ......................................................71
Using the command line to install clients ............................................................................................... 77
Using Windows Group Policy to install clients .......................................................................................... 77
Querying the client status .................................................................................................................. 80
Sanctuary Client Deployment menus ..................................................................................................... 81
Packages Menu ........................................................................................................................... 81
Computers menu ......................................................................................................................... 82
Help menu ................................................................................................................................ 83
Context menus ........................................................................................................................... 83
The Options Screen............................................................................................................................ 83
Chapter 9: Using the SXDomain Command line tool ......................................................... 85
Introduction ................................................................................................................................... 85
The SXDomain parameters ................................................................................................................. 85
Examples.................................................................................................................................. 86
Scheduling domain synchronizations .................................................................................................... 87
Chapter 10: Registering your Sanctuary product ............................................................... 89
Licensing ....................................................................................................................................... 89
Obtaining a license ..................................................................................................................... 89
License file location .................................................................................................................... 90
License file format ...................................................................................................................... 90
License-related SecureWave Application Server actions at start-up .............................................................. 91
License-related SecureWave Application Server actions while running .......................................................... 91
License-related Client actions.............................................................................................................. 91
Appendix A: Detailed system requirements and limitations ............................................... 93
System requirements ......................................................................................................................... 93
Sanctuary Device Control ................................................................................................................... 94
Terminal services limitations ......................................................................................................... 94
The RunAs command limitations .................................................................................................... 95
Appendix B: Registry keys ........................................................................................... 97
SecureWave Application Server registry keys ............................................................................................ 97
Database connection loss registry keys ............................................................................................. 97
Log insertion process registry keys ................................................................................................... 97
Debugging registry keys ............................................................................................................... 98
General registry keys ................................................................................................................... 99
Security registry keys ................................................................................................................... 99
Sanctuary Client registry keys ............................................................................................................. 102
Appendix C: Upgrading from old versions ..................................................................... 105
Sanctuary Device Control .................................................................................................................. 106
Sanctuary Server Edition................................................................................................................... 106
Upgrading SecureEXE Clients ......................................................................................................... 106
Upgrading Server-side components ..................................................................................................... 107
Upgrading from a previous SecureWave Application Server version ......................................................... 107
Appendix D: Installing Sanctuary components on Windows XP SP2/2003 SP1 ......................... 109
Connection between SecureWave Application Server and the SecureWave Sanctuary Database .......................... 109
Connection between the Sanctuary Management Console and the SecureWave Application Server ...................... 110
Stage 1: Configuring a fixed port on the server .................................................................................. 110
Stage 2: Opening the port on the server firewall ................................................................................ 110
Connecting to the Server using the fixed port ................................................................................. 110
Connecting using the Endpoint Mapper ........................................................................................... 110
Summary ................................................................................................................................... 111
Connection between the Sanctuary Client Driver and the SecureWave Application Server .................................. 112