McAfee E-Business Client User manual

Type
User manual

This manual is also suitable for

PRODUCT GUIDE
VERSION 7.1.1
E-Business Client Administration
COPYRIGHT
© 2002 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may
be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language
in any form or by any means without the written permission of Networks Associates Technology, Inc.,
or its suppliers or affiliate companies. To obtain this permission, write to the attention of the Network
Associates legal department at: 3965 Freedom Circle, Santa Clara, California 95054, or call
+1-972-308-9960.
TRADEMARK ATTRIBUTIONS
Active Security, ActiveHelp, ActiveShield, AntiVirus Anyware and design, Bomb Shelter, Building a World of
Trust, Certified Network Expert, Clean-Up, CleanUp Wizard, Cloaking, CNX, CNX Certification Certified
Network Expert and design, CyberCop, CyberMedia, CyberMedia UnInstaller, Data Security Letter and design,
Design (logo), Design (Rabbit with hat), design (stylized N), Disk Minder, Distributed Sniffer System, Distributed
Sniffer System (in Katakana), Dr Solomon’s, Dr Solomon’s label, Enterprise SecureCast, EZ SetUp, First Aid,
ForceField, Gauntlet, GMT, GroupShield, Guard Dog, HelpDesk, HomeGuard, Hunter, I C Expert, ISDN TEL/
SCOPE, LAN Administration Architecture and design, LANGuru, LANGuru (in Katakana), LANWords, Leading
Help Desk Technology, LM1, M and design, Magic Solutions, Magic University, MagicSpy, MagicTree,
MagicWord, McAfee Associates, McAfee, McAfee (in Katakana), McAfee and design, NetStalker, MoneyMagic,
More Power To You, MultiMedia Cloaking, myCIO.com, myCIO.com design (CIO design), myCIO.com Your
Chief Internet Officer & design, NAI & design, Net Tools, Net Tools (in Katakana), NetCrypto, NetOctopus,
NetRoom, NetScan, NetShield, NetStalker, Network Associates, Network General, Network Uptime!, NetXray,
NotesGuard, Nuts & Bolts, Oil Change, PC Medic, PC Medic 97, PCNotary, PGP, PGP (Pretty Good Privacy),
PocketScope, PowerLogin, PowerTelNet, Pretty Good Privacy, PrimeSupport, Recoverkey, Recoverkey –
International, Registry Wizard, ReportMagic, RingFence, Router PM, SalesMagic, SecureCast, Service Level
Manager, ServiceMagic, SmartDesk, Sniffer, Sniffer (in Hangul), SniffMaster, SniffMaster (in Hangul),
SniffMaster (in Katakana), SniffNet, Stalker, Stalker (stylized), Statistical Information Retrieval (SIR),
SupportMagic, TeleSniffer, TIS, TMACH, TMEG, TNV, TVD, TNS, TSD, Total Network Security, Total
Network Visibility, Total Service Desk, Total Virus Defense, Trusted MACH, Trusted Mail, UnInstaller, Virex,
Virus Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker, WebWall, Who’s
Watching Your Network, WinGauge, Your E-Business Defender, ZAC 2000, Zip Manager are registered
trademarks of Network Associates, Inc. and/or its affiliates in the US and/or other countries. All other
registered and unregistered trademarks in this document are the sole property of their respective owners.
LICENSE AGREEMENT
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE
LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE
LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT
THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR
SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET,
A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE
SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT
INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO NAI OR THE PLACE OF PURCHASE
FOR A FULL REFUND.
Issued February 2002 / McAfee E-Business Client Administration software version 7.1.1
Product Guide iii
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Getting more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Contacting McAfee and Network Associates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Chapter 1 Introducing E-Business Client Administration . . . . . . . . . . . 9
Chapter 2 Installing E-Business Client Administration . . . . . . . . . . . . 11
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Installing E-Business Client Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Uninstalling E-Business Client Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Chapter 3 Installing E-Business Client . . . . . . . . . . . . . . . . . . . . . . . . . 15
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Installing E-Business Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Uninstalling E-Business Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Chapter 4 Working with E-Business Client Administration . . . . . . . . . 17
Starting E-Business Client Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Exporting E-Business Server public keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Creating client packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Defining client profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Selecting company logos (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Specifying the use of client keys (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Specifying the file transfer method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Creating client packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Sending packages to clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Validating keys in E-Business Client Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Chapter 5 Working with E-Business Client . . . . . . . . . . . . . . . . . . . . . . 23
Starting E-Business Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Generating keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Contents
iv McAfee E-Business Client Administration software version 7.1.1
Encrypting and sending sensitive data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Decrypting data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Validating keys in E-Business Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Changing passphrases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Viewing the log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Closing E-Business Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Product Guide 5
Preface
Purpose
This Product Guide introduces McAfee E-Business Client Administration
software version 7.1.1. This guide provides the following information: system
requirements, detailed instructions for installing the software, descriptions of
all product features, detailed instructions for creating and distributing client
packages, and procedures for encrypting and sending data. It also provides a
roadmap for getting additional information or help.
Audience
This guide is intended for administrators of McAfee E-Business Server who
are responsible for the company’s security program.
Preface
6 McAfee E-Business Client Administration software version 7.1.1
Getting more information
Product Guide System requirements, instructions for installing and
starting the software, product introduction and features,
detailed instructions for creating and distributing client
packages, and procedures for encrypting and sending
data.
Available in an Adobe Acrobat .PDF file from either the
product CD or the McAfee download site.
Help Product information in the Help system that is accessed
from within the application. Access from either a Help
menu option in the application or by pressing the F1 key.
Release Notes README file. Product information, resolved issues, any
known issues, and last-minute additions or changes to
the product or this guide.
Available as a .TXT file from either the product CD or the
McAfee download site.
Contact A list of phone numbers, street addresses, web
addresses, and fax numbers for Network Associates
offices in the United States and around the world. Also
includes contact information for services and resources,
including:
Technical Support.
Customer Service.
Download Support.
AVERT Anti-Virus Research Site.
McAfee Beta Site.
On-Site Training.
Network Associates Offices Worldwide.
Product Guide 7
Preface
Contacting McAfee and Network Associates
Technical Support http://knowledge.nai.com
McAfee Beta Site www.mcafeeb2b.com/beta/
AVERT Anti-Virus
Research Site
www.mcafeeb2b.com/avert
Download Site
DAT File Updates
Product Upgrades
www.mcafeeb2b.com/naicommon/download/
www.mcafeeb2b.com/naicommon/download/dats/find.asp
www.mcafeeb2b.com/naicommon/download/upgrade/login.asp
Valid grant number required.
Contact Network Associates Customer Service.
On-Site Training www.mcafeeb2b.com/services/mcafee-training/default.asp
Network Associates Customer Service:
Web www.nai.com
www.mcafeeb2b.com
US, Canada, and Latin America toll-free:
Phone +1-888-VIRUS NO or +1-888-847-8766
Monday – Friday, 8 a.m. – 8 p.m., Central Time
For additional information on contacting Network Associates and McAfee — including toll-free
numbers for other geographic areas — see the Contact file that accompanied this product release.
Preface
8 McAfee E-Business Client Administration software version 7.1.1
Product Guide 9
1
Introducing E-Business Client
Administration
McAfee E-Business Client Administration 7.1.1 has a counterpart: McAfee
E-Business Client 7.1.1. E-Business Client Administration allows you to create
custom, self-extracting packages that your clients use to install E-Business
Client. E-Business Client provides a simple drag and drop interface that
allows each client that you exchange data with to transparently encrypt and
sign sensitive data files, then send them to you by simply selecting the desired
files. In addition, you use E-Business Client Administration in conjunction
with McAfee E-Business Server 7.1.1 to generate keys and decrypt client data.
Use E-Business Client Administration to create custom packages for multiple
client groups. For each client profile, you specify whether or not you want
clients to generate keys or sign data, the file transfer method (e-mail or FTP) to
use, and the corresponding file transfer settings. You can even include your
company logo. After you send each custom package to clients and they
perform the one-click installation, clients select the appropriate profile and the
desired files. E-Business Client automatically encrypts, signs, and sends the
files to you using your predefined key generation and file transfer settings.
Introducing E-Business Client Administration
10 McAfee E-Business Client Administration software version 7.1.1
Product Guide 11
2
Installing E-Business Client
Administration
System requirements
Before you begin the installation, be sure to verify that the minimum system
requirements are met on computers on which you want to install E-Business
Client Administration.
NOTE
You might find it helpful to provide a list of the E-Business Client
system requirements that apply to packages you create to clients.
For a list of these requirements, see System requirements on page 15.
10 MB free disk space.
E-Business Client Administration works with E-Business Server 7.1.0 or
later.
If you are using FTP as the file transfer method, you need an
Internet-accessible FTP server.
If you are using FTP as the file transfer method, you need Microsoft Internet
Explorer 3.0 or later.
If you are using e-mail as the file transfer method or if you are creating client
packages that require client keys, you need a MAPI-compliant e-mail
system; for example, Microsoft Outlook, Microsoft Outlook Express, or
Netscape Mail.
Any of the following Microsoft operating systems:
w Windows NT Server 4.0 with Service Pack 4 or later.
w Windows NT Workstation 4.0 with Service Pack 4 or later.
w Windows 2000 Advanced Server.
w Windows 2000 Professional.
w Windows 2000 Server.
w Windows XP Professional.
Installing E-Business Client Administration
12 McAfee E-Business Client Administration software version 7.1.1
Installing E-Business Client Administration
Now that you have met the minimum system requirements on all applicable
computers, you can install E-Business Client Administration.
1 If installing from the product CD, insert it into the CD-ROM drive of the
computer.
If downloading the files from the McAfee web site
(www.mcafeeb2b.com/naicommon/download/upgrade/login.asp), follow the
steps on how to download the files provided there, then continue with
Step 2. Note that you must enter a valid customer grant number to
download product upgrades.
2 On the taskbar, click the Start button, then select Run. The Run dialog box
appears.
3 In Open, enter the path where the Setup program (EBCADMIN.EXE) is
located (for example, E:\PRODUCTS\EBCADMIN.EXE), then click
OK
to start Setup.
4 Click Next.
5 Click Accept to indicate that you agree to the terms of the license.
6 Accept the default installation directory or click Browse to select another
location, then click
Next. If you select another location, an EBC Admin for
<Operating System> folder (for example, C:\Program Files\Network
Associates\EBC Admin for Windows NT) is automatically appended to
that path.
The default location is C:\Program Files\Network Associates\EBC
Admin for <Operating System>.
7 Review the installation settings, then click Next to continue the
installation.
8 Click Finish to complete the installation.
Product Guide 13
Installing E-Business Client Administration
Uninstalling E-Business Client Administration
1 On the taskbar, click the Start button, then select Settings, Control Panel.
2 Select Add/Remove Programs. The Add/Remove Programs Properties
dialog box appears.
3 Select McAfee E-Business Client Administration, then click Add/Remove.
4 Click OK when asked whether or not you want to remove the
application.
5 Click Finish when done.
Installing E-Business Client Administration
14 McAfee E-Business Client Administration software version 7.1.1
Product Guide 15
3
Installing E-Business Client
System requirements
Before you begin the installation, be sure to verify that the minimum system
requirements are met on computers on which you want to install E-Business
Client.
10 MB free disk space.
If your partner has specified that FTP is being used as the file transfer method,
you need Microsoft Internet Explorer 3.0 or later.
If your partner has specified that e-mail is being used as the file transfer method
or that client keys are required, you need a MAPI-compliant e-mail system;
for example, Microsoft Outlook, Microsoft Outlook Express, or Netscape
Mail.
Any of the following Microsoft operating systems:
w Windows 95.
w Windows 98.
w Windows NT Server 4.0.
w Windows NT Workstation 4.0.
w Windows 2000 Advanced Server.
w Windows 2000 Professional.
w Windows 2000 Server.
w Windows Millennium Edition (Me).
w Windows XP Professional.
w Windows XP Home.
Installing E-Business Client
16 McAfee E-Business Client Administration software version 7.1.1
Installing E-Business Client
Now that you have met the minimum system requirements on all applicable
computers and have received a client package from the partner, you can install
E-Business Client.
1 If you received the client package as an e-mail attachment, save the package
file (<Partner Name>.EXE) to the desired location on your computer.
If you received the client package on electronic media (for example, a disk),
insert that media into the appropriate drive on your computer.
If you want to distribute client packages to other employees via a shared network
drive, save the package file to that location and provide employees with
the path.
2 On the taskbar, click the Start button, then select Run. The Run dialog box
appears.
3 In Open, enter the path where the package file (<Partner Name>.EXE) is
located, then click
OK.
4 If you have installed E-Business Client previously, the installation is
complete.
If this is the first time you have installed E-Business Client, select the
installation directory in the
Browse for Folder dialog box. A folder that
corresponds to the operating system (McAfee EBClient for <Operating
System>; for example, McAfee EBClient for Windows NT4) is
automatically appended to the location you select.
5 Verify the installation directory, then click Yes. You might find it helpful
to make a note of this location for future reference.
6 When asked whether or not you want to create a shortcut on the desktop,
click
Yes to do so.
Uninstalling E-Business Client
1 On the taskbar, click the Start button, then select Settings, Control Panel.
2 Select Add/Remove Programs. The Add/Remove Programs Properties
dialog box appears.
3 Select McAfee E-Business Client - <Partner Name>, then click Add/Remove.
4 If you are asked whether or not you want to restart the computer, click
Yes to complete the installation. Note that if you click No, you will be
required to restart the computer before you can install E-Business Client
again.
Product Guide 17
4
Working with E-Business
Client Administration
Starting E-Business Client Administration
On the taskbar, click the Start button, select Programs, McAfee
E-Business Client Administration
, then select McAfee E-Business Client
Administration again.
Exporting E-Business Server public keys
E-Business Client Administration requires your public key and uses it to
encrypt data sent to you by your clients.
Export your public key from the E-Business Server keyring to an
ASCII-armored key (.ASC) file. For more information on how to export
keys, see the E-Business Server Product Guide.
Creating client packages
You need to complete the following tasks to create client packages:
Defining client profiles
Selecting company logos (optional)
Specifying the use of client keys (optional)
Specifying the file transfer method
Creating client packages
Defining client profiles
1 Start E-Business Client Administration. For detailed steps, see Starting
E-Business Client Administration on page 17.
2 Select Configure a new Client, then click Next.
3 In the Configure Profile dialog box, provide the following, then click Next.
w Profile Name — Type a literal description (up to 50 characters) of the
client package. Clients use this description to identify the company
to which they are sending files. You might find it helpful to provide
this name to clients.
Working with E-Business Client Administration
18 McAfee E-Business Client Administration software version 7.1.1
You might also find it helpful to keep track of the names you assign
to client profiles. When you send updated packages to clients, those
with identical profile names are overwritten.
w Server Public Key — Type the path to the key (*.ASC) file that you
exported from E-Business Server. You can also click
Browse to
select a key file.
4 Go to the next task, Selecting company logos (optional).
Selecting company logos (optional)
1 In the Company Logo dialog box, select the desired .BMP file, then click
Next.
w Company logo — Type the path to a .BMP file of your company
logo or other picture that identifies your company. You can also
click Browse to select a .BMP file. This .BMP file appears in
E-Business Client.
2 Go to the next task, Specifying the use of client keys (optional).
Specifying the use of client keys (optional)
1 In the Client Key Options dialog box, provide the following, then click
Next.
w Require Client Keys — Select this checkbox if you want client data
automatically signed. E-Business Client generates a local keypair
for this purpose. Otherwise, leave this checkbox blank.
w Client Key Identity Prompt — Type text that prompts clients for
unique information you want them to provide in conjunction with
key generation. This text appears in the
Client Key Generation
dialog box in E-Business Client. This box is available only when
you select
Require Client Keys.
w Administrator Inbox — Type the e-mail address you want to use to
receive client keys. When client generate keys, an e-mail message
with the key (.ASC) file attached is automatically sent to this
address. Depending on the number of clients you are supporting,
you might want to create a separate e-mail account for this purpose.
This box is available only when you select
Require Client Keys.
2 Go to the next task, Specifying the file transfer method.
Product Guide 19
Working with E-Business Client Administration
Specifying the file transfer method
1 In the File Transfer Options dialog box, select the desired file transfer
method.
w Email — Select this option to receive client data at a specified e-mail
address.
w FTP — Select this option to receive client data on an
Internet-accessible FTP server.
2 If you selected Email, type the address of the desired e-mail account.
w Address — Type the address of the e-mail account that you want to
use to receive client data. This box is available only when you select
Email.
3 If you selected FTP, provide the following.
w Address — Type the IP address or domain name of the FTP server
to which you want clients to send data. This box is available only
when you select
FTP.
w Port — Type the port number of the FTP server to which you want
clients to send data. This box is available only when you select
FTP.
w Incoming Directory — Enter the folder on the FTP server in which
you want to store client data. For example, you might create a
separate folder for each client profile as a way to organize data. The
folder will be created automatically when clients transfer data. This
box is available only when you select
FTP.
w Anonymous — Select this checkbox if the FTP server does not
require logon information. This box is available only when you
select
FTP.
w User Name — Type the user name of the logon account used to
access the FTP server. This box is available only when you deselect
Anonymous.
w Password — Type the password of the logon account used to access
the FTP server. This box is available only when you deselect
Anonymous.
4 Go to the next task, Creating client packages.
Working with E-Business Client Administration
20 McAfee E-Business Client Administration software version 7.1.1
Creating client packages
1 In the Client Installation dialog box, type the desired path of the client
package.
w Client Installation filename and location — Type the path where you
want to save the client package. You can also click
Save As to select
a location and specify a file name. You might find it helpful to
provide the file name to clients.
w Browse to folder when done — Leave this checkbox selected if you
want to go to the location of the client package. Otherwise, deselect
it.
2 Click Finish to create the client package.
Sending packages to clients
You can send packages to clients via e-mail, electronic media, or shared
network drives. You might want to include instructions specific to each client
profile with each package. Note that the information in Chapter 3, Installing
E-Business Client and Chapter 5, Working with E-Business Client is provided to
clients in online Help.
E-Business Client system requirements that apply to the client package.
For a complete list of these requirements, see System requirements on page
15.
Profile name used in the client package. You specify this name in Step 3
in Defining client profiles on page 17.
Client package file name. You specify this file name in Step 1 in Creating
client packages on page 20.
Installation steps. For detailed steps, see Installing E-Business Client on
page 16.
If the package requires client keys, the unique information you want
clients to provide in conjunction with key generation. You specify this
information in Specifying the use of client keys (optional) on page 18.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30

McAfee E-Business Client User manual

Type
User manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI