PGP Endpoint Application Control 4.4 SR1 User guide

Category
Software
Type
User guide
User Guide
PGP Endpoint Application Control 4.4 SR1
02_104P 4.4 SR1 User Guide
- 2 -
- 3 -
Notices
Version Information
PGP Endpoint Application Control User Guide - PGP Endpoint Application Control Version 4.4 SR1 -
Released: August 2009
Document Number: 02_104P_4.4 SR1_092391106
Copyright Information
Copyright© 1991-2009 by PGP Corporation. All Rights Reserved. No part of this document can be
reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without
the express written permission of PGP Corporation.
Trademark Information
PGP, Pretty Good Privacy, and the PGP logo are registered trademarks of PGP Corporation in the
US and other countries. IDEA is a trademark of Ascom Tech AG. Windows and ActiveX are registered
trademarks of Microsoft Corporation. AOL is a registered trademark, and AOL Instant Messenger is a
trademark, of America Online, Inc. Red Hat and Red Hat Linux are trademarks or registered trademarks
of Red Hat, Inc. Linux is a registered trademark of Linus Torvalds. Solaris is a trademark or registered
trademark of Sun Microsystems, Inc. AIX is a trademark or registered trademark of International Business
Machines Corporation. HP-UX is a trademark or registered trademark of Hewlett-Packard Company. SSH
and Secure Shell are trademarks of SSH Communications Security, Inc. Rendezvous and Mac OS X
are trademarks or registered trademarks of Apple Computer, Inc. All other registered and unregistered
trademarks in this document are the sole property of their respective owners.
Licensing and Patent Information
The IDEA cryptographic cipher described in U.S. patent number 5,214,703 is licensed from Ascom Tech
AG. The CAST-128 encryption algorithm, implemented from RFC 2144, is available worldwide on a royalty-
free basis for commercial and non-commercial uses. PGP Corporation has secured a license to the patent
rights contained in the patent application Serial Number 10/655,563 by The Regents of the University of
California, entitled Block Cipher Mode of Operation for Constructing a Wide-blocksize block Cipher from a
Conventional Block Cipher. Some third-party software included in PGP Universal Server is licensed under
the GNU General Public License (GPL). PGP Universal Server as a whole is not licensed under the GPL.
If you would like a copy of the source code for the GPL software included in PGP Universal Server, contact
PGP Support (http://www.pgp.com/support). PGP Corporation may have patents and/or pending patent
applications covering subject matter in this software or its documentation; the furnishing of this software or
documentation does not give you any license to these patents.
Acknowledgements
This product includes or may include:
• The Zip and ZLib compression code, created by Mark Adler and Jean-Loup Gailly, is used with
permission from the free Info-ZIP implementation, developed by zlib (http://www.zlib.net). • Libxml2,
the XML C parser and toolkit developed for the Gnome project and distributed and copyrighted under
the MIT License found at http://www.opensource.org/licenses/mit-license.html. Copyright © 2007 by
the Open Source Initiative. • bzip2 1.0, a freely available high-quality data compressor, is copyrighted
PGP Endpoint Application Control
- 4 -
by Julian Seward, © 1996-2005. • Application server (http://jakarta.apache.org/), web server (http://
www.apache.org/), Jakarta Commons (http://jakarta.apache.org/commons/license.html) and log4j, a
Java-based library used to parse HTML, developed by the Apache Software Foundation. The license
is at www.apache.org/licenses/LICENSE-2.0.txt. • Castor, an open-source, databinding framework for
moving data from XML to Java programming language objects and from Java to databases, is released
by the ExoLab Group under an Apache 2.0-style license, available at http://www.castor.org/license.html.
• Xalan, an open-source software library from the Apache Software Foundation that implements the
XSLT XML transformation language and the XPath XML query language, is released under the Apache
Software License, version 1.1, available at http://xml.apache.org/xalan-j/#license1.1. • Apache Axis is
an implementation of the SOAP (“Simple Object Access Protocol”) used for communications between
various PGP products is provided under the Apache license found at http://www.apache.org/licenses/
LICENSE-2.0.txt. • mx4j, an open-source implementation of the Java Management Extensions (JMX),
is released under an Apache-style license, available at http://mx4j.sourceforge.net/docs/ch01s06.html.
• jpeglib version 6a is based in part on the work of the Independent JPEG Group. (http://www.ijg.org/)
• libxslt the XSLT C library developed for the GNOME project and used for XML transformations is
distributed under the MIT License http://www.opensource.org/licenses/mit-license.html. • PCRE version
4.5 Perl regular expression compiler, copyrighted and distributed by University of Cambridge. ©1997-2006.
The license agreement is at http://www.pcre.org/license.txt. • BIND Balanced Binary Tree Library and
Domain Name System (DNS) protocols developed and copyrighted by Internet Systems Consortium,
Inc. (http://www.isc.org) • Free BSD implementation of daemon developed by The FreeBSD Project, ©
1994-2006. • Simple Network Management Protocol Library developed and copyrighted by Carnegie
Mellon University © 1989, 1991, 1992, Networks Associates Technology, Inc, © 2001- 2003, Cambridge
Broadband Ltd.© 2001- 2003, Sun Microsystems, Inc., © 2003, Sparta, Inc, © 2003-2006, Cisco, Inc and
Information Network Center of Beijing University of Posts and Telecommunications, © 2004. The license
agreement for these is at http://net-snmp.sourceforge.net/about/license.html. • NTP version 4.2 developed
by Network Time Protocol and copyrighted to various contributors. • Lightweight Directory Access Protocol
developed and copyrighted by OpenLDAP Foundation. OpenLDAP is an open-source implementation of
the Lightweight Directory Access Protocol (LDAP). Copyright © 1999-2003, The OpenLDAP Foundation.
The license agreement is at http://www.openldap.org/software/release/license.html. • Secure shell
OpenSSH version 4.2.1 developed by OpenBSD project is released by the OpenBSD Project under
a BSD-style license, available at http://www.openbsd.org/cgibin/cvsweb/src/usr.bin/ssh/LICENCE?
rev=HEAD. • PC/SC Lite is a free implementation of PC/SC, a specification for SmartCard integration is
released under the BSD license. • Postfix, an open source mail transfer agent (MTA), is released under
the IBM Public License 1.0, available at http://www.opensource.org/licenses/ibmpl.php. • PostgreSQL,
a free software object-relational database management system, is released under a BSD-style license,
available at http://www.postgresql.org/about/licence. • PostgreSQL JDBC driver, a free Java program
used to connect to a PostgreSQL database using standard, database independent Java code, (c)
1997-2005, PostgreSQL Global Development Group, is released under a BSD-style license, available
at http://jdbc.postgresql.org/license.html. • PostgreSQL Regular Expression Library, a free software
object-relational database management system, is released under a BSD-style license, available at
http://www.postgresql.org/about/licence. • 21.vixie-cron is the Vixie version of cron, a standard UNIX
daemon that runs specified programs at scheduled times. Copyright © 1993, 1994 by Paul Vixie; used
by permission. • JacORB, a Java object used to facilitate communication between processes written in
Java and the data layer, is open source licensed under the GNU Library General Public License (LGPL)
available at http://www.jacorb.org/lgpl.html. Copyright © 2006 The JacORB Project. • TAO (The ACE
ORB) is an open-source implementation of a CORBA Object Request Broker (ORB), and is used for
communication between processes written in C/C++ and the data layer. Copyright (c) 1993-2006 by
Douglas C. Schmidt and his research group at Washington University, University of California, Irvine, and
Vanderbilt University. The open source software license is available at http://www.cs.wustl.edu/~schmidt/
Notices
- 5 -
ACEcopying. html. • libcURL, a library for downloading files via common network services, is open source
software provided under a MIT/X derivate license available at http://curl.haxx.se/docs/copyright.html.
Copyright (c) 1996 - 2007, Daniel Stenberg. • libuuid, a library used to generate unique identifiers, is
released under a BSD-style license, available at http://thunk.org/hg/e2fsprogs/?file/fe55db3e508c/lib/uuid/
COPYING. Copyright (C) 1996, 1997 Theodore Ts’o. • libpopt, a library that parses command line options,
is released under the terms of the GNU Free Documentation License available at http://directory.fsf.org/
libs/COPYING.DOC. Copyright © 2000-2003 Free Software Foundation, Inc. • gSOAP, a development
tool for Windows clients to communicate with the Intel Corporation AMT chipset on a motherboard, is
distributed under the GNU Public License, available at http://www.cs.fsu.edu/~engelen/soaplicense.html.
• Windows Template Library (WRT) is used for developing user interface components and is distributed
under the Common Public License v1.0 found at http://opensource.org/licenses/cpl1.0.php. • The Perl Kit
provides several independent utilities used to automate a variety of maintenance functions and is provided
under the Perl Artistic License, found at http://www.perl.com/pub/a/language/misc/Artistic.html.
Export Information
Export of this software and documentation may be subject to compliance with the rules and regulations
promulgated from time to time by the Bureau of Export Administration, United States Department of
Commerce, which restricts the export and re-export of certain products and technical data.
Limitations
The software provided with this documentation is licensed to you for your individual use under the terms of
the End User License Agreement provided with the software. The information in this document is subject
to change without notice. PGP Corporation does not warrant that the information meets your requirements
or that the information is free of errors. The information may include technical inaccuracies or typographical
errors. Changes may be made to the information and incorporated in new editions of this document, if and
when made available by PGP Corporation.
PGP Endpoint Application Control
- 6 -
- 7 -
Table of Contents
Preface: About This Document................................................................13
Typographical Conventions.......................................................................................... 13
Getting Assistance........................................................................................................13
Chapter 1: PGP Endpoint Application Control Overview...................... 15
Product Overview..........................................................................................................15
Server, Database and Client Process..........................................................................17
System Requirements...................................................................................................18
Minimum Hardware Requirements........................................................................18
Supported Operating Systems.............................................................................. 19
Supported Databases............................................................................................20
Other Software Requirements...............................................................................21
Recommended Configuration................................................................................21
Client Supported Languages.................................................................................22
Chapter 2: Using Application Control.....................................................23
Getting Started with PGP Endpoint Application Control...............................................23
The File Authorization Setup Process..........................................................................24
Accessing the Management Server Console...............................................................26
Logging In to the Management Server Console................................................... 26
Logging Out of the PGP Endpoint Management Server Console.........................27
Common Functions within the Management Server Console...................................... 27
Viewing the Management Server Console............................................................28
Common Conventions...........................................................................................28
Using the Management Server Console Control Panel........................................ 29
Resizing and Repositioning Panels.......................................................................30
Organizing Columns for Display............................................................................30
Using the File Menu..............................................................................................32
Using the View Menu............................................................................................32
Using the Tools Menu...........................................................................................33
Using the Reports Menu....................................................................................... 33
Table of Contents
- 8 -
Using the Explorer Menu...................................................................................... 34
Using the Window Menu.......................................................................................35
Using the Help Menu............................................................................................ 35
PGP Endpoint Application Control Modules..........................................................36
License Expiration.........................................................................................................36
Chapter 3: Using the Authorization Wizard............................................39
Working with the Authorization Wizard........................................................................ 39
Authorizing Executable Files.................................................................................40
Chapter 4: Using Modules........................................................................47
Working with Scan Explorer.........................................................................................48
Creating a File Scanning Template ..................................................................... 48
Scanning Files on a Client Computer...................................................................50
Comparing Scans..................................................................................................52
Modifying File Authorization..................................................................................54
Working with the Exe Explorer ....................................................................................54
Setting Up the Exe Explorer Default Options........................................................55
Adding a File Group..............................................................................................56
Renaming a File Group.........................................................................................57
Deleting a File Group............................................................................................57
Working with User Explorer..........................................................................................58
About File Groups................................................................................................. 58
File Group by User Tab.......................................................................................58
The User by File Group Tab.................................................................................63
Working with Database Explorer..................................................................................66
The Files Tab........................................................................................................ 67
The Groups Tab....................................................................................................70
Working with Log Explorer........................................................................................... 73
The Log Explorer Window.....................................................................................74
Navigation Control Bar..........................................................................................74
Column Headers....................................................................................................75
Log Explorer Templates........................................................................................83
Select and Edit Templates Dialog.........................................................................89
Template Settings Dialog......................................................................................92
Table of Contents
- 9 -
Criteria/Properties Panel......................................................................................105
Results Panel/Custom Report Contents..............................................................105
Upload Latest Log Files...................................................................................... 109
Chapter 5: Using Tools...........................................................................111
Synchronizing Domains..............................................................................................112
Synchronizing Domain Members.........................................................................112
Synchronizing Domain Users..............................................................................113
Database Clean Up....................................................................................................114
Deleting Database Records.................................................................................114
Defining User Access................................................................................................. 116
Assigning Administrators.....................................................................................118
Defining Administrator Roles...............................................................................118
Assigning Administrator Roles.............................................................................121
Defining Default Options.............................................................................................122
Default Options Page.......................................................................................... 122
Default Option Precedence Rules.......................................................................130
Changing Default Options................................................................................... 138
Managing Path Rules................................................................................................. 138
Creating a Path Rule for All Users..................................................................... 140
Creating a Path Rule for a User or User Group................................................. 143
Modifying a Path Rule.........................................................................................146
Deleting a Path Rule...........................................................................................148
Defining a Trusted Owner...................................................................................150
Deleting a Trusted Owner...................................................................................152
Defining Spread Check...............................................................................................153
Enabling Spread Check.......................................................................................154
Sending File Authorization Updates to Computers.................................................... 154
Sending Updates to All Computers ....................................................................154
Sending Updates to a Single Computer..............................................................155
Working with Standard File Definitions...................................................................... 156
Importing Standard File Definitions.....................................................................157
Exporting File Authorization Settings..........................................................................158
Exporting Settings................................................................................................159
Importing Settings................................................................................................159
Table of Contents
- 10 -
Working with Endpoint Maintenance..........................................................................160
Creating Endpoint Maintenance Tickets..............................................................161
Chapter 6: Using Reports.......................................................................163
About Reports.............................................................................................................163
Reporting by User Role..............................................................................................163
Working with Reports................................................................................................. 164
Opening a Report................................................................................................164
Closing a Report..................................................................................................164
Saving a Report...................................................................................................164
Printing a Report................................................................................................. 165
Available Reports.................................................................................................165
File Groups by User............................................................................................166
User by File Group..............................................................................................167
User Options........................................................................................................168
Machine Options..................................................................................................169
Client Status........................................................................................................170
Server Settings....................................................................................................171
Chapter 7: Using the Client Deployment Tool Tool............................. 173
PGP Endpoint Client Deployment Window................................................................ 174
Packages Panel...................................................................................................174
Packages Menu...................................................................................................175
Computers Panel.................................................................................................176
Computers Menu.................................................................................................176
Creating Deployment Packages.................................................................................177
Adding Computers......................................................................................................180
Deploying Packages...................................................................................................182
Querying Client Status................................................................................................186
Appendix A: PGP Endpoint Administrative Tools................................189
Using the PGP Endpoint Authorization Service Tool................................................. 189
Scheduling Domain Synchronization..........................................................................193
Manage Administrator Rights..................................................................................... 195
Using PGP Endpoint with Novell................................................................................196
Table of Contents
- 11 -
Using Novell Shared Data File Directory............................................................ 197
Running the Novell Synchronization Script.........................................................198
Opening Firewall Ports............................................................................................... 199
Open Ports by Firewall Exception.......................................................................199
Open Ports by Active Directory Policy................................................................200
Table of Contents
- 12 -
- 13 -
Preface
About This Document
This User Guide is a resource written for all users of PGP Endpoint Application Control 4.4 SR1.
This document defines the concepts and procedures for installing, configuring, implementing,
and using PGP Endpoint Application Control 4.4 SR1.
Tip:
PGP documentation is updated on a regular basis. To acquire the latest version of this or
any other published document, please refer to the PGP Support Portal Web Site (https://
support.pgp.com).
Typographical Conventions
The following conventions are used throughout this documentation to help you identify various
information types.
Convention Usage
bold Buttons, menu items, window and screen objects.
bold italics Wizard names, window names, and page names.
italics New terms, options, and variables.
UPPERCASE SQL Commands and keyboard keys.
monospace File names, path names, programs, executables, command
syntax, and property names.
Getting Assistance
Getting Product Information
Unless otherwise noted, the product documentation is provided as Adobe Acrobat PDF files
that are installed with PGP Endpoint. Online help is available within the PGP Endpoint product.
Release notes are also available, which may have last-minute information not found in the
product documentation.
Preface
- 14 -
Contacting Technical Support
To learn about PGP support options and how to contact PGP Technical Support, please visit
the PGP Corporation Support Home Page (http://www.pgp.com/support).
To access the PGP Support Knowledge Base or request PGP Technical Support, please visit
PGP Support Portal Web Site (https://support.pgp.com).
Note:
You may access portions of the PGP Support Knowledge Base without a support agreement;
however, you must have a valid support agreement to request Technical Support.
For any other contacts at PGP Corporation, please visit the PGP Contacts Page (http://
www.pgp.com/company/contact/index.html).
For general information about PGP Corporation, please visit the PGP Web Site (http://
www.pgp.com).
To access the PGP Support forums, please visit PGP Support (http://
forums.pgpsupport.com). These are user community support forums hosted by PGP
Corporation.
- 15 -
Chapter
1
PGP Endpoint Application Control Overview
In this chapter:
Product Overview
Server, Database and
Client Process
System Requirements
PGP Endpoint application and device control solutions
include:
PGP Endpoint Device Control, which prevents
unauthorized transfer of applications and data by
controlling access to input and output devices, such as
memory sticks, modems, and PDAs.
PGP Endpoint Device Control client for Embedded
Devices, which moves beyond the traditional desktop
and laptop endpoints to a variety of platforms that
include ATMs, industrial robotics, thin clients, set-top
boxes, network area storage devices and the myriad
of other systems running Microsoft
®
Windows XP
®
Embedded.
PGP Endpoint Application Control, which delivers
granular control of application execution in an enterprise
environment.
PGP Endpoint Application Control Terminal Services
Edition, which extends application control to Citrix
®
or
Microsoft Terminal Services
®
environments that share
applications among multiple users.
PGP Endpoint Application Control Server Edition, which
delivers application control to protect enterprise servers,
such as web servers, e-mail servers, and database
servers.
Product Overview
PGP Endpoint software is based on a multi-tier software architecture that processes and stores
data for Application Control and Device Control. Users can interact with the application through
PGP Endpoint Application Control
- 16 -
the client interface. A separate Management Server Console provides a user interface for
network administrators.
The primary components of the PGP Endpoint Application Control solution are:
The PGP Endpoint database which serves as the central repository of authorization
information for devices and applications.
One or more Administration Servers that communicate between the database, the protected
clients, and the PGP Endpoint Management Server Console.
The PGP Endpoint Management Server Console, which provides the administrative user
interface for the PGP Endpoint Administration Server.
The PGP Endpoint client, which is installed on each computer, either endpoint or server, that
you want to protect.
The following figure illustrates the relationships between the PGP Endpoint components.
Figure 1: PGP Endpoint Component Relationships
PGP Endpoint Application Control Overview
- 17 -
Server, Database and Client Process
The Administration Server communicates between the database and the protected client
computers.
The following describes the communication process flow between the Administration Servers,
database, and clients when using Application Control.
Figure 2: Application Control Process Flow
PGP Endpoint Application Control
- 18 -
System Requirements
The following sections describe the minimum system requirements necessary for successful
installation of PGP Endpoint 4.4 SR1 and the languages supported by the client.
Important: For installation or upgrade to PGP Endpoint version 4.4 SR1:
You must have a new license file that is valid specifically for version 4.4.
Existing license files issued before PGP Endpoint version 4.4 will not work with the PGP
Endpoint Administration Server and may cause your Administration Servers to stop working.
The PGP Endpoint 4.4 license must be installed before you install or upgrade the PGP
Endpoint database, and then the Administration Server.
Request a new license file using the Downloads tab on the PGP Licensing and Entitlement
Management System (LEMS) ( https://lems.pgp.com/account/login) .
Minimum Hardware Requirements
The minimum PGP Endpoint hardware requirements depend upon your service network
environment, including the type of database supported, the number of Administration Servers
you need support a distributed network, and the number of subscribed clients.
The hardware requirements for PGP Endpoint Application Control 4.4 SR1 vary depending upon
the number of servers and clients you manage. The following minimum hardware requirements
will support up to:
200 connected PGP Endpoint clients for PGP Endpoint Device Control
50 connected PGP Endpoint clients for PGP Endpoint Application Control
Table 1: Minimum Hardware Requirements
PGP Endpoint Component Requirement
Database
1 GB (4 GB recommended) memory
Pentium
®
Dual-Core CPU processor or AMD equivalent
3 GB minimum hard disk drive
100 MBits/s NIC
Administration Server
512 MB (1 GB recommended) memory
Pentium
®
Dual-Core CPU or AMD equivalent
3 GB minimum hard disk drive
100 MBits/s NIC
PGP Endpoint Application Control Overview
- 19 -
PGP Endpoint Component Requirement
Management Server Console
512 MB (1 GB recommended) memory
15 MB hard disk drive for installation, and 150 MB
additional for application files
1024 by 768 pixels for display
Client
256 MB (1 GB recommended) memory
Pentium Dual-Core CPU or AMD equivalent
10 MB hard disk drive for installation, and several
additional GB for full shadowing feature of PGP Endpoint
Device Control
100 MBits/s NIC
Supported Operating Systems
PGP Endpoint supports multiple Microsoft Windows operations systems for the Administration
Server, Management Server Console, database, and client.
The operating system requirements for PGP Endpoint Application Control 4.4 SR1 components
are outlined as follows.
Table 2: Operating System Requirements
PGP Endpoint Component Requirement
Database
One of the following:
Microsoft Windows
®
XP Professional Service Pack 2 or
higher (SP2+) (32-bit)
Microsoft Windows XP Service Pack 2 (SP2) (64-bit)
Microsoft Windows Server
®
2003 Service Pack 2 (SP2)
(32- and 64-bit)
Microsoft Windows Server 2008 (32-bit and 64-bit)
Microsoft Windows Server 2008 R2 (64 bit only)
Administration Server One of the following:
Microsoft Windows Server 2003 SP2 (32-bit)
Microsoft Windows Server 2008 (32-bit and 64-bit)
Microsoft Windows Server 2008 R2 (64 bit only)
PGP Endpoint Application Control
- 20 -
PGP Endpoint Component Requirement
Management Server Console One of the following:
Microsoft Windows XP Professional SP2+ (32-bit)
Microsoft Windows Server 2003 SP2 (32-bit)
Microsoft Windows Server 2008 (32-bit and 64-bit)
Microsoft Windows Server 2008 R2 (64 bit only)
Microsoft Windows Vista
SP1+ (32- and 64-bit)
Microsoft Windows 7 (32- and 64-bit)
Client One of the following:
Microsoft Windows
®
Server 2000 Service Pack 4 or higher
(SP4+) (32-bit)
Microsoft Windows 2000 Professional SP4+ (32-bit)
Microsoft Windows XP Professional Service Pack 2 or
higher (SP2+) (32- and 64-bit)
Microsoft Windows Server 2003 SP2 (32- and 64-bit)
Microsoft Windows Server 2008 (32-bit and 64-bit)
Microsoft Windows Server 2008 R2 (64 bit only)
Microsoft Windows Vista SP1+ (32- and 64-bit)
Microsoft Windows 7 (32- and 64-bit)
Microsoft Windows XP Embedded (XPe) Service Pack 2
(SP2) (32-bit)
Microsoft Windows Embedded Point of Service (WEPOS)
(32-bit)
Microsoft Windows XP Tablet PC Edition (32-bit)
Citrix Access Gateway
4.5
Citrix Presentation Server
4.0 for Windows Server 2003
SP1/SR2+ (32-bit)
Citrix Presentation Server 4.5 for Windows Server 2003
SP1/SR2+ (32- and 64-bit)
Supported Databases
PGP Endpoint supports multiple releases of Microsoft
®
SQL Server
®
. You should choose
the database instance required by your network operating environment and the number of
Administration Server s and subscribed clients the application must support.
The database requirements for PGP Endpoint Application Control 4.4 SR1 components are
outlined as follows.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200

PGP Endpoint Application Control 4.4 SR1 User guide

Category
Software
Type
User guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI